News & Events

Two Men Sentenced in Stolen Identity Remote Hiring Scheme

stolen identity

Federal authorities recently uncovered a long-running scheme involving two New Jersey men linked to efforts that helped fund North Korea’s weapons of mass destruction programs. The operation involved overseas IT workers who used stolen identities of U.S. individuals to obtain remote positions with American companies.

These workers were able to pose as legitimate domestic employees while gaining access to corporate systems, including roles at major Fortune 500 companies and firms operating in sensitive industries.

According to federal authorities, U.S. based facilitators played a key role in enabling the fraud by creating fake business entities, managing shipments and hosting of company issued laptops, and setting up remote access tools designed to conceal the true location of the workers. In some cases, these arrangements allowed unauthorized individuals to gain access to internal systems and sensitive company data after onboarding.

Over time, the scheme exposed serious vulnerabilities in remote hiring practices and identity verification controls, as fraudulent workers were successfully integrated into U.S. company environments under false identities.

Stolen Identity

This case reflects a growing trend in hiring fraud where the primary risk is no longer limited to falsified resumes, but has expanded into full scale identity fraud.

Beyond concerns of exaggerated experience, employers are now experiencing threats such as:

  • Stolen or entirely fabricated personal identities
  • Remote work setups that avoid in person identity verification
  • Ability to bypass screening or verification processes

Remote hiring significantly increases fraud risk due to the lack of face-to-face interaction, making it easier for individuals to present themselves as legitimate candidates without ever being physically verified.

Organizational Risk

The impact of fraud extends far beyond simple hiring deception. In cases like this, organizations can face significant financial losses from wages paid to fraudulent employees, as well as exposure of sensitive company data, including proprietary systems and technical information. These situations can also lead to cybersecurity breaches, particularly when unauthorized individuals are granted access to internal networks.

In addition, companies may experience operational disruption that requires costly remediation efforts and system audits. In more severe cases, especially those involving defense-related or regulated data, there can even be national security implications. Ultimately, the risk to employers is not limited to hiring the wrong individual, it can escalate into data compromise, regulatory exposure, and long-term reputational damage.

Background Screening Fraud Technologies

This case reinforces the importance of conducting thorough background screening throughout the hiring process. Even when criminal history checks, employment verification, and credential validation are completed, those measures can be compromised if the applicant’s underlying identity information is falsified or incorrect.

New background screening technology, such as biometric identity verification, adds an additional layer of protection by helping confirm that the individual applying for the role is truly who they claim to be. This is especially critical for remote positions, where candidates may never meet employers in person, making traditional verification methods more challenging.

Employer Guidance

As identity fraud becomes more prevalent in hiring, it is increasingly important for employers to strengthen key areas of their screening and hiring processes.

Identity Verification – Implementing more robust verification methods helps ensure that candidates are who they claim to be before onboarding begins.

Monitor Red Flags – Paying close attention to inconsistencies in personal information, unusual access patterns, or discrepancies in location can help identify potential warning signs.

Continuous Monitoring – Post hire monitoring or periodic re-verification, especially in sensitive roles, can help detect and prevent risks that may emerge after employment has started.

Partnering with an accredited background screening provider that offers advanced protective technologies is essential to strengthening the overall screening process.

Click here for more information.

GIS recognizes that fraud continues to evolve, which is why we are committed to continuously enhancing our solutions to help protect our clients and their organizations. If you would like to discuss your current background screening process or preventative measures, please contact us.

Recent Posts