The New Face of Candidate Fraud—and How Organizations Can Protect Against This Growing Threat
- Candidate fraud is increasingly sophisticated, with AI tools enabling impersonation, deepfakes, and identity manipulation.
- Organizations face financial losses, security breaches, and reputational damage as fraudulent workers infiltrate remote hiring processes.
- Many organizations don't have the internal infrastructure to manage this process, but there are options available to address it.
Family succession is a time-honored business tradition, but at MBO Partners we recently came across a very different spin on “like father, like son.”
At a recent conference, a company we spoke with shared how a routine engagement took an unexpected turn: The person who showed up to do the work wasn’t the person who had been vetted and contracted. A father had secured the role; his son stepped in to perform it. By the time anyone caught on, the unauthorized worker had embedded himself in critical workflows—and the damage was already done.
We’ve been hearing variations of this story across industries and around the world, and the pattern is becoming impossible to ignore: Organizations aren’t always engaging the person they believe they are. Recognizing how these schemes work is the first step to stopping them.
Common Forms of Candidate Fraud
Candidate fraud has come a long way. What once meant an exaggerated resume or a fabricated reference has evolved into a far more difficult challenge, fueled by AI-powered tools purpose-built to bypass modern hiring systems.
Remote work has accelerated this shift. It has opened the door to global talent—a genuine win for companies and highly skilled professionals—but it has also removed many of the in-person signals teams once relied on to confirm who they were bringing on board.
Today, candidate fraud shows up in several distinct ways. For example:
- Interview impersonation: One person handles the interview while another completes the work, often using real-time coaching, pre-recorded responses, or live assistance to pass technical screenings.
- AI-assisted responses: Candidates may rely on real-time AI tools during interviews or assessments to generate polished, knowledgeable answers, potentially masking their true skill level.
- Synthetic identities: Entire personas can be fabricated using stolen or blended personal data, including fake credentials, employment histories, and references that appear legitimate at first glance.
- Deepfakes and location fraud: According to a Resume Genius survey of 1,000 U.S. hiring managers, 17% reported interviewing candidates using deepfake AI, complete with lip-synced video and synthetic voices. In addition, some individuals use VPNs or IP spoofing to conceal their true location, often to bypass geographic restrictions, tax requirements, or security protocols.
- Credential sharing: A candidate who passes initial screening may hand off login credentials to another individual or team. In some cases, offshore workers complete the job without the organization’s knowledge.
Taken together, these tactics represent a coordinated and evolving threat. The consequences for organizations that aren’t prepared can be severe and wide-ranging.
The High Costs of Candidate Fraud
The FTC reports that job scam losses rose from $90 million in 2020 to more than $501 million in 2024. Within organizations, the fallout can include unauthorized access to internal systems, exposure of intellectual property, fraudulent payments, and manipulated invoices, along with lasting damage to a company’s reputation.
Financial loss is only one of the consequences. Last year, several Fortune 500 companies reported cases involving North Korean nationals posing as remote freelancers. These individuals passed interviews and onboarding checks, gained access to internal systems, and were later linked to data breaches and attempted extortion. U.S. officials warn these efforts are part of coordinated operations believed to fund cybercrime activities or weapons development programs.
Recent cases from the tech sector and related fields highlight just how advanced and persistent these schemes have become:
- Pindrop (voice security and identity verification): A recruiter flagged an applicant using deepfake and generative AI tools after noticing that facial movements didn’t match the audio during a video interview.
- BrightHire (interview intelligence software): CEO Ben Sesser reported a major surge in fraudulent applicants using AI—including candidates fabricating photo IDs, employment histories, and delivering AI-generated answers during video interviews, particularly in finance, tech, and healthcare.
- Malwarebytes (cybersecurity software): Their team detected waves of AI-generated resumes from fake applicants, identified by identical submissions across applications, mismatched interview details, and candidates claiming to live in one location while connecting from another.
These examples make one thing clear: If even high-tech companies are struggling to detect fraud, no industry is safe. At the same time, traditional screening methods are quickly falling behind and failing to keep up with today’s more aggressive threats.
