REPORT: KuppingerCole: Leadership Compass Identity Verification
Access Now

Addressing AI-Enabled Hiring Fraud: The Remote Work Identity Challenge

Erica West

Hiring fraud is in the news. Google recently announced it’s bringing back in-person job interviews, citing concerns about AI cheating during technical assessments. But there’s a bigger issue lurking beneath the surface: how do companies verify that the identity of the person who applied, interviewed remotely, and got hired is actually the same and is who they claim to be?

This identity verification challenge has created an opening that sophisticated fraud networks and state-sponsored actors are actively exploiting. The US government has recognized the serious issue of North Korean operatives successfully impersonating American tech workers, securing remote positions and gaining access to sensitive corporate systems.

The Scale of the Problem

According to the Federal Trade Commission, financial losses from job and employment scams have exploded from $90 million in 2020 to more than $501 million in 2024, a staggering 456% increase that signals the emergence of hiring fraud as a major profit center for organized criminal networks.

These financial losses, while significant, represent only the measurable impact. The broader concern is operational disruption, intellectual property theft, and potential access to sensitive systems that could compromise business operations or customer data.

How Modern Hiring Fraud Works

Today’s hiring fraud has evolved beyond simple resume padding. We’re witnessing the emergence of “synthetic identities,” completely fabricated personas backed by AI-generated credentials, deepfake technology, and sophisticated social engineering.

AI-Powered Identity Fabrication

Modern fraud networks deploy AI tools that can generate convincing resumes and cover letters in minutes. More concerning, they’re using deepfake technology to mask fraudsters’ appearances and voices during video interviews, creating personas that can pass human scrutiny while bypassing traditional verification methods.

These aren’t isolated incidents. According to Google’s Mandiant threat intelligence team, one American facilitator working with North Korean IT workers “compromised more than 60 identities of U.S. persons, impacted more than 300 U.S. companies, and resulted in at least $6.8 million of revenue” over just three years. The report notes it’s “not uncommon for a DPRK IT worker to be working multiple jobs at once, pulling in multiple salaries on a monthly basis.”

The Challenges with Current Hiring Processes

The very technologies designed to streamline hiring (automated applicant screening, virtual interviews, and rapid onboarding) have become tools that sophisticated adversaries exploit at unprecedented scale.

The traditional hiring trust model, built on static documents, phone interviews, and the assumption that remote workers are who they claim to be, has proven insufficient in an era of AI-enabled deception.

Moving Beyond Point Solutions: The Identity Assurance Approach

Most cybersecurity vendors are approaching hiring fraud with the same mindset they apply to email phishing or malware detection as a point-in-time problem requiring better filters. But hiring fraud isn’t just a detection problem; it’s an identity assurance challenge.

Current solutions fall into two categories: applicant filters that optimize recruitment by culling suspicious applications, and breach prevention tools that try to catch infiltrators before they access sensitive systems. Both approaches treat symptoms while ignoring the root cause: the absence of a verifiable, persistent digital identity foundation.

How 1Kosmos Addresses Identity Assurance

1Kosmos has developed a different approach to this challenge, one that establishes verified identity proofing at the very first interaction and maintains that assurance throughout the entire employee lifecycle.

Our platform’s LiveID technology performs real-time liveness detection while cross-referencing live biometrics with verified government-issued credentials from issuing authorities. This creates a triangulation of identity claims that is exponentially more difficult for synthetic identities or deepfakes to spoof than traditional document-plus-selfie verification methods.

Continuous Identity Assurance Beyond Hiring

The value of true identity assurance extends beyond initial hiring decisions. Once an employee’s digital identity is established through the 1Kosmos platform, it becomes the foundation for every subsequent authentication, access request, and sensitive transaction throughout their tenure.

While point solutions focus exclusively on the hiring moment, 1Kosmos provides continuous identity-backed security. This addresses an important gap in most security strategies: the reality that threats don’t end once someone is hired. Account takeovers, insider threats, and credential compromise can still occur unless there’s a persistent, biometrically-backed identity foundation preventing them.

Building the Identity Foundation for Modern Workforce Security

The hiring fraud challenge represents more than a cybersecurity issue. It’s a trust challenge that requires organizations to rethink how they establish and maintain confidence in their workforce’s identity.

Companies can no longer afford to treat identity as a point-in-time checkbox in their security strategy. In an environment where sophisticated adversaries can manufacture convincing digital personas and nation-state actors are actively infiltrating American businesses through fraudulent hiring, identity assurance must become the foundational layer upon which all other security measures are built.

1Kosmos addresses hiring fraud by:

  • Establishing Trust on First Use: Securely onboarding new hires with high-assurance, government-verified identity proofing
  • Maintaining Trust Continuously: Providing continuous monitoring and persistent identity assurance for every login, access request, and sensitive operation
  • Empowering User Control: Making employees partners in their own security by giving them control over their identity data
  • Future-Proofing the Enterprise: Creating a zero-trust foundation that protects against the full spectrum of identity-based threats

Looking Forward: Evolution in Identity Security

As AI-powered deception capabilities continue to advance and organized fraud networks become increasingly sophisticated, companies face an important choice: evolve their identity assurance strategies or remain vulnerable to an escalating threat.

The companies that recognize identity as the new security perimeter and invest in platforms that provide verified identity assurance rather than point-in-time fraud detection will gain a significant advantage in both security and talent acquisition.
The question isn’t whether your organization will encounter hiring fraud. The question is whether you’ll detect it before it impacts your business, or better yet, prevent it entirely by building your workforce on a foundation of verified, persistent digital identity.

Is your organization prepared for the next wave of AI-enabled hiring fraud? Discover how 1Kosmos provides the identity foundation your workforce security strategy needs. Watch a Demo

Overcoming Resistance to Change on the Journey to Passwordless MFA
Read More

Expert Insights in Your Inbox

Subscribe to the blog
Meet the Author

Erica West

Director of Product Marketing

Erica West is the Director of Product Marketing at 1Kosmos, where she drives messaging, positioning, and content strategy for identity verification and passwordless authentication solutions. With a background spanning cybersecurity, fraud prevention, and digital identity, she translates complex technical capabilities into impactful stories that resonate with security leaders. Erica holds an MBA and has worked closely with teams across sectors to modernize their approach to authentication and access management.

Go Passwordless with Verified Identity

1Kosmos is the only MFA solution that combines indisputable digital identity proofing with advanced biometrics and passwordless authentication.