Workplace

You just hired a deepfake. Get ready for the rise of imposter employees.

New technology — plus the pandemic remote work trend — is helping fraudsters use someone else’s identity to get a job.

Man wearing mask

Not all job applicants are who they claim to be.

Illustration: z_wei/iStock/Getty Images Plus; Protocol

Mike Elgan is a journalist, opinion columnist and author.

Before COVID-19, job interviews took place in person and new hires worked in the office, for the most part.

But with remote work came an increase in remote hiring, from the job application to onboarding and everything in between. Many employees have never been in the same room as their employers and co-workers, and that has opened the door for a rise in imposter employees.

The FBI is concerned; you should be too.

Lies, spies and deepfake video

Companies have been increasingly complaining to the FBI about prospective employees using real-time deepfake video and deepfake audio for remote interviews, along with personally identifiable information (PII), to land jobs at American companies.

One place they’re likely getting the PII is through posting fake job openings, which enables them to harvest job candidate information, resumes and more, according to the FBI.

Deepfake video sounds advanced. But shady job candidates don’t need exotic or expensive hardware or software to impersonate someone on a live video call — only a photo of the fake person. Consumer products like Xpression Camera enable fraudsters to upload someone’s picture and use their face during a live video interview.

The FBI points out that such deepfake video calls often fail, as the “actions and lip movement of the person seen interviewed on-camera do not completely coordinate with the audio of the person speaking.”

In other words, dishonest job applicants would like to take advantage of deepfake technology for remote hiring, but the technology isn’t there yet. But soon the technology will be so good that deepfake audio and video will look just like the real thing.

And it’s not just deepfake video: You can clone someone’s voice with just a short audio sample and a publicly available tool on GitHub. It’s unlikely that a cybercriminal would get a job using deepfake audio clone, but attackers can (and do) use cloned human voices for workplace phishing attacks.

What imposters want

The main drivers appear to be money, espionage, access to company systems and unearned career advancement.

Many of the job openings sought by these imposters include “information technology and computer programming, database, and software related job functions. Notably, some reported positions include access to customer PII, financial data, corporate IT databases and/or proprietary information,” according to a June 28 posted alert by the FBI’s Internet Crime Complaint Center. The perfect jobs for spies.

Some imposter candidates actually work for the North Korean government, according to a statement by the FBI and the U.S. State and Treasury Departments. Because of U.S. sanctions, North Koreans are ineligible for jobs at American companies. (Companies that employ North Koreans can be fined roughly $330,000 per violation.) So the North Korean government lets people apply and work as imposters in exchange for taking most of their salaries, or North Korean spies get jobs under false identities in order to steal secrets. Some North Koreans used their real identities, but claimed they were outside North Korea.

The problem of imposter employees exists on a scale from exaggerating experience to lying about credentials and personal details to faking experience to claiming to be an entirely different person. And every facet is growing in scale.

Glider AI’s “The Future of Candidate Evaluation” report found that what they call “candidate fraud” has nearly doubled — a 92% increase — since before the pandemic.

In addition to the imposter employee frauds already reported, it’s easy to imagine other scams that take advantage of new technology and remote work.

Malicious cyberattackers could get hired under stolen credentials in order to gain unauthorized access to sensitive data or systems inside companies. A skilled hacker may actually have the IT skills to get the job, and doing so may prove to be a relatively easy act of social engineering.

The bottom line is that our old habits for verifying employees — namely, interacting with them and recognizing who they are — are increasingly unreliable in the face of remote work and new technology that enables people to fake their appearance, voice and identity.

How to avoid hiring imposters

Remote work is here to stay. And it’s time to revisit and revamp hiring. Here are some tips to bear in mind when hiring.

  • Include real identity verification before hiring, and make sure identity matches background screening. (Don’t assume your background provider is verifying identity.)
  • Asking for a driver’s license or passport can lead to a discrimination lawsuit if the candidate isn’t hired — they can claim discrimination based on age, health or country of birth. Request this information only after you’re certain you’ll hire.
  • Know the law in the state you’re in to find out what’s allowed in terms of biometric data collection.
  • If you’re doing background checks and identity verification on remote hires, do the same for in-office hires to avoid discrimination.
  • Consider abandoning all-remote hiring in favor of in-person interviews, even for remote staff. And bring in remote staff for in-house team building quarterly or annually.
  • Rely more on skills assessment and testing for technical positions rather than resume-based claims of experience, certifications and education. Verify identities at the point of testing and follow up on test results with a post-test interview. Imposters are likely to seek employment elsewhere if they have to prove their qualifications.
  • Take extra care with the hiring of IT people and others who will gain access to email systems, passwords, business secrets, physical security systems and other juicy targets for cyberattack. Do thorough background checks and criminal records checks and verify identity throughout the hiring and onboarding process.
  • Embrace AI fraud detection to evaluate resumes and job candidates. Fraud detection has been used for years in banking, insurance and other fields, and is slowly being applied to hiring.

The new world of remote work calls for a new approach to hiring. It’s time to rethink your HR practices to make sure the people you’re hiring and employing are who they say they are — and not imposters.

A 'Soho house for techies': VCs place a bet on community

Contrary is the latest venture firm to experiment with building community spaces instead of offices.

Contrary NYC is meant to re-create being part of a members-only club where engineers and entrepreneurs can hang out together, have a space to work, and host events for people in tech.

