Live Intelligence

Hiring Threat
Intelligence

Real-time visibility into coordinated hiring fraud. Live data from the cantfool.com intelligence network — every screening makes the system smarter.

0
Applications Screened
0
Identity Links Found
0
Clusters Detected
0
Orgs Protected
0
Patterns Confirmed
Active Threat Network
22 clusters · 73 linked applications
Device / IP
Email / Phone
Resume
Background
Caller ID
ATTACK TAXONOMY

What the network detects

Five categories of coordinated hiring fraud, each identified through different signal combinations.

DOC
Resume Mills
30

Same author metadata detected across resumes from different candidates — indicates shared document preparation or automated resume generation.

NET
Device Sharing
1

Multiple distinct identities originating from the same physical device or IP cluster — a hallmark of coordinated submission campaigns.

ID
Identity Rings
46

Email addresses or phone numbers reused across candidates with different names — suggests centralized identity management.

PTN
Coordinated Backgrounds
0

Candidates sharing overlapping employment and education history with different identities — fabricated professional backgrounds.

TEL
Phone Handlers
1

Same caller ID name resolving across different candidate phone numbers — indicates a shared phone handler intercepting calls.

GRP
Intelligence Graph
517

Resolved entities (companies, institutions, people) in the intelligence graph — every screening enriches shared knowledge for future verifications.

30-Day Screening Activity
1,544 total screenings
Clear Review / Escalate
NETWORK IMMUNITY

The shared immune system

Every organization on cantfool.com contributes to a collective intelligence network. When one company detects a coordinated pattern, every other company is protected — without sharing a single piece of identifiable information.

4
Organizations
0
Shared Signals

All cross-organization intelligence uses HMAC-SHA256 hashing. No emails, names, or identifiable data ever leaves your account. k-anonymity thresholds ensure signals are only surfaced when corroborated across 3+ organizations.

How cross-org detection works

01
Hash & contribute

When you screen a candidate, identity signals (email, phone, device, resume) are HMAC-hashed and contributed to the consortium. No plaintext data leaves your tenant.

02
k-anonymous matching

Each new screening checks hashed signals against the consortium. Matches are only surfaced when the same signal appears across 3 or more organizations — preventing false correlation.

03
Silent protection

If a candidate's device fingerprint was seen at 4 other companies under different names, you'll know. The other companies remain anonymous. The signal speaks for itself.

Protect your pipeline.

100 free credits. No credit card required.
Every screening strengthens the network.

cantfool.comHiring verification that gets smarter with every customer.