Announcing our $5M seed roundLearn more

Well-Done Tofu

Thoughtfully prepared ideas and releases from and by our team.

How to Review Resumes for Fraud: Detection & Prevention Guide (April 2026)

How to Review Resumes for Fraud: Detection & Prevention Guide (April 2026)

Jason Zoltak Jason Zoltak
10 minute read

Table of Contents

Sixty to seventy percent of people admit to lying on a resume at least once. The bigger problem is the quarter of candidate profiles that Gartner says will be entirely fake by 2028. How to review resumes for fraud isn't about catching job title embellishment anymore. It's about spotting synthetic identities, AI-generated applications, proxy interviewers, and state-sponsored IT workers.

TLDR:

  • Recruiters face synthetic identities, deepfakes, and state-sponsored IT worker fraud beyond embellishment.
  • Resume metadata, IP logs, and social profile age reveal fraud before any human review happens.
  • Deepfakes and proxy interviewers appear in 18% of video interviews, per 2025 Greenhouse data.
  • Manual verification catches some fraud but misses patterns across hundreds of applications at scale.
  • Tofu's FraudDetect screens applicants across 40+ signals at submission with 97% accuracy.

Types of Resume and Application Fraud Targeting Recruiters

Resume fraud isn't new, but the version recruiters face in 2026 looks nothing like what HR teams dealt with a decade ago. Here's what recruiters are up against right now:

A modern digital illustration showing the landscape of application fraud targeting recruiters. Central focus on a laptop screen displaying a resume application interface, surrounded by warning symbols and threat indicators. Visual elements include: synthetic identity fragments (fragmented ID cards, puzzle pieces of personal data), AI symbols and circuit patterns representing AI-generated applications, deepfake masks or face overlays, proxy figures in shadowy silhouettes, and VPN/network routing visualizations. Color scheme: professional blues and grays with red accent warning colors. Clean, corporate security aesthetic. No text or letters visible.

  • Traditional embellishment: fabricated credentials, inflated titles, falsified employment dates
  • AI-generated applications: bulk-generated resumes optimized to pass ATS filters
  • Synthetic identities: real employment histories stitched with false contact details and fabricated personal data
  • Deepfake interviews: AI-generated video and audio used to impersonate candidates during live calls
  • Proxy interviewers: stand-ins hired to pass technical screens, replaced by the unqualified hire on day one
  • State-sponsored IT worker fraud: foreign threat actors using stolen identities and VPNs to infiltrate remote technical roles

Embellishment wastes time but synthetic identities open the door to insider threats like State-sponsored schemes which can trigger OFAC violations.

Red Flags in Resume Content and Formatting

AI-generated resumes are the easiest to spot. The language is polished but hollow: bullets mirror the job description almost word-for-word.

Content Red Flags

  • Bullet points that lift exact phrases from your job posting
  • Generic achievements with suspiciously round numbers ("increased revenue by 200%")
  • Job titles that escalate too fast without supporting context
  • Employment gaps filled with vague consulting or freelance descriptions

Formatting Red Flags

  • Dates that align perfectly but leave no room for transitions between roles
  • Roles with identical tenure lengths across multiple jobs
  • Contact details that don't match the listed location

Fraud rings often recycle resume templates, so near-identical formatting across separate applications is rarely a coincidence.

Red Flags During Application Submission

Before a recruiter ever opens a file, the submission itself carries signals. Email accounts created days before applying, VOIP numbers with no traceable carrier history, IP logs routing through known proxy servers: the application metadata is what you should check first.

Red Flags During Video and Phone Interviews

As of 2025, 18% of hiring managers caught deepfakes in video interviews and that's only the ones they noticed.

Review duplicate resumes, proxy interviewers, fake identities

Visual and Audio Artifacts

  • Lip movement that doesn't sync cleanly with speech
  • Unnatural facial edges or slight blurring around the jawline
  • Voice that sounds processed or slightly delayed from mouth movement
  • Lighting that feels inconsistent with the stated location

Behavioral Tells

  • Scripted, overly polished answers to open-ended questions
  • Long pauses before follow-ups, as if waiting for a prompt
  • Inability to elaborate when asked to walk through a specific decision
  • Evasiveness about tools, teammates, or environments from past roles

Inconsistencies Across Stages

A candidate who aced the technical screen but stumbles through basic questions in a final round may not be the same person. Watch for changes in communication style, accent, or vocabulary between calls.

Resume Metadata and Document Analysis

The resume you read and the file you receive are two different documents. One tells you what a candidate wants you to know. The other tells you what they didn't think to hide.

Every resume file carries embedded metadata: creation date, last-modified timestamp, authorship name, editing software, and in many cases, geographic indicators tied to the machine that built it. A file created at 3 a.m. in a timezone six hours ahead of the candidate's listed location is worth a second look. An "author" field populated with a name that doesn't match the applicant is a harder flag to explain away.

Fraud rings run on templates. When multiple applicants submit files with identical formatting structures, the same authorship field, or sequential creation timestamps, that's a production line. Metadata analysis catches the pattern across the whole pool.

