Back to all blogs

Back to all blogs

Back to all blogs

Proxy Interviews Explained - How They Work & Why They’re Rising

Proxy Interviews Explained - How They Work & Why They’re Rising

Understand what proxy interviews are, how candidates use them, and why this hiring fraud is rapidly rising. Learn how companies can spot and prevent proxy candidates.

Published By

Image

Abhishek Kaushik

Published On

Nov 24, 2025

Deepfake Candidate Interviews
Deepfake Candidate Interviews

TL;DR

  • Proxy interviewing is when the person interviewing is not the person who will actually do the job.

  • It is increasingly common in remote hiring and can be assisted by AI.

  • Recruiters can detect proxies by watching response patterns, environmental cues, identity mismatches, and behavior consistency.

  • The correct response is professional, documented, non-accusatory, and aligned with a written policy.

  • This guide includes recruiter scripts, response wording, and candidate follow-up templates.

A proxy interview happens when the person interviewing is not the person who will be doing the job. In most cases, a more experienced candidate, outsourced coach, or even a hired impersonator attends the interview on behalf of the applicant.

This practice became mainstream in remote hiring environments where cameras, microphones, and multiple screen setups made identity harder to verify.

The goal of a proxy interview is simple: pass the interview, get the offer, and hand the job to the original applicant who may not have the skills demonstrated in the interview. The hiring company takes on serious risk because the performance the team evaluated is not the performance they will receive.

Internal audits from multiple enterprise hiring teams in 2025 found proxy interview incidence rates as high as 8 to 17 percent for remote technical roles.

What Is a Proxy Interview?

A proxy interview is a fraudulent hiring tactic where a candidate gets external help to appear more skilled or knowledgeable than they really are. When companies search what is a proxy interview, they’re usually referring to situations where the person being evaluated isn’t actually the one demonstrating the skills.

A proxy interview occurs when:

  • A candidate has someone else attend the interview on their behalf

  • Someone feeds the candidate live answers through chat or an earpiece

  • The candidate uses AI real-time response generators to substitute for thinking

The intention is the same: Present a level of skill or fluency that the actual worker does not have.

In 2025, the FBI has warned employers about sophisticated schemes where fraudsters use AI-enabled face-swapping / deepfake video, stolen identities, and real-time prompting during remote interviews - sometimes as part of large-scale networks.

According to law enforcement and security experts, these schemes often involve “laptop farms” and contractor networks that help real impostors or AI-powered proxies pass as legitimate job candidates.

Why Proxy Interviews Are Increasing

  1. Remote-first hiring makes verification weaker

  2. AI tools help generate answers in real-time

  3. AI-based coaching and answer libraries reduced preparation time

  4. Third-party “pay-to-pass-the-interview” services openly advertise online

  5. Hiring velocity pressures reduced interviewer depth checks

  6. Some staffing firms prioritize placement over performance outcomes

  7. Proctoring tools focused only on visible cheating and ignored reasoning authenticity

Traditional proctoring detects only surface-level anomalies, missing deeper authorship issues.

Deepfake and identity-fraud scams are growing rapidly in remote hiring. According to experts, remote-first recruiting creates verification blind spots - and AI tools make it easier than ever to impersonate candidates or feed them real-time answers during interviews.

Behavioral Patterns Recruiters Often Notice

Signal

What Recruiters Report Observing

Why It Matters

Latency in answers

Delayed responses after simple questions

Suggests live feeding

Inconsistent voice tone

Answers sound read or scripted

Indicates external coaching

Mismatch with resume

Claims do not align with hands-on examples

Indicates fabricated experience

Camera positioning avoidance

Candidate sits partially off-frame

Suggests someone else is nearby

Knowledge collapse

Cannot explain answers in follow-up depth

Indicates memorized or generated responses

These signals do not prove fraud.
They indicate verification is required.

How Proxy Interviews Are Organized

Most proxy interviews follow recognizable patterns:

  1. The real candidate provides access to job description, internal interview prep, or LinkedIn recruiter messages.

  2. A substitute expert trains on the role and prepares a library of answers or walkthroughs.

  3. The expert takes the live interview, sometimes using:

    • Virtual backgrounds or blurred video

    • Voice modification

    • Off-camera coaching and whisper relays

    • Hidden earpieces or remote assistance tools

In some cases, the original candidate appears only for onboarding video calls.

https://www.indiatoday.in/amp/trending-news/story/bengaluru-man-shares-text-from-linkedin-user-asking-him-to-be-a-proxy-in-interviews-2803524-2025-10-15

Common AI and Proxy Answer Scripts Recruiters See

Below are common phrasing patterns that show up in real proxy assisted interviews:

Pattern A: The “Perfect Textbook Explanation”

“This follows a modularized microservice pattern in which each service is independently deployable with horizontally scalable compute resources for distributed load management.”

