Attackers Are Using Deepfakes to Snatch Remote IT Jobs
In the past few years, the technology sector has been plagued by recruitment concerns, including post-interview blurriness and bait-and-and-switch methods that damage both ends of a job lined up. Deepfake interviewees, on the other hand, pose a new threat, according to the FBI.
Table of contents
According To FBI
As per the agencyâs most recent PSA, many people are using deepfakes to assume the identities of others in order to get remote employment. Initially, the offender gathers enough confidential info on the victim to be able to credibly seek employment as that individual. For the next step, they get their hands on a few high-resolution images of the subject, either via theft or an internet search. For video interviews, the malicious person creates and deploys a deepfake that looks like the real thing using images and occasionally voice impersonating.
Jobs with exposure to âhighly sensitive knowledge,â âfinancial data, business IT systems and/or privileged dataâ are common targets for impersonating attempts, according to the FBI. A companyâs finances, the stock market, competitive goods, and services, or vast quantities of confidential information may all be jeopardized if such information was leaked.
Miscreants may not wish to stay in their wrongfully-won position long-term, but they may also want to make US dollars from outside the country or relish the privileges connected with a career they otherwise wouldnât be able to attain. Perhaps the impersonations are part of an even broader plot that might jeopardize national security.
We Donât Know If they Get Caught
Currently, itâs not known whether job candidates who impersonate others during an application are ever detected. In contrast to the two-way discourse characteristic of a hiring process, deepfakes tend to be one-directional rather than two-way. In an ideal world, a deepfake interlocutor would be detectable even to the unaided observer.
As for the rarely rushed employer, who may not notice an unnerving delay in the video feed or mistake it for an internet problem, thereâs also something to be argued for that. As a result, the âidealâ criminal opportunity may be created by combining technological competence with a little chance.
Despite the lack of precise advice from the FBI, the agency does caution that employers should be on the lookout for mismatched aural and visual cues. In these conversations, âthe motions and mouth motion of [the interviewee] on-camera does not properly synchronize with the sound,â states a PSA. âAt times, activities such as laughing, snorting, or other aural actions do not match what is seen visually.â