A few specific signals worth checking:

  • Creation and modification dates that don't align with claimed job history timelines
  • Authorship fields with names that differ from the applicant's stated identity
  • Editing software inconsistent with the candidate's claimed technical background
  • Template signatures or style identifiers shared across applications to the same role
  • Geographic metadata suggesting the file was created in a location the candidate never mentioned

Pulling metadata from every submitted file and comparing file fingerprints across hundreds of applications isn't something a recruiter has time to do. That trail is worth following.

Verifying Employment History and Credentials

Building a Verification Routine That Scales

A repeatable checklist applied consistently across finalists is faster than ad hoc digging and harder to game.

For employment history:

  • Call the company's main HR line directly, not the number the candidate provides, since fraudulent applicants frequently list personal contacts who pose as former employers.
  • Confirm job title, tenure, and eligibility for rehire, as discrepancies in any of these are red flags worth pausing on.
  • Ask whether the manager listed as a reference actually worked there during the candidate's stated tenure.

Spotting Fake References

The tells are subtle:

  • Reference phone numbers that go straight to voicemail with generic greetings instead of a person or company name.
  • Email accounts on free domains instead of verified company domains.
  • References who can confirm every detail but cannot recall a single specific project, challenge, or outcome.

When a reference is suspiciously available, immediately responsive, and perfectly complementary, treat that as a signal.

Cross-Referencing Social and Professional Profiles

Account age is the fastest signal. A profile created two weeks before the application date, with 47 connections and no activity history, is a prop. Genuine accounts accumulate over years.

What to Check on LinkedIn

  • Account creation date relative to application date
  • Whether listed employers have company pages and whether the candidate appears in their employee network
  • Endorsement patterns, since real skills have endorsements from varied, real people
  • Whether the profile picture reverse-searches to a stock image or someone else entirely

GitHub and Technical Profile Verification

For engineering roles, GitHub history is harder to fake. Look at contribution cadence, commit quality, and whether the repositories reflect the claimed experience level. A senior engineer with three public repos all created last month is worth questioning directly.

State-Sponsored IT Worker Fraud and DPRK Schemes

According to the U.S. Department of the Treasury, DPRK IT worker schemes generated $800 million in 2024 alone, with proceeds flowing directly to North Korea's weapons programs. Hiring one isn't a bad hire. It's a potential OFAC violation.

Building Fraud Detection Into Your Hiring Process

Stage-by-Stage Fraud Checks

  • Application submission: metadata review, IP and device analysis, email and phone verification
  • Resume review: content and formatting red flags, employment timeline consistency, social profile cross-reference
  • Phone/video screen: identity consistency checks, behavioral observation
  • Technical interview: compare communication style and ability against earlier stages
  • References and credentials: direct verification with HR departments and registrars

When to Escalate

Not every flag warrants rejection. Set a clear threshold: one soft signal gets noted, two or more hard signals get escalated. Document every escalation so patterns across applicant pools become visible over time.

Hiring Stage

Primary Red Flags to Check

Verification Actions

Application Submission

Email created days before applying, VOIP numbers with no carrier history, IP logs through known proxy servers, resume metadata showing authorship name mismatch, creation timestamps in unexpected timezones

Run metadata extraction on all resume files, cross-reference IP geolocation against stated location, verify email account age and domain authenticity, check phone number carrier type and registration date

Resume Content Review

Bullet points lifting exact job posting phrases, suspiciously round achievement numbers, job title escalation without context, identical formatting across multiple applications, employment gaps filled with vague consulting descriptions

Compare resume language against job description for verbatim matching, verify employment timeline consistency, check for template signature patterns across applicant pool, flag dates with no transition room between roles

Social Profile Cross-Reference

LinkedIn account created within two weeks of application, profile with under 50 connections and no activity history, profile picture reverse-searches to stock image, listed employer has no company page or candidate not in employee network

Document account creation date, verify employer company pages exist and candidate appears in network, check endorsement patterns for authenticity, run reverse image search on profile photos

Phone and Video Interviews

Lip movement not syncing with speech, unnatural facial blurring around jawline, processed or delayed voice quality, scripted answers with long pauses before follow-ups, inability to elaborate on specific past decisions

Observe for visual and audio artifacts during live calls, ask open-ended questions requiring elaboration, request specific examples from claimed experience, compare communication style and vocabulary against earlier interactions

Technical Assessments

Performance dramatically different from screening stage, communication style shift between interviews, GitHub account with three repos all created last month despite senior-level claims, contribution history inconsistent with experience level

Compare technical ability across multiple interview stages, review GitHub commit quality and contribution cadence, verify repositories reflect claimed expertise level, ask candidate to walk through specific code decisions

Reference and Credential Verification

Reference phone goes straight to generic voicemail, email on free domain instead of company domain, reference cannot recall specific projects or outcomes, credentials from unaccredited institutions or registrars with no verification database

Call company main HR line directly, not the number the candidate provides, confirm job title and tenure and rehire eligibility, verify manager listed actually worked there during stated period, check credentials against official registrar databases

Automated Fraud Detection and AI Screening Tools

Manual review catches some fraud. It misses most of it. Screening applicants for overlapping resumes, metadata, spoofed locations, and synthetic identities while running a full pipeline isn't feasible without automation.

