
Fraud Forward Your Fraud Team Is Leaking the Playbook — and LinkedIn Is the Attack Surface
Feb 25, 2026
Jared Gruenberg, a fraud investigator who documents LinkedIn recruiting scams, walks through how fake job posts and quick screening emails harvest operational intelligence. He outlines the telltale signs of impersonated companies. Short, urgent conversations reveal how attackers map industry controls and why overwhelmed teams are especially at risk.
AI Snips
Chapters
Transcript
Episode notes
Real Investigator Walks Into Fake Marriott Job
- Jared applied via LinkedIn Easy Apply to a fake Marriott listing and received an hour-later questionnaire asking how he'd investigate crypto.
- He checked the company's LinkedIn and WHOIS, found a 4-day-old domain and fake employee profiles, and got the domain shut down by the host.
Mass Hiring Signs Reveal Resume Harvesting Rings
- Impersonators post thousands of investigator roles from tiny companies and build large follower counts by auto-follow from Easy Apply.
- Fake profiles, no posting history, and mismatched geography (UK school hiring in the US) reveal industry-mapping intent.
Fraud Resumes Are Operational Intelligence
- Attackers target fraud, AML, and compliance roles to learn the signals investigators look for and the vendor stack investigators mention on resumes.
- That operational intelligence lets fraudsters probe specific tools (Stripe, PayPal, BNPL) for vulnerabilities and tune attacks.

