All calculators
Risk calculator

Estimate the cost of a fake remote hire

Model exposure from deepfake interviews, synthetic candidates, stolen identities, laptop farm schemes, and fraudulent employees who gain access before they are detected.

Remote hiring has become a target for synthetic candidates, fraudulent contractors, and fake IT workers using stolen identities, AI-generated profiles, and video manipulation. Use this calculator to estimate the cost of a fraudulent hire reaching payroll, systems, source code, customer data, or financial workflows.

01

Hiring activity

Typical external hires onboarded in a normal month.

Select all that apply.

02

Interview process

Audio lag, unnatural facial movement, evasiveness on identity questions, inconsistent location details, repeated resume patterns, reused contact details, or unusual equipment shipment requests.

03

Onboarding and access

Access amplifiers — what new hires can reach in their first 30 days.

New hires receive source code access within 30 days
New hires receive customer or employee data access within 30 days
New hires receive production, cloud, or admin access within 30 days
New hires can access finance, payroll, or payment systems

Identity and onboarding controls.

Device shipment address must match verified identity and work location
IT verifies the device and network location on day one
HR verifies identity during interview and onboarding
Background checks include identity document verification
Hiring managers are trained on synthetic candidate and deepfake interview signals
04

Payroll and tenure

05

Prior signals

Share these values

Send this link to a colleague — it loads the calculator with the same values you entered.

Estimated annual exposureHigh risk
$259K

Modeled range: $130K$518K

Annual hires
10.5
Expected fraudulent hires / yr
0.91
Cost per fraudulent hire
$286K
Access risk surcharge
$195K
Top risk drivers
  • Fully remote interview process

Illustrative estimates based on public reporting, government data, and modeling assumptions. Not financial, legal, or security advice.

Detailed risk report

Request a Diopter risk test above and a team member will follow up with a more detailed risk report tailored to your organization, as well as work to schedule an authorized voice and video impersonation simulation against your hiring process.

Methodology

How we model deepfake hiring fraud exposure.

We start from your annual hiring volume (external hires per month × 12) and apply a role-weighted base risk rate informed by FBI, DOJ, and FinCEN public reporting on fake remote IT workers and synthetic identity fraud. That rate is then adjusted for your remote share, identity verification rigor, interview format, prior identity signals, and unusual candidate arrangements.

Cost per fraudulent hire combines payroll during tenure (until detection), recruiting and onboarding cost, investigation and remediation cost, and an access risk surcharge tied to what a new hire can reach in their first 30 days — source code, customer data, production and admin systems, and finance or payroll workflows. A control-gap multiplier amplifies exposure when device, network, identity, background check, and hiring manager training controls are inconsistent.

Results are returned as a conservative, expected, and high range — not a single number — because real exposure depends on attacker targeting, candidate behavior, control consistency, and how quickly the organization detects and removes a fraudulent hire.

This calculator produces illustrative estimates based on public reporting, government data, security industry research, and modeling assumptions. It is for educational planning only and does not constitute financial, legal, insurance, or security advice.

FAQ

Deepfake hiring fraud, answered.

More calculators

See the AI Wire Fraud Calculator or browse all Diopter risk calculators.

View all calculators
Walkthrough · 30 min · NDA-safe

Walk an attack arc with Diopter.

In 30 minutes, we will replay a real deepfake incident, show the signals Diopter would score, and map the verdict your team could act on.