Photo: Courtesy of Contrary

In the pre-pandemic times, Contrary’s network of venture scouts, founders, and top technologists reflected the magnetic pull Silicon Valley had on the tech industry. About 80% were based in the Bay Area, with a smattering living elsewhere. Today, when Contrary asked where people in its network were living, the split had changed with 40% in the Bay Area and another 40% living in or planning to move to New York.

It’s totally bifurcated now, said Contrary’s founder Eric Tarczynski.

Keep Reading Show less
Biz Carson

Biz Carson ( @bizcarson) is a San Francisco-based reporter at Protocol, covering Silicon Valley with a focus on startups and venture capital. Previously, she reported for Forbes and was co-editor of Forbes Next Billion-Dollar Startups list. Before that, she worked for Business Insider, Gigaom, and Wired and started her career as a newspaper designer for Gannett.

Sponsored Content

Great products are built on strong patents

Experts say robust intellectual property protection is essential to ensure the long-term R&D required to innovate and maintain America's technology leadership.

Every great tech product that you rely on each day, from the smartphone in your pocket to your music streaming service and navigational system in the car, shares one important thing: part of its innovative design is protected by intellectual property (IP) laws.

From 5G to artificial intelligence, IP protection offers a powerful incentive for researchers to create ground-breaking products, and governmental leaders say its protection is an essential part of maintaining US technology leadership. To quote Secretary of Commerce Gina Raimondo: "intellectual property protection is vital for American innovation and entrepreneurship.”

Keep Reading Show less
James Daly
James Daly has a deep knowledge of creating brand voice identity, including understanding various audiences and targeting messaging accordingly. He enjoys commissioning, editing, writing, and business development, particularly in launching new ventures and building passionate audiences. Daly has led teams large and small to multiple awards and quantifiable success through a strategy built on teamwork, passion, fact-checking, intelligence, analytics, and audience growth while meeting budget goals and production deadlines in fast-paced environments. Daly is the Editorial Director of 2030 Media and a contributor at Wired.
Fintech

Binance CEO wrestles with the 'Chinese company' label

Changpeng "CZ" Zhao, who leads crypto’s largest marketplace, is pushing back on attempts to link Binance to Beijing.

Despite Binance having to abandon its country of origin shortly after its founding, critics have portrayed the exchange as a tool of the Chinese government.

Photo: Akio Kon/Bloomberg via Getty Images

In crypto, he is known simply as CZ, head of one of the industry’s most dominant players.

It took only five years for Binance CEO and co-founder Changpeng Zhao to build his company, which launched in 2017, into the world’s biggest crypto exchange, with 90 million customers and roughly $76 billion in daily trading volume, outpacing the U.S. crypto powerhouse Coinbase.

Keep Reading Show less
Benjamin Pimentel

Benjamin Pimentel ( @benpimentel) covers crypto and fintech from San Francisco. He has reported on many of the biggest tech stories over the past 20 years for the San Francisco Chronicle, Dow Jones MarketWatch and Business Insider, from the dot-com crash, the rise of cloud computing, social networking and AI to the impact of the Great Recession and the COVID crisis on Silicon Valley and beyond. He can be reached at bpimentel@protocol.com or via Google Voice at (925) 307-9342.

Enterprise

How I decided to leave the US and pursue a tech career in Europe

Melissa Di Donato moved to Europe to broaden her technology experience with a different market perspective. She planned to stay two years. Seventeen years later, she remains in London as CEO of Suse.

“It was a hard go for me in the beginning. I was entering inside of a company that had been very traditional in a sense.”

Photo: Suse

Click banner image for more How I decided seriesA native New Yorker, Melissa Di Donato made a life-changing decision back in 2005 when she packed up for Europe to further her career in technology. Then with IBM, she made London her new home base.

Today, Di Donato is CEO of Germany’s Suse, now a 30-year-old, open-source enterprise software company that specializes in Linux operating systems, container management, storage, and edge computing. As the company’s first female leader, she has led Suse through the coronavirus pandemic, a 2021 IPO on the Frankfurt Stock Exchange, and the acquisitions of Kubernetes management startup Rancher Labs and container security company NeuVector.

Keep Reading Show less
Donna Goodison

Donna Goodison (@dgoodison) is Protocol's senior reporter focusing on enterprise infrastructure technology, from the 'Big 3' cloud computing providers to data centers. She previously covered the public cloud at CRN after 15 years as a business reporter for the Boston Herald. Based in Massachusetts, she also has worked as a Boston Globe freelancer, business reporter at the Boston Business Journal and real estate reporter at Banker & Tradesman after toiling at weekly newspapers.

Enterprise

UiPath had a rocky few years. Rob Enslin wants to turn it around.

Protocol caught up with Enslin, named earlier this year as UiPath’s co-CEO, to discuss why he left Google Cloud, the untapped potential of robotic-process automation, and how he plans to lead alongside founder Daniel Dines.

Rob Enslin, UiPath's co-CEO, chats with Protocol about the company's future.

Photo: UiPath

UiPath has had a shaky history.

The company, which helps companies automate business processes, went public in 2021 at a valuation of more than $30 billion, but now the company’s market capitalization is only around $7 billion. To add insult to injury, UiPath laid off 5% of its staff in June and then lowered its full-year guidance for fiscal year 2023 just months later, tanking its stock by 15%.

Keep Reading Show less
Aisha Counts

Aisha Counts (@aishacounts) is a reporter at Protocol covering enterprise software. Formerly, she was a management consultant for EY. She's based in Los Angeles and can be reached at acounts@protocol.com.

Latest Stories
Bulletins