> Once employed in a full-time role, fake workers are often very successful, since they sometimes have multiple people helping them to produce their work, with the hope of getting a promotion and gaining more privileged access to the IT systems.
I think the "fake" part is the long term play to get enough privilege to presumably perform a cybersecurity attack. But less "fake" and more "spy" from the description - the outlined scheme is literally what spies agencies do.
Perhaps fake is not the correct word, but the actual individuals are likely to have more than a few faked details. They do exist, of course.
It's also very dubious becuase, well, would you really hire a worker from an organization that also does things like hack hospitals and then hold systems hostage for bitcoin?