•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Impersonators are increasingly using AI to refine job profiles, pass interviews, and obtain remote access to corporate systems, creating an internal security risk that many organizations fail to recognize until after damage occurs. The problem spans both large and small employers, with remote recruitment processes being exploited to insert “internal threats” through fake hiring.
Security director Steve Schmidt warned that the scale of attempts to seize IT roles is growing. Amazon said it has blocked more than 1,800 attempts to take IT positions, and Schmidt cautioned that the figure continues to rise. In some cases, individuals impersonating Americans seek personal profit. More serious cases involve international agents using IT impersonation for political and financial objectives.
According to Tom Hegel of SentinelOne, this is not traditional recruitment fraud. It is an internal risk problem in which adversaries aim to be hired as the first step in an intrusion. AI technology can also support deepfake videos and highly convincing online interview sessions, making identity verification difficult when adversaries can change identity rapidly.
SentinelOne previously tracked about 360 fake identities tied to more than 1,000 job applications, including cases where some applicants attempted to apply to the security company itself. Hegel said bad actors use large-scale psychological tactics and identity concealment, turning remote recruitment into a gateway for attacks.
Investigations cited in the report indicate that HR servers were infected with malware. The attackers also use “laptop farms” to operate company devices from afar across borders. Once hired, they gain access and become trusted internal staff, increasing the risk of long-term exposure of sensitive data.
The report describes an example from a MongoDB investigation supervised by George Gerchow, which began with a warning that someone was trying to remove security software. Gerchow said the Overwatch system detected a new employee’s laptop communicating with an IP abroad. He described the combination of tampering with security tools and unusual traffic as a red flag.
In that case, the individual used a stolen identity combined with an AI-generated profile. Surface-level background checks failed because they did not detect the underlying fraud, and Gerchow emphasized that many checks cannot reveal a history of fabricated work. The investigation later found that no data was stolen or leaked.
The report notes that minor anomalies may be treated separately, allowing the pattern to go unnoticed until security alerts trigger in unison. When that happens, security teams can isolate devices, revoke access, and report to federal authorities.
Gartner forecasts that by 2028, one in four candidate profiles will be fake. The report characterizes this as a “pandemic” targeting global enterprises quietly, with criminals often focusing on highly technical roles.
David Weisong, CIO of Energy Solutions, said adversaries frequently target roles such as DevOps or database administration because they hold control of systems. “These roles hold the keys to the castle,” Weisong said, adding that infiltration value can exceed that of a typical programmer.
One early warning sign described in the report is a sudden spike in applications—hundreds within a few hours can indicate automated, bot-driven activity. The report also notes that fake employees may perform well, meaning detection may rely more on technical signals than on day-to-day work performance.
To counter these threats, Amazon uses AI alongside human review to scrutinize profiles, requires more in-person interviews, and asks employees to come to the office. Hegel suggested treating recruitment as an access-control issue rather than a one-off personnel check, arguing that identity should be treated like the highest level of security clearance rather than a routine HR step.
Weisong concluded that trust must be built gradually through stages, and that IT leadership should work closely with HR to build robust security barriers.
Source: CIO
Premium gym chains are entering a “golden era” that is ending or already in decline, as rising operating costs collide with shifting consumer preferences toward more flexible, community-based ways to exercise. Long-term memberships are shrinking, margins are pressured by higher rents and facility expenses, and competition from smaller, more personalized…