www.helpnetsecurity.com Open in urlscan Pro
54.71.215.219  Public Scan

Submitted URL: http://www.helpnetsecurity.com/2024/11/26/employment-fraud-red-flags//
Effective URL: https://www.helpnetsecurity.com/2024/11/26/employment-fraud-red-flags/
Submission: On December 08 via api from RU — Scanned from IS

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - editor's choice selection of topics (twice per month)</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1733618545"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content


Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open
source – subscribe here!



 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Ryan LaSalle, CEO, Nisos
November 26, 2024
Share


HOW TO RECOGNIZE EMPLOYMENT FRAUD BEFORE IT BECOMES A SECURITY ISSUE



The combination of remote work, the latest technologies, and never physically
meeting your employees has made it very easy for job applicants to mask their
true identities from their employer and commit employment fraud.



Motivations for this type of fraud vary, so it’s essential to start by quickly
reviewing the key forms that employment fraud can take:

 * Nation-state or criminal organization fraud, where employees infiltrate an
   organization to gain access to systems, data, or payroll (to conduct future
   nefarious actions), to skirt sanctions, or to find other means of money
   laundering.
 * Identity fraud, where applicants create false identities to hide who they
   really are.
 * Outsourced work, where employees outsource their jobs to gig workers or
   others who will complete their tasks for a fee, outside of corporate policy.
 * Polywork, or working several full-time jobs at the same time, without the
   knowledge or approval of their employers.

These types of fraud have become more prevalent over the past couple of years.


RED FLAGS OF EMPLOYMENT FRAUD

Security teams need to recognize the red flags of employment fraud to prevent it
before it can have a negative impact. At the same time, it’s essential that
teams do not jump to conclusions if something seems off. The past few years have
encouraged acceptance of people that work differently, which is excellent but
has also created an opening for others to exploit.

Let’s look at what some of those red flags are in more detail:

Differing skill sets – Potential employees often claim to have experience
developing web and mobile applications, knowledge of multiple programming
languages, and an understanding of blockchain technology.

However, after new employees are onboarded, it is quickly discovered that they
do not have all the expertise or skills described in their resume and interview.
This can be the first sign that a larger issue may require monitoring.

Employee information inconsistencies – There are several ways in which
inconsistencies can be brought to light. For instance, a common trait of workers
committing fraud is that they update their mailing address just after accepting
a job, but prior to equipment being shipped to them. This indicates that the
identity and information provided during the hiring process could have been
stolen.

Some other common employee information anomalies to look for include potential
employees that have several accounts with the same name and photo associated
with different physical locations, some of which are abroad. Or even simply that
photos of the same individual were used to create multiple, different personas.

Lack of personal content – Potentially fraudulent employees also are very
thorough at making sure there are relevant accounts connected to the personas
they have established. There are typically recent accounts on employment
websites, IT industry-specific freelance contracting platforms, with software
development tools and platforms, and on common messaging applications.

But these same personas lack social media accounts or any personal content, and
the relevant accounts only contain minimal information, suggesting that the
accounts have been created solely for the purpose of acquiring employment, and
that some of the resume content and experience statements were likely copied
from real individuals in the IT industry.


WAYS TO PREVENT EMPLOYMENT FRAUD

Successful employment fraud investigations rely on OSINT and internal
investigation components. Collaborations between the security, legal, and HR
teams often occur, especially as suspicions escalate. As we’ve investigated
fraud for clients, we’ve discovered widespread tactics, techniques and
procedures (TTPs) that are repeated – especially by those committing employment
fraud who are connected to a nation-state or criminal organization.

With those in mind, below are some procedures that can be implemented at your
organization to help identify existing employment fraud and prevent new fraud
from happening:

Visual check – One of the first areas to address is applicant screening. In the
name of efficiency and kindness, many organizations have been understanding when
a job applicant could not meet in person or was “off-camera” because of a family
issue or illness. One of the easiest ways to ensure the applicant is who they
say they are is to insist that the interview process involves an on-camera
and/or in-person interview. With the rise of deepfake technology, we expect
visual checks will be less straightforward soon.

