{"id":59832,"date":"2025-12-11T17:00:00","date_gmt":"2025-12-11T17:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=144073"},"modified":"2025-12-11T17:00:00","modified_gmt":"2025-12-11T17:00:00","slug":"imposter-for-hire-how-fake-people-can-gain-very-real-access","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/","title":{"rendered":"Imposter for hire: How fake people can gain very real access"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png\" class=\"ff-og-image-inserted\"><\/div>\n<p class=\"wp-block-paragraph\">In the latest edition of our Cyberattack Series, we dive into a real-world case of fake employees. Cybercriminals are no longer just breaking into networks\u2014they\u2019re gaining access by posing as legitimate employees. This form of cyberattack involves operatives posing as legitimate remote hires, slipping past human resources checks and onboarding processes to gain trusted access. Once inside, they exploit corporate systems to steal sensitive data, deploy malicious tools, and funnel profits to state-sponsored programs. In this blog, we unpack how this cyberattack unfolded, the tactics employed, and how <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">Microsoft Incident Response<\/a>\u2014the Detection and Response Team (DART)\u2014swiftly stepped in with forensic insights and actionable guidance. <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/bade\/documents\/products-and-services\/en-us\/security\/Cyberattacks-Series-Report-Q2-Final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download the full report<\/a> to learn more.<\/p>\n<figure class=\"wp-block-pullquote\" readability=\"3\">\n<blockquote readability=\"9\">\n<p><strong>Insight<\/strong><br \/>Recent Gartner research reveals&nbsp;surveyed employers report they are increasingly concerned about candidate fraud.&nbsp;<strong>Gartner predicts that by 2028, one in four candidate profiles worldwide will be fake<\/strong>, with&nbsp;possible security&nbsp;repercussions far beyond simply making \u201ca bad hire.\u201d<sup>1<\/sup><\/p>\n<\/blockquote>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"what-happened\">What happened?<\/h2>\n<p class=\"wp-block-paragraph\">What began as a routine onboarding turned into a covert operation. In this case, four compromised user accounts were discovered connecting PiKVM devices to employer-issued workstations\u2014hardware that enables full remote control as if the threat actor were physically present. This allowed unknown third parties to bypass normal access controls and extract sensitive data directly from the network. With support from <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/topic\/threat-intelligence\/?sort-by=newest-oldest&amp;date=any\">Microsoft Threat Intelligence<\/a>, we quickly traced the activity to the North Korean remote IT workforce known as Jasper Sleet.<\/p>\n<figure class=\"wp-block-pullquote\" readability=\"5\">\n<blockquote readability=\"13\">\n<p>&nbsp;<br \/><strong>TACTIC<\/strong><br \/><strong>PiKVM devices<\/strong>\u2014low-cost, hardware-based remote access tools\u2014were&nbsp;utilized&nbsp;as egress channels. These devices allowed threat actors to&nbsp;maintain&nbsp;persistent, out-of-band access to systems, bypassing traditional endpoint detection and response (EDR) controls.&nbsp;In one case,&nbsp;an identity linked to Jasper Sleet authenticated into the environment through PiKVM, enabling covert data exfiltration.<\/p>\n<\/blockquote>\n<\/figure>\n<p class=\"wp-block-paragraph\">DART quickly pivoted from proactive threat hunting to full-scale investigation, leveraging numerous specialized tools and techniques. These included, but were not limited to, Cosmic and Arctic for Azure and Active Directory analysis, Fennec for forensic evidence collection across multiple operating system platforms, and telemetry from <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access\/microsoft-entra-id?msockid=27b7b3bc5be566bc06c9a5a05a7a679d\">Microsoft Entra ID<\/a> protection and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-defender#products\">Microsoft Defender<\/a> solutions for endpoint, identity, and cloud apps. Together, these tools and capabilities helped trace the intrusion, contain the threat, and restore operational integrity.<\/p>\n<h2 class=\"wp-block-heading\" id=\"how-did-microsoft-respond\">How did Microsoft respond?<\/h2>\n<p class=\"wp-block-paragraph\">Once the scope of the compromise was clear, DART acted immediately to contain and disrupt the cyberattack. The team disabled compromised accounts, restored affected devices to clean backups, and analyzed Unified Audit Logs\u2014a feature of Microsoft 365 within the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/risk-management\/microsoft-purview-compliance-manager\">Microsoft Purview Compliance Manager<\/a> portal\u2014to trace the threat actor\u2019s movements. Advanced detection tools, including Microsoft Defender for Identity and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/endpoint-security\/microsoft-defender-endpoint?msockid=27b7b3bc5be566bc06c9a5a05a7a679d\">Microsoft Defender for Endpoint<\/a>, were deployed to uncover lateral movement and credential misuse. To blunt the broader campaign, Microsoft also <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/06\/30\/jasper-sleet-north-korean-remote-it-workers-evolving-tactics-to-infiltrate-organizations\/\">suspended thousands of accounts<\/a> linked to North Korean IT operatives.<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-can-customers-do-to-strengthen-their-defenses\">What can customers do to strengthen their defenses?