{"id":47360,"date":"2022-07-01T17:01:34","date_gmt":"2022-07-01T17:01:34","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/criminals-deepfake-video-interview-remote-work"},"modified":"2022-07-01T17:01:34","modified_gmt":"2022-07-01T17:01:34","slug":"criminals-use-deepfake-videos-to-interview-for-remote-work","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/","title":{"rendered":"Criminals Use Deepfake Videos to Interview for Remote Work"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Security experts are on the alert for the next evolution of social engineering in business settings: deepfake employment interviews. The latest trend offers a glimpse into the future arsenal of criminals who use convincing, faked personae&nbsp;against business users to steal data and commit fraud.<\/p>\n<p>The concern comes following a new advisory this week from the FBI Internet Crime Complaint Center (IC3), which&nbsp;warned of increased activity from fraudsters trying to game the online interview process for remote-work positions. The advisory said that criminals are using a combination of deepfake videos and stolen personal data to misrepresent themselves and gain employment in a range of work-from-home positions that include information technology, computer programming, database maintenance, and software-related job functions. <\/p>\n<p>Federal law-enforcement officials said in the advisory that they\u2019ve received a rash of complaints from businesses.<\/p>\n<p>\u201cIn these interviews, the actions and lip movement of the person seen interviewed on-camera do not completely coordinate with the audio of the person speaking,\u201d <a href=\"https:\/\/www.ic3.gov\/Media\/Y2022\/PSA220628\">the advisory said<\/a>. \u201cAt times, actions such as coughing, sneezing, or other auditory actions are not aligned with what is presented visually.\u201d<\/p>\n<p>The complaints also noted that criminals were using stolen personally identifiable information (PII)&nbsp;in conjunction with these fake videos to better impersonate applicants, with later background checks digging up discrepancies between the individual who interviewed and the identity presented in the application.<\/p>\n<h2 class=\"regular-text\">Potential Motives of Deepfake Attacks<\/h2>\n<p>While the advisory didn\u2019t specify the motives for these attacks, it did note that the positions applied for by these fraudsters were ones with some level of corporate access to sensitive data or systems.<\/p>\n<p>Thus, security experts believe one of the most obvious goals in deepfaking one&#8217;s way through a remote interview is to get a criminal into a position to infiltrate an organization for anything from corporate espionage to common theft.<\/p>\n<p>\u201cNotably, some reported positions include access to customer PII, financial data, corporate IT databases and\/or proprietary information,\u201d the advisory said.<\/p>\n<p>\u201cA fraudster that hooks a remote job takes several giant steps toward stealing the organization\u2019s data crown jewels or locking them up for ransomware,\u201d says Gil Dabah, co-founder and CEO of Piiano. \u201cNow they are an insider threat and much harder to detect.\u201d<\/p>\n<p>Additionally, short-term impersonation might also be a way for applicants with a \u201ctainted personal profile\u201d to get past security checks, says DJ Sampath, co-founder and CEO of Armorblox.&nbsp;<\/p>\n<p>\u201cThese deepfake profiles are set up to bypass the checks and balances to get through the company&#8217;s recruitment policy,&#8221; he says.<\/p>\n<p>There\u2019s potential that in addition to getting access for stealing information, foreign actors could be attempting to deepfake their way into US firms to fund other hacking enterprises. <\/p>\n<p>\u201cThis FBI security warning is one of many that have been reported by federal agencies in the past several months. Recently, the US Treasury, State Department, and FBI<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__www.wired.com_story_north-2Dkorean-2Dit-2Dscammer-2Dalert_&amp;d=DwMFaQ&amp;c=euGZstcaTDllvimEN8b7jXrwqOf-v5A_CdpgnVfiiMM&amp;r=p_UJ_Xdk47eo4-L_r-PwMQ&amp;m=f48N_wQpY-JQ4uXU8XYGj3JB-eS3FtauHQJnVo6Q3EM&amp;s=Cl-5KgJw01CEfz6YE6PlxFvgKXtIQt5FzF4vlYifOEc&amp;e=\" target=\"_blank\" rel=\"noopener\"> released<\/a> an official warning indicating that companies must be cautious of North Korean IT workers pretending to be freelance contractors to infiltrate companies and collect revenue for their country,\u201d explains Stuart Wells, CTO of Jumio. \u201cOrganizations that unknowingly pay North Korean hackers potentially face legal consequences and violate government sanctions.\u201d<\/p>\n<h2 class=\"regular-text\">What This Means for CISOs<\/h2>\n<p>A lot of the deepfake warnings of the past few years have been primarily around political or social issues. However, this latest evolution in the use of synthetic media by criminals points to the increasing relevance of deepfake detection in business settings. <\/p>\n<p>\u201cI think this is a valid concern,\u201d says Dr. Amit Roy-Chowdhury, professor of electrical and computer engineering at University of&nbsp;California at Riverside. \u201cDoing a deepfake video for the duration of a meeting is challenging and relatively easy to detect. However, small companies may not have the technology to be able to do this detection and hence may be fooled by the deepfake videos. Deepfakes, especially images, can be very convincing and if paired with personal data can be used to create workplace fraud.\u201d<\/p>\n<p>Sampath warns that one of the most disconcerting parts of this attack is the use of stolen PII to help with the impersonation. <\/p>\n<p>\u201cAs the prevalence of the DarkNet with compromised credentials continues to grow, we should expect these malicious threats to continue in scale,\u201d he says. \u201cCISOs have to go the extra mile to upgrade their security posture when it comes to background checks in recruiting. Very often these processes are outsourced, and a tighter procedure is warranted to mitigate these risks.