Purpose-built tools close it. Tofu's FraudDetect screens every applicant across 40+ signals the moment they hit your ATS.

Final Thoughts on Catching Resume and Application Fraud

Most fraud gets filtered out when detection happens at submission, not during the interview stage. How to review resumes for fraud is less about recruiter training and more about automated checks running in the background before anyone opens a file. The volume problem is real, and manual verification doesn't keep pace with fraud rings that submit hundreds of applications a week. If you're seeing applicants that don't add up, reach out to our team and we'll walk through what we're catching. The right tooling stops fraud before it wastes your recruiters' time.

FAQs

How can I tell if a resume was generated by AI?
AI-generated resumes often lift exact phrases from your job description, include suspiciously round achievement numbers, and read as polished but hollow—nothing sounds like a person who actually lived the experience. Look for bullet points that mirror your posting word-for-word with no personal context or specificity around how the work was done.
What resume metadata should I check for fraud signals?
Check creation and modification dates, authorship fields, editing software, and geographic indicators embedded in the file. A resume authored under a name that doesn't match the applicant, or built on a machine timestamped to a timezone the candidate never mentioned, is a red flag worth investigating before you waste time on a screening call.
When should I escalate a suspicious applicant to my security team?
Set a clear threshold: one soft signal gets noted, two or more hard signals get escalated. Hard signals include metadata anomalies, IP addresses routing through known proxy servers, email addresses created days before applying, or references who can't recall a single specific project—these warrant a closer look from security before moving forward.
How do deepfakes show up in video interviews?
Watch for lip movement that doesn't sync cleanly with speech, unnatural blurring around the jawline, voice that sounds processed or delayed, and scripted answers to open-ended questions. 18% of hiring managers caught candidates using deepfakes in 2025, and that's only what they noticed—most slip through without automated detection tools.
What's the difference between resume embellishment and synthetic identity fraud?
Embellishment is inflated titles or fabricated credentials on an otherwise real person's resume—it wastes your time. Synthetic identity fraud combines real employment histories with false contact details and fabricated personal data to create an entirely fake person—it opens the door to insider threats, OFAC violations, and state-sponsored infiltration.
How common is resume fraud among job applicants?
60 to 70% of people admit to lying on a resume at least once, but the problem is evolving beyond embellishment. Gartner predicts that by 2028, one in four candidate profiles worldwide will be entirely fake, including synthetic identities and AI-generated applications.
What are the risks of hiring a DPRK IT worker?
Hiring a DPRK IT worker isn't just a bad hire—it's a potential OFAC violation with geopolitical stakes. These state-sponsored schemes generated nearly $800 million in 2024, with proceeds flowing directly to North Korea's weapons programs, making this a compliance and national security issue.
Can LinkedIn profiles be faked or spoofed?
Yes, LinkedIn profiles can be created as props to support fraudulent applications. Red flags include accounts created shortly before the application date, minimal connections, no activity history, profile photos that reverse-search to stock images, and candidates not appearing in their claimed employer's network.
What are proxy interviewers and how do they work?
Proxy interviewers are stand-ins hired to pass technical screens on behalf of unqualified candidates, who then get replaced by the actual hire on day one. Watch for communication style shifts, accent changes, or candidates who ace technical rounds but stumble through basic questions in final interviews.
How do fraud rings operate at scale?
Fraud rings run on templates, submitting bulk applications with recycled resume formats, identical authorship fields, and sequential creation timestamps. They count on the volume problem overwhelming manual review, which is why automated metadata analysis across entire applicant pools is necessary to catch the pattern.
Should I be suspicious if a candidate uses a VPN during the application process?
VPN usage alone isn't a reliable fraud signal, especially for engineers applying to fintech and crypto roles who often use VPNs by default. The tell is context: a VPN combined with newly created email, unverifiable phone, and a resume submitted at an unusual hour in a mismatched timezone is worth flagging.
What makes fake references difficult to detect?
Fake references often use free-domain email addresses, have voicemails with generic greetings instead of company names, and provide perfectly complementary feedback while being unable to recall specific projects or challenges. Real managers are busy and real recommendations typically include some friction or scheduling challenges.
How do I verify credentials without being fooled by degree mills?
Contact the institution's registrar directly rather than relying on the diploma itself, since degree mills have become sophisticated enough that their documents look legitimate. Confirm enrollment dates, degree conferred, and graduation status through official channels, not the contact information provided by the candidate.
What should I look for when comparing a candidate's performance across different interview stages?
Watch for inconsistencies in communication style, accent, vocabulary, and how they describe their background compared to what's on their resume. A candidate who demonstrates strong technical ability in one round but can't elaborate on basic concepts in another may indicate proxy swapping.
Why does automated fraud detection work better than manual resume review?
Manual review catches fraud one application at a time and misses patterns across hundreds of submissions, like shared metadata signatures or template recycling by fraud rings. Automated tools screen every applicant across 40+ signals at submission, catching synthetic identities, location spoofing, and metadata anomalies before any recruiter opens a file.

« Back to Blog