Check for accurate documentation – Organizations should ensure that the job
applicant provides identification documentation in-person. This can make it
easier to identify falsehoods and deter any who may have fabricated a persona.
Companies without a physical presence or hiring fully remote workforces will
need to look at other measures to achieve this.

Review publicly available information – Conduct a detailed review of the job
applicant’s online presence, both on relevant work sites, and on personal
destinations. Look for consistency in name, appearance, work history, education,
and physical location. Ask about any inconsistencies – and don’t take no for an
answer. The lack of any information outside of relevant work accounts can also
be indicative of a problem.

Conduct a thorough reference check – Collect and retain all contact information
for the references given by a job applicant. Take the time to verify prior
employment.

A few everyday actions of fraudulent applicants are to have the references be
the same individual with different contact information, or for them to be
connected to the same network of people as the job applicant. Another common
trait is that references may not want to appear on camera if requested – and
their answers are kept brief and/or provide no real contextual information on
how they supervised or worked with the job applicant. This is a sign of a
problem.

In addition, applicants will often list significant companies in their
employment history, both to inflate their experience and to deter the hiring
organization from contacting their provided references. Contact them.

Confirm identity during onboarding – Once an employee has passed the screening
process and is hired, take the opportunity to verify their identity one more
time by requiring mandatory in-person onboarding and/or that they show up in
person to obtain necessary equipment.

It is very common for an individual committing employment fraud to ask for a
laptop, for example, to be shipped to a different address than what was listed
on the documents provided during the application process. The reasoning
typically is that they have moved or have temporarily relocated. When this red
flag comes up, immediately research that new address to verify that it is indeed
linked to the individual and doesn’t belong to a third party (who may or may not
be in on the fraud).

Using that “spidey-sense” – Sometimes everything looks correct, and there just
might be a slight feeling that something is off. It’s easy to talk yourself or
your team out of worrying that there is a problem, especially as sometimes those
working in the technology and related fields have the reputation of being
introverted or of simply keeping to themselves. And you could quickly find out
that it was incorrect of you to be suspicious. But it’s worth taking a few easy,
non-intrusive steps to follow up on that feeling.

Search for language on their resume – many fraudulent actors have been known to
copy and use sections of a resume as their own. Some even copy the whole resume,
or the descriptions of work experiences, verbatim. Image searches can also be a
valuable tool. If you find multiple personas online with the same image – and
not necessarily the same information – it’s time to flag that applicant.

Don’t go it alone – Many teams lack the experience or tools to perform much of
this external validation effectively and find that partners can help with
external research, while respecting the candidate’s privacy and protecting the
company’s interests.

It’s well-known that employment fraud is dangerous – it can lead to data leaks,
reputational harm, and operational disruption. Many organizations assume that
they’re too small for this to be an issue, or that they’d be able to spot and
call out any fraud immediately. Unfortunately, the modern workplace structure
makes it even easier for nefarious actors to be successful.

Recent actions by North Korean job applicants have put the spotlight on an issue
that comes in a few different varieties, but can still spell disaster for a
company. By recognizing the red flags, improving the vetting and onboarding
processes for job applicants, and embracing open-source intelligence as a part
of your investigation, you can stop employment fraud in its tracks.





More about
 * cybercrime
 * cybersecurity
 * fraud
 * Nisos
 * opinion

Share


FEATURED NEWS

 * Windows, macOS users targeted with crypto-and-info-stealing malware
 * December 2024 Patch Tuesday forecast: The secure future initiative impact
 * Building a robust security posture with limited resources

How to leverage the 2024 MITRE ATT&CK Evaluation results



RESOURCES

 * Download: The Ultimate Guide to the CCSP
 * Whitepaper: 9 traits of effective cybersecurity leaders of tomorrow
 * Download: The Ultimate Guide to the CISSP
 * Whitepaper: Securing GenAI
 * Report: Voice of Practitioners 2024 – The True State of Secrets Security




DON'T MISS

 * Resecurity introduces AI-powered GSOC at NATO Edge 2024
 * Windows, macOS users targeted with crypto-and-info-stealing malware
 * How to choose secure, verifiable technologies?
 * December 2024 Patch Tuesday forecast: The secure future initiative impact
 * Building a robust security posture with limited resources




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - editor's choice selection of topics (twice per month)
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×