How to Stop Candidate Fraud Before It Strikes
Many elements of traditional background checks were designed for a different era. Take fingerprinting, for example: It verifies identity at the start of an engagement but offers no visibility into what happens next. Someone could share credentials, outsource tasks, or even have another individual complete the work entirely.
Staying ahead of today’s threats requires consistent standards across roles, regions, and worker types, plus continuous verification embedded throughout the entire engagement lifecycle.
In practice, that means:
- Multi‑step identity verification across the application, interview, and onboarding stages to establish a consistent and reliable identity profile from the start.
- Biometric and liveness checks, such as facial recognition with liveness detection, to verify a worker’s physical presence and help reduce the risk of spoofed or synthetic identities.
- Location and access checks, such as IP monitoring, along with detection of anonymizing tools like VPNs, to flag inconsistencies where location transparency is needed.
- Device and behavior‑based monitoring that analyzes patterns such as device fingerprints, login times, and usage behavior to flag anomalies and trigger additional verification when risk thresholds are exceeded.
- Ongoing verification touchpoints help maintain consistency across the entire engagement lifecycle by confirming identity at every stage to ensure the person who interviewed is the same one delivering the work.
- Human oversight complements these tools, with experienced reviewers available to handle edge cases, interpret nuance, and step in with sound judgment where automation falls short.
Building a Culture of Compliance in Your Organization
The right tools and systems matter, but they’re only part of the equation. Real results come from how teams operate day to day, guided by clear expectations and shared accountability. The most effective organizations don’t treat compliance as a one-time task; they build it into their culture.
Here are a few ways to establish strong systems and processes across your organization:
Audit your current processes
Onboarding is a starting point, not a finish line. Evaluate where identity verification could break down over time and introduce ongoing validation across the full engagement lifecycle.
Equip your team with proper training and education
Ensure hiring managers, recruiters, and compliance teams know how to identify modern fraud tactics, including AI-assisted interviews and impersonation schemes. Ongoing training helps everyone stay prepared as these tactics evolve.
Establish clear policies and accountability
Document your standards for identity verification, contractor oversight, and escalation procedures so everyone knows what’s expected. Assign clear ownership across teams to ensure those standards are followed.
Create clear reporting channels
Give talent engagement leaders and managers a clear, simple way to flag suspicious behavior. A convenient process for raising concerns helps ensure issues are escalated quickly and not overlooked.
Evaluate your partners and tools
Assess whether your vendors and platforms can detect sophisticated, tech-enabled fraud or whether they’re still relying on outdated methods. If they aren’t keeping pace with modern threats, it may be time to reconsider those partnerships.
Next Steps for Your Organization
Many organizations don’t have the internal infrastructure to manage this process or simply prefer to rely on a trusted partner. MBO Partners works with clients across industries and around the globe to reduce administrative burden for their teams while strengthening confidence in their security posture.
At MBO Partners, compliance is built into every part of our service model. That includes our dedicated Anti-Impersonation Service, which pairs advanced technology with expert human review to go beyond standard checks.
Behind the scenes, our teams evaluate more than 40 data points in combination—ranging from network infrastructure and device consistency to worker behavioral patterns—so high-risk activity is flagged before it becomes an issue. They are trained to identify and escalate only well-substantiated fraud cases, while managing dispute resolution and follow-through. The result is rigorous verification that keeps your organization secure without slowing it down.
To learn more, visit our Anti-Impersonation Service page and then check out this case study on how we helped a Big Four professional services network complete 6,500+ identity verifications and achieve 100% risk mitigation for their contingent workforce.
Categories
Subscribe to the Insights blog to get weekly insights on the next way of working
Need high quality talent fast? ITN delivers top talent with verified skills and expertise
Learn more about MBO
Are you independent talent?
Learn how to start, run and grow your business with expert insights from MBO Partners
Are you an enterprise?
Learn how to find, manage and retain top-tier independent talent for your independent workforce.
Data driven reports
MBO Partners publishes influential reports, cited by government and other major media outlets.
Informed insights
Research and tools designed to uncover insights and develop groundbreaking solutions.

