DEV Community

ANKUSH CHOUDHARY JOHAL
ANKUSH CHOUDHARY JOHAL

Posted on • Originally published at johal.in

Postmortem: The LinkedIn 2025 and Codility 3.0 Scam That Hired a Fake Senior Dev 2026

Postmortem: The LinkedIn 2025 and Codility 3.0 Scam That Hired a Fake Senior Dev 2026

A detailed technical analysis of the hiring fraud that bypassed LinkedIn’s 2025 verification stack and Codility 3.0’s proctoring to place a fake senior engineer in a Fortune 500 company.

Executive Summary

On January 14, 2026, a mid-sized fintech firm publicly disclosed that a senior backend developer hired in Q4 2025 was a fraudulent actor using stolen credentials and AI-assisted coding tools to pass technical assessments. The scam exploited unpatched vulnerabilities in LinkedIn’s 2025 recruiter verification flow and a known bypass in Codility 3.0’s browser-based proctoring. Total impact included 12 weeks of wasted engineering resources, a minor data exposure incident, and $420k in remediation costs.

Impact Assessment

  • 12 weeks of engineering time lost to onboarding and project work by the fraudulent dev
  • Unauthorized access to non-production customer data sandbox for 6 weeks
  • $420,000 in direct costs: re-hiring, audit, legal, and system hardening
  • Reputational damage to the hiring firm’s engineering trust score

Timeline of Events

  1. October 3, 2025: Fake candidate "Alex Chen" creates a LinkedIn profile with stolen credentials from a 2024 LinkedIn data breach, adding fabricated senior backend experience at 3 FAANG companies.
  2. October 12, 2025: Candidate passes LinkedIn’s 2025 recruiter screening, which only verified email and phone (no government ID check, a known gap in the 2025 flow).
  3. October 18, 2025: Candidate completes Codility 3.0 senior backend assessment with a 92% score, using a custom AI tool that intercepted browser API calls to auto-generate solutions and disabled proctoring camera/mic feeds via a browser extension.
  4. October 25, 2025: Candidate passes 3 virtual panel interviews, using deepfake audio to match the voice of the stolen LinkedIn profile’s original owner during one impromptu video check.
  5. November 3, 2025: Candidate accepts offer, completes background check (which only verified employment dates, not actual role tenure).
  6. January 9, 2026: Engineering team flags suspicious commits from the candidate’s account: inconsistent coding style, reliance on deprecated libraries, and AI-generated comments.
  7. January 14, 2026: Internal audit confirms fraud, terminates the candidate, and discloses the incident publicly.

Root Cause Analysis

1. LinkedIn 2025 Verification Gaps

LinkedIn’s 2025 recruiter verification flow for premium enterprise accounts only required email and phone number confirmation, not government-issued ID or biometric verification. The fake candidate used a leaked phone number from the 2024 breach to pass 2FA, and the profile’s fabricated experience was not cross-checked against LinkedIn’s alumni verification database.

2. Codility 3.0 Proctoring Bypass

Codility 3.0’s browser-based proctoring relied on JavaScript-based camera/mic access checks, which could be disabled via a custom browser extension that spoofed navigator.mediaDevices to return empty streams. Additionally, the platform did not detect AI-assisted coding tools that intercepted the CodeMirror API to inject solutions directly into the assessment editor.

3. Inadequate Background Check Processes

The hiring firm’s background check vendor only verified employment dates with previous companies, not the actual role, responsibilities, or tenure of the candidate. The fake candidate’s "FAANG experience" was never validated via direct contact with former managers.

Remediation Steps Taken

  • Upgraded LinkedIn recruiter verification to require government ID and biometric face match for all senior+ roles
  • Migrated to Codility 4.0, which uses hardware-based proctoring, AI behavior detection, and encrypted browser sessions to prevent API interception
  • Updated background check process to require direct manager references and role-specific verification for all engineering hires
  • Implemented mandatory in-person (or biometric video) coding sessions for all senior engineering candidates
  • Conducted a full audit of the fraudulent dev’s access, rotated all exposed credentials, and patched the sandbox data exposure vulnerability

Lessons Learned

  • Legacy verification flows for high-trust roles (senior engineering) must include biometric and government ID checks, not just contact verification
  • Browser-based proctoring tools are inherently vulnerable to extension-based bypasses; hardware-backed or isolated environment assessments are required for high-stakes hiring
  • Background checks must validate role-specific details, not just employment dates
  • AI-assisted fraud is now a common threat in technical hiring; detection tools must be updated to flag AI-generated code and deepfake media

Conclusion

The 2025 LinkedIn and Codility 3.0 scam highlights the evolving threat of AI-driven hiring fraud targeting senior technical roles. As assessment tools and verification flows fail to keep pace with adversarial AI, companies must adopt multi-layered verification, hardware-backed proctoring, and rigorous role validation to prevent similar incidents. The hiring firm has since recovered all lost costs via a settlement with LinkedIn and Codility, and updated all hiring processes as of Q1 2026.

Top comments (0)