<\/h2>\n<p class=\"wp-block-paragraph\">This cyberthreat is challenging, but it\u2019s not insurmountable. By combining strong security operations center (SOC) practices with insider risk strategies, companies can close the gaps that threat actors exploit. Many organizations start by improving visibility through Microsoft 365 Defender and Unified Audit Log integration and protecting sensitive data with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/information-protection\/microsoft-purview-data-loss-prevention?msockid=27b7b3bc5be566bc06c9a5a05a7a679d\">Microsoft Purview Data Loss Prevention<\/a> policies. Additionally, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/risk-management\/microsoft-purview-insider-risk-management?msockid=27b7b3bc5be566bc06c9a5a05a7a679d\">Microsoft Purview Insider Risk Management<\/a> can help organizations identify risky behaviors before they escalate, while strict pre-employment vetting and enforcing the principle of least privilege reduce exposure from the start. Finally, monitor for unapproved IT tools like PiKVM devices and stay informed through the Threat Analytics dashboard in Microsoft Defender. These cybersecurity practices and real-world strategies, paired with proactive alert management, can give your defenders the confidence to detect, disrupt, and prevent similar attacks.<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-is-the-cyberattack-series\">What is the Cyberattack Series?<\/h2>\n<p class=\"wp-block-paragraph\">In our Cyberattack Series, customers discover how DART investigates unique and notable attacks. For each cyberattack story, we share:<\/p>\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">How the cyberattack happened.<\/li>\n<li class=\"wp-block-list-item\">How the breach was discovered.<\/li>\n<li class=\"wp-block-list-item\">Microsoft\u2019s investigation and eviction of the threat actor.<\/li>\n<li class=\"wp-block-list-item\">Strategies to avoid similar cyberattacks.<\/li>\n<\/ul>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">DART<\/a> is made up of highly skilled investigators, researchers, engineers, and analysts who specialize in handling global security incidents. We\u2019re here for customers with dedicated experts to work with you before, during, and after a cybersecurity incident.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p class=\"wp-block-paragraph\">To learn more about DART capabilities, please <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-incident-response\">visit our website<\/a>, or reach out to your Microsoft account manager or Premier Support contact. To learn more about the cybersecurity incidents described above, including more insights and information on how to protect your own organization, <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/bade\/documents\/products-and-services\/en-us\/security\/Cyberattacks-Series-Report-Q2-Final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">download the full report<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\">\n<p class=\"wp-block-paragraph\"><sup>1<\/sup><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2025-07-31-gartner-survey-shows-just-26-percent-of-job-applicants-trust-ai-will-fairly-evaluate-them\" target=\"_blank\" rel=\"noreferrer noopener\">AI Fuels Mistrust Between Employers and Job Candidates; Recruiters Worry About Fraud, Candidates Fear Bias<\/a><\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/12\/11\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fake employees are an emerging cybersecurity threat. Learn how they infiltrate organizations and what steps you can take to protect your business.<br \/>\nThe post Imposter for hire: How fake people can gain very real access appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-59832","post","type-post","status-publish","format-standard","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Imposter for hire: How fake people can gain very real access 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Imposter for hire: How fake people can gain very real access 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Imposter for hire: How fake people can gain very real access\",\"datePublished\":\"2025-12-11T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/\",\"name\":\"Imposter for hire: How fake people can gain very real access 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png\",\"datePublished\":\"2025-12-11T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png\",\"contentUrl\":\"https:\\\/\\\/www.microsoft.com\\\/en-us\\\/security\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/imposter-for-hire-how-fake-people-can-gain-very-real-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Imposter for hire: How fake people can gain very real access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Imposter for hire: How fake people can gain very real access 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/","og_locale":"en_US","og_type":"article","og_title":"Imposter for hire: How fake people can gain very real access 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-12-11T17:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Imposter for hire: How fake people can gain very real access","datePublished":"2025-12-11T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/"},"wordCount":816,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/","url":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/","name":"Imposter for hire: How fake people can gain very real access 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png","datePublished":"2025-12-11T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2025\/12\/Cyberattacks-Series-Report-Q2_HERO-IMAGE_v2-higherres.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/imposter-for-hire-how-fake-people-can-gain-very-real-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Imposter for hire: How fake people can gain very real access"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59832"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59832\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}