\u201d<\/p>\n<h2 class=\"regular-text\">Future Deepfake Concerns<\/h2>\n<p>Prior to this, the most public examples of criminal use of deepfakes in corporate settings have been as a tool to support business email compromise (BEC) attacks. For example, <a href=\"https:\/\/www.wsj.com\/articles\/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402\">in 2019<\/a> an attacker used deepfake software to impersonate the voice of a German company\u2019s CEO to convince another executive at the company to urgently send a wire transfer of $243,000 in support of a made-up business emergency. More dramatically, last fall a criminal used deepfake audio and forged email to convince an employee of a United Arab Emirates company to <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/deepfake-audio-scores-35-million-in-corporate-heist\">transfer $35 million to an account owned by the bad guys<\/a>, tricking the victim into thinking it was in support of a company acquisition.<\/p>\n<p>According to Matthew Canham, CEO of Beyond Layer 7 and a faculty member at George Mason University, attackers are increasingly going to use deepfake technology as a creative tool in their arsenals to help make their social engineering attempts more effective.<\/p>\n<p>\u201cSynthetic media like deepfakes is going to just take social engineering to another level,\u201d says Canham, who last year at Black Hat <a href=\"https:\/\/i.blackhat.com\/USA21\/Wednesday-Handouts\/us-21-Deepfake-Social-Engineering-Creating-A-Framework-For-Synthetic-Media-Social-Engineering.pdf\">presented research<\/a> on countermeasures to combat deepfake technology. <\/p>\n<p>The good news is that researchers like Canham and Roy-Chowdhury are making headway on coming up with detection and countermeasures for deepfakes. In May, Roy-Chowdhury\u2019s team <a href=\"https:\/\/openaccess.thecvf.com\/content\/WACV2022\/papers\/Mazaheri_Detection_and_Localization_of_Facial_Expression_Manipulations_WACV_2022_paper.pdf\">developed a framework<\/a> for detecting manipulated facial expressions in deepfaked videos with unprecedented levels of accuracy.<\/p>\n<p>He believes that new methods of detection like this can be put into use relatively quickly by the cybersecurity community. <\/p>\n<p>\u201cI think they can be operationalized in the short term &#8212; one or two years &#8212; with collaboration with professional software development that can take the research to the software product phase,\u201d he says.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/criminals-deepfake-video-interview-remote-work\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest evolution in social engineering could put fraudsters in a position to commit insider threats.Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/criminals-deepfake-video-interview-remote-work\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-47360","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Criminals Use Deepfake Videos to Interview for Remote Work 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Criminals Use Deepfake Videos to Interview for Remote Work 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-01T17:01:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Criminals Use Deepfake Videos to Interview for Remote Work\",\"datePublished\":\"2022-07-01T17:01:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/\"},\"wordCount\":1039,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6ba9037bc9dcdf79\\\/62bdefc22c2dce5c8ae164f1\\\/deepfake-mike-adobestock.jpeg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/\",\"name\":\"Criminals Use Deepfake Videos to Interview for Remote Work 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6ba9037bc9dcdf79\\\/62bdefc22c2dce5c8ae164f1\\\/deepfake-mike-adobestock.jpeg\",\"datePublished\":\"2022-07-01T17:01:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6ba9037bc9dcdf79\\\/62bdefc22c2dce5c8ae164f1\\\/deepfake-mike-adobestock.jpeg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt6ba9037bc9dcdf79\\\/62bdefc22c2dce5c8ae164f1\\\/deepfake-mike-adobestock.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-use-deepfake-videos-to-interview-for-remote-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Criminals Use Deepfake Videos to Interview for Remote Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Criminals Use Deepfake Videos to Interview for Remote Work 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/","og_locale":"en_US","og_type":"article","og_title":"Criminals Use Deepfake Videos to Interview for Remote Work 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-01T17:01:34+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Criminals Use Deepfake Videos to Interview for Remote Work","datePublished":"2022-07-01T17:01:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/"},"wordCount":1039,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/","url":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/","name":"Criminals Use Deepfake Videos to Interview for Remote Work 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg","datePublished":"2022-07-01T17:01:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt6ba9037bc9dcdf79\/62bdefc22c2dce5c8ae164f1\/deepfake-mike-adobestock.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/criminals-use-deepfake-videos-to-interview-for-remote-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Criminals Use Deepfake Videos to Interview for Remote Work"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47360"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47360\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}