Red flag: Surface-level correctness without context or personal contribution.

Pattern B: The “Overly Structured Answer”

“I will now answer your question in three steps. Step one is context. Step two is analysis. Step three is recommendation.”

Red flag: Scripted delivery, not natural reasoning.

Pattern C: The “Vague Ownership Claim”

“We handled that as a team. I was involved in some parts of the process.”

Red flag: No examples, no artifacts, no decision ownership.

Identity Verification Script for Recruiters (Non-accusatory)

Use this live in-call when concerns appear:

I want to make sure we are speaking with the same person who applied for this role. Before we continue, could you turn your camera slightly toward the light and hold your face clearly in frame. If you have any connectivity or accessibility needs, just let me know and I am happy to accommodate.

If the candidate resists or refuses:

  • Pause the interview

  • Document the reason

  • Reschedule with identity verification step

Official Follow-Up Response Template (Email)

Subject: Next Steps in Interview Process

Hi [Candidate Name],

Thank you for your time today. As part of our standard hiring process, we require identity and work authentication to ensure fairness and accuracy in evaluation. Before continuing, we will need to complete a brief verification step. You will receive a secure link shortly.

Please let us know if you require any accommodation.

Thank you,
[Recruiter Name]
[Company]

This avoids accusation, protects dignity, and maintains compliance.

If Proxy Participation Is Confirmed

Your response must be professional, documented, and neutral.

Hi [Candidate Name],

We were unable to confirm identity alignment during the interview session. Because our hiring process requires that all interviews reflect the candidate’s own experience and capabilities, we will not be able to continue with the current application.

We wish you the best in your ongoing job search

No emotional language. No moral statements. No confrontation.

Internal Documentation Note (For Audit Logs)

Interview paused due to verification inconsistency. Candidate identity could not be confirmed. No evaluation was recorded. Case closed with neutrality and compliance protocol followed

This protects your company in:

  • Discrimination claims

  • Offer disputes

  • Contractor liability audits

SHRM emphasizes that maintaining complete, accurate, and neutral audit logs is key to managing HR risk and ensuring compliance. According to SHRM’s “Risk Management” guidance, a strong documentation protocol - especially one that carefully records decision points and maintains neutrality- helps organizations defend themselves in discrimination claims, offer disputes, and other legal challenges.

How Interview Intelligence Platforms Address Proxies?

Tools like Sherlock AI do not just watch for visual red flags. They analyze:

  • Reasoning continuity

  • Fluency changes when constraints shift

  • Problem solving pace under pressure

  • Ability to explain decisions backward and forward

If reasoning patterns break, the interview produces a signal.

This approach focuses on whether the thinking belongs to the candidate.

How AI Interview Platforms Access Calendar Data and What Recruiters Should Know

Interview intelligence platforms often integrate with Google Calendar, Outlook, or enterprise scheduling tools. The integration allows the platform to automatically detect upcoming interviews and join them as an observer or note-taker.

However, hiring teams must understand how permissions work and how data is protected.

The key principle is that calendar access should be read-only and scoped, not unrestricted.

What Calendar Integration Actually Does

When you connect the platform to your calendar, the platform typically needs permission to:

  • Read event details

  • Detect interview titles or attendees

  • Generate meeting join links

  • Join the call as a participant or silent recorder

The platform should not require:

  • Access to emails

  • File storage access

  • Permission to modify or delete calendar events

SOC2 and GDPR compliant platforms scope calendar OAuth access to event metadata only.

Security Principles to Confirm Before Approval

Security Requirement

Why It Matters

Read-only permission scope

Ensures no calendar entries can be altered

No email inbox access

Prevents confidential data exposure

Encryption at rest and in transit

Protects candidate identity and interview content

Audit logging

Allows compliance and legal teams to track access behavior

Configurable data retention

Ensures you do not store interview content longer than necessary

Sherlock, for example, uses:

  • Calendar event read-only access

  • Zero modification permissions

  • Encrypted transcription and notes

  • Region-specific data residency options

  • Granular retention controls

This ensures legal, compliance, and audit teams maintain control.

How to Explain This to Stakeholders

The right narrative is not “the system joins interviews”.

It is: We are automating interview documentation, compliance, and identity verification while maintaining strict data boundaries.

This reduces manual work, strengthens hiring decisions, and protects candidate fairness.

Conclusion

Proxy interviews are no longer rare. They are part of the modern hiring environment.
The solution is not confrontation, but:

  • Clear policy

  • Identity verification workflows

  • Professional communication

  • Audit-ready documentation

You are not preventing candidates from preparing.
You are protecting the integrity of the job, the team, and the outcome.

© 2025 WeCP Talent Analytics Inc. All rights reserved.

© 2025 WeCP Talent Analytics Inc. All rights reserved.

© 2025 WeCP Talent Analytics Inc. All rights reserved.