Spot Fake Remote Workers Who Bypass Hiring and Security Checks 

Published
Written by:
Vishwa Pandagle
Vishwa Pandagle
Cybersecurity Staff Editor

Question: What behavioral signs, technical tricks, or tools are malicious remote workers using to appear legitimate during interviews, onboarding, and day-to-day work? Could you share real-world examples?


Brandon Dixon, CTO and Co-Founder of Ent AI

What makes these cases difficult is that the goal is not to “hack” an organization in the traditional sense. Their goal is to:

During interviews, the first signs are usually behavioral. Recruiters and hiring managers I’ve spoken with see candidates with:

In some cases, the interviewee's resume doesn’t match the role they’re applying for, or if it does, it looks highly suspicious. 

You’ll see inconsistencies in:

On calls, they can usually talk at a high level, but once you ask about implementation details or decisions they made in prior roles, things fall apart quickly.

This past year, I’ve personally interviewed over 200 candidates, and in several cases, I suspect I encountered fake IT workers. The Fortune 500 recruiters I speak with also say they encounter these cases regularly, describing about one or two suspicious candidates out of every few dozen interviews.

Our team has detected instances of this activity in enterprise environments, and have noticed that once hired, a common pattern is remote access abuse. In some situations, the person who interviewed for the role is not actually the person using the system day to day. 

The laptop gets farmed out through remote access software or even hardware KVM devices that let another person operate the machine remotely while still making the activity appear local.

We saw this play out with a US hospitality customer. Our team found several instances where employees used Zoom to hand control of their corporate systems to someone outside the organization. 

The pattern was the same each time: 

We were able to gather enough evidence that security teams could build a clear case and HR had what they needed to act on it. The signals show up behaviorally, which is much harder to catch. 

For example:

I think this is where a lot of security teams struggle. Most companies focus on malware, phishing attacks, and policy violations, but these cases involve legitimate credentials, approved tools, and activity that mostly looks like normal work. 

Historically, the assumption has been that if somebody authenticated successfully, they’re probably trustworthy. Remote work and these kinds of operations are starting to break that assumption.

That said, a few changes can help move the needle here. 

On the technical side:

None of this works, though, if the teams aren't collaborating across hiring and onboarding. 

Security can't catch it post-hire if HR and IT didn't share what they observed pre-hire. If a recruiter noticed something off in an interview or if IT flagged an unusual device during onboarding, it needs to be shared because once it surfaces as a security alert, the access may have been active for weeks.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: