Categories: Uncategorized

She helped North Korea infiltrate American tech companies

This isn’t a ripped-from-the-headlines new Netflix series. This really happened in a quiet neighborhood called Litchfield Park that’s about a 20-minute drive from Phoenix.

Christina Chapman, 50, looked like your average middle-aged suburban woman. But inside her humble home? A secret cyber ops center built to help North Korean IT workers buy equipment and tools for their military by infiltrating hundreds of U.S. companies. 

WOMAN LEARNS FATE AFTER DOJ GUILTY PLEA ADMITTING SHE HELPED NORTH KOREAN TECH WORKERS INFILTRATE US COMPANIES

That picture above was just a small part of her setup.

North Korean workers aren’t browsing LinkedIn or applying at Google, Amazon and Meta. They can’t. Sanctions block them from working for American companies, at least legally. So what do they do? 

They steal real Americans’ identities, including names, birth dates, Social Security numbers and more. Then, they use them to pose as remote IT workers, slipping into U.S. companies under anyone’s radar.

But when companies send out laptops and phones to their “remote new hires”? Those devices can’t exactly be shipped to Pyongyang.

Over the course of three years, Christina turned her suburban home into a covert operations hub for North Korea’s elite cybercriminals.

She received more than 100 laptops and smartphones shipped from companies all across the U.S. These weren’t no-name startups. We’re talking major American banks, top-tier tech firms and at least one U.S. government contractor. 

All thought they were hiring remote U.S.-based workers. They had no idea they were actually onboarding North Korean operatives.

Once the gear arrived, Chapman connected the devices to VPNs, remote desktop tools like AnyDesk and Chrome Remote Desktop, and even rigged up voice-changing software. 

The goal? To make it seem like the North Koreans were logging in from inside the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea.

NORTH KOREA LASHES OUT AFTER TRUMP DOJ EXPOSES MASSIVE IT INFILTRATION SCHEME

These fake employees “showed up” every day, submitting code, answering emails, taking meetings, all from halfway around the world. In reality, they were siphoning U.S. tech and cash straight into Kim Jong Un’s regime.

When HR teams requested video verification, Chapman didn’t blink. 

She jumped on camera herself, sometimes in costume, pretending to be the person in the résumé. She ran the whole operation like a talent agency for cybercriminals, staging fake job interviews, coaching the operatives on what to say and even laundering their salaries through U.S. banks.

Her take? At least $800,000, paid as “service fees.”

The total haul for North Korea? Over $17 million in stolen salaries, according to the FBI, which called the scