Navigating the Rise of Fake Worker Fraud

Financial crimes

Imagine this.

You are a multi-national company, facing a critical project deadline on one of your projects. You need a specialized Python developer with expertise in Artificial Intelligence (AI) for a six-month contract. Due to the urgency, you opt for a contingent worker sourced through a reputable staffing platform.

Meet Chris.

He represented himself as an ideal candidate. His resume was impressive, showcasing relevant experience at well-known tech firms. He passed your standard background check, which verified his educational credentials and previous employment. The virtual interview process, conducted over video conferencing, went smoothly. You onboarded Chris, granting him access to your internal systems, project repositories, and communication platforms. He was assigned to a team in the finance department.

The Red Flags.

After a productive few months, Chris’ team members start observing inconsistent performance. This included, odd work hours, with vague excuses, work output often to be what appears copied from Generative AI tools, persistent camera avoidance during meetings, and your IT has observed network logins from non-US locations. 

Chris was a Fake Worker.

Fake worker schemes involve bad actors posing as legitimate employees, contractors, or vendors to infiltrate organizations. These fraudulent scams are not merely about identity theft; they combine social engineering, forged identities (e.g., AI-generated photos, deepfake video, and stolen IDs), and sometimes laptop farms to bypass traditional geolocation fencing. For example, one recent nation state operative that led the DOJ indictment of 14 individuals netted at least $88 million1. In another matter, it was reported 300 companies were impacted2. In most cases, it has been observed fake employees will manipulate financial systems, steal sensitive data for competitive gain, and/or simply collect paychecks for as long as possible.

Key Mitigation Opportunities

Fake worker scams are a symptom of our interconnected, remote-first world. By integrating fraud prevention with cybersecurity measures—and extending these practices to contractors and vendors—organizations can mitigate risks while fostering trust. As criminals grow more sophisticated, testing controls and adapting to regulatory demands will separate resilient businesses from vulnerable ones. Here are some common controls for consideration: 

1

Build awareness: Implement and build awareness around a robust whistleblowing system to encourage the reporting of suspected fraud.

2

Strengthen HR Processes: Implement thorough hiring procedures, controlled on/offboarding, and employee monitoring.

3

Verify Identity Rigorously: Use in-person or live video checks especially part of the onboarding process, leverage AI detection, and cross-reference data.

4

Financial Audits: Regularly audit payroll records to detect fraudulent payments and ghost employees, and transaction monitoring to identify suspicious financial activity, such as unusual fund transfers or changes to vendor payment information.

5

Limit and Monitor Access: Apply "least privilege" and zero-trust principles, eliminate and/or reduce the remote access tools, analyze login patterns, and use endpoint security.

6

Secure Third-Party Access: Conduct due diligence, enforce MFA, and segment vendor access.

7

Implement Eviction Playbooks: When threats are identified have a playbook to quickly identify access and isolate systems. 

8

Contractual Agreements: Include right to audits, strong security and compliance clauses in contracts with contracting firms.

Explore more

From cyber to fraud

The evolving landscape of digital crime

Meet our team

Image of David Nides
David Nides
Principal, Advisory, KPMG US

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP\'s . Privacy Statement

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline