By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: You Didn’t Get Phished — You Onboarded the Attacker
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > You Didn’t Get Phished — You Onboarded the Attacker
Computing

You Didn’t Get Phished — You Onboarded the Attacker

News Room
Last updated: 2025/09/08 at 6:10 AM
News Room Published 8 September 2025
Share
SHARE

When Attackers Get Hired: Today’s New Identity Crisis

What if the star engineer you just hired isn’t actually an employee, but an attacker in disguise? This isn’t phishing; it’s infiltration by onboarding.

Meet “Jordan from Colorado,” who has a strong resume, convincing references, a clean background check, even a digital footprint that checks out.

On day one, Jordan logs into email and attends the weekly standup, getting a warm welcome from the team. Within hours, they have access to repos, project folders, even some copy/pasted dev keys to use in their pipeline.

A week later, tickets close faster, and everyone’s impressed. Jordan makes insightful observations about the environment, the tech stack, which tools are misconfigured, and which approvals are rubber-stamped.

But Jordan wasn’t Jordan. And that red-carpet welcome the team rolled out was the equivalent to a golden key, handed straight to the adversary.

From Phishing to Fake Hires

The modern con isn’t a malicious link in your inbox; it’s a legitimate login inside your organization.

While phishing is still a serious threat that continues to grow (especially with the increase in AI-driven attacks), it’s a well-known attack path. Organizations have spent years hardening email gateways, training employees to recognize and report malicious content, and running internal phishing tests.

We defend against a flood of phishing emails daily, as there’s been a 49% increase in phishing since 2021, and a 6.7x increase in large language models (LLMs) being used to generate emails with convincing lures. It’s becoming significantly easier for attackers to run phishing attacks.

But that’s not how Jordan got in. Despite numerous defenses pointed at email, Jordan got in with HR paperwork.

Why is Hiring Fraud a Problem Now?

Remote hiring has scaled rapidly in the past few years. Industries have discovered that 100% remote work is possible, and employees no longer need offices with physical (and easily defendable) perimeters. Moreover, talented resources exist anywhere on the planet. Hiring remotely means organizations can benefit from an expanded hiring pool, with the potential for more qualifications and skills. But remote hiring also removes the intuitive and natural protections of in-person interviews, creating a new opening for threat actors.

Today, identity is the new perimeter. And that means your perimeter can be faked, impersonated, or even AI-generated. References can be spoofed. Interviews can be coached or proxied. Faces and voices can be generated (or deepfaked) by AI. An anonymous adversary can now convincingly appear as “Jordan from Colorado” and get an organization to give them the keys to the kingdom.

Hiring Fraud in the Wild: North Korea’s Remote “Hire” Operatives

The threat of remote hiring fraud isn’t something we’re watching roll in on the horizon or imagine in scary stories around the campfire.

A report published in August of this year revealed over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers with false identities and polished resumes. That single example has seen a 220% increase year-over-year, which means this threat is escalating quickly., which means this threat is escalating quickly.

Many of these North Korean operatives used AI-generated profiles, deepfakes, and real-time AI manipulation to pass interviews and vetting protocols. One case even involved American accomplices who were operating “laptop farms” to provide the operatives with physical US setups, company‑issued machines, and domestic addresses and identities. Through this scheme, they were able to steal data and funnel salaries back to North Korea’s regime, all while evading detection.

These aren’t isolated hacktivist stunts, either. Investigations have identified this as a systematic campaign, often targeting Fortune 500 companies.

The Castle & Moat Problem

Many organizations respond by overcorrecting: “I want my entire company to be as locked down as my most sensitive resource.”

It seems sensible—until the work slows to a crawl. Without nuanced controls that allow your security policies to distinguish between legitimate workflows and unnecessary exposure, simply applying rigid controls that lock everything down across the organization will grind productivity to a halt. Employees need access to do their jobs. If security policies are too restrictive, employees are either going to find workarounds or continually ask for exceptions.

Over time, risk creeps in as exceptions become the norm.

This collection of internal exceptions slowly pushes you back towards “the castle and moat” approach. The walls are fortified from the outside, but open on the inside. And giving employees the key to unlock everything inside so they can do their jobs means you are giving one to Jordan, too.

In other words, locking everything down the wrong way can be just as dangerous as leaving it open. Strong security must account for and adapt to real-world work, otherwise, it collapses.

How To Achieve a Zero Standing Privileges State and Block Fraudulent New Hires Without the Trade-Off

We’ve all heard of zero trust: never trust, always verify. This applies to every request, every time, even after someone is already “inside.”

Now, with our new perimeter, we have to view this security framework through the lens of identity, which brings us to the concept of zero standing privileges (ZSP).

Unlike the castle model, which locks everything down indiscriminately, a ZSP state should be built around flexibility with guardrails:

  • No always-on access by default – The baseline for every identity is always the minimum access required to function.
  • JIT (Just-in-Time) + JEP (Just–Enough-Privilege) – –Extra access takes the form of a small, scoped permission that exists only when needed, for the finite duration needed, and then gets revoked when the task is done.
  • Auditing and accountability – Every grant and revoke is logged, creating a transparent record.

This approach closes the gap left by the castle problem. It ensures attackers can’t rely on persistent access, while employees can still move quickly through their work. Done right, a ZSP approach aligns productivity and protection instead of forcing a choice between them. Here are a few more tactical steps that teams can take to eliminate standing access across their organization:

The Zero Standing Privileges Checklist

Inventory & baselines:

Request – Approve – Remove:

Full audit and evidence

Taking Action: Start Small, Win Fast

A practical way to begin is by piloting ZSP on your most sensitive system for two weeks. Measure how access requests, approvals, and audits flow in practice. Quick wins here can build momentum for wider adoption, and prove that security and productivity don’t have to be at odds.

BeyondTrust Entitle, a cloud access management solution, enables a ZSP approach, providing automated controls that keep every identity at the minimum level of privilege, always. When work demands more, employees can receive it on request through time-bound, auditable workflows. Just enough access is granted just in time, then removed.

By taking steps to operationalize zero standing privileges, you empower legitimate users to move quickly—without leaving persistent privileges lying around for Jordan to find.

Ready to get started? Click here to get a free red-team assessment of your identity infrastructure.

Note: This article was expertly written and contributed by David van Heerden, Sr. Product Marketing Manager. David van Heerden — a self-described general nerd, metalhead, and wannabe film snob — has worked in IT for over 10 years, sharpening his technical skills and developing a knack for turning complex IT and security concepts into clear, value-oriented topics. At BeyondTrust, he has taken on the Sr. Product Marketing Manager role, leading the entitlements marketing strategy.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The New Bose QC Ultra 2 Are the Best Noise-Canceling Headphones Right Now
Next Article 7 Vitamins That Could Promote Hair Growth and Give You Long Locks
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Astell Kern PD10
Gadget
Amazon Music’s new AI feature generates personalized playlists every Monday | News
News
Battery sizes revealed for Apple iPhone 17 lineup in new leak
News
Uncle Sam, Intel’s New Shareholder: A Radical Bet on America’s Future
Computing

You Might also Like

Computing

Uncle Sam, Intel’s New Shareholder: A Radical Bet on America’s Future

0 Min Read
Computing

How to Use AI LinkedIn Content Generator for Thought Leadership Content | Narrato

14 Min Read
Computing

How to Use Time Mapping for Better Time Management (+Templates)

26 Min Read
Computing

How to Customize BERT Encoders with TensorFlow Model Garden | HackerNoon

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?