DEV Community

Cover image for The Interview Looked Real — The Candidate Wasn’t
HelixCipher
HelixCipher

Posted on

The Interview Looked Real — The Candidate Wasn’t

Reporting from Unit 42 highlights a growing tactic in state-linked intrusion campaigns: the use of real-time deepfakes to create synthetic candidate identities during remote job interviews. Researchers found the technique can be produced with consumer tools and modest hardware in roughly an hour, enabling operators to interview multiple times under different personas and reduce the chance of being added to internal watchlists.

Unit 42 ties this method to long-documented recruitment schemes by North Korean IT operatives aimed at infiltrating Western organizations for espionage and other malicious activity. The technique’s practicality was demonstrated in multiple incidents where employers nearly hired non-existent candidates; in at least one case, a contractor later loaded malware onto a corporate workstation after being onboarded.

Key operational advantages for attackers included reusing a single operator across many applications by changing their synthetic persona, and avoiding straightforward identification via video. Unit 42’s experiments show even low-skill operators can assemble convincing real-time feeds from generated faces, simple wardrobe/background changes, and a virtual webcam. For talent teams and security functions, the article recommends several practical mitigations:

• Record interviews and retain footage for forensic review when suspicious indicators appear.

• Implement identity-verification workflows before onboarding (ID/document checks, live verification tied to validated phone numbers).

• Log application and interview IPs and flag anonymity services or unexpected geolocations.

• Cross-check phone numbers and email domains for common VoIP/obfuscation providers and integrate hiring pipelines with ISACs or trusted feeds to share indicators.

Technical teams can also train interviewers to spot artifacts of real time synthesis temporal inconsistencies, lighting/occlusion glitches, AV lip sync issues and ensure privileged access is gated behind multiple verification steps rather than granted at onboarding.

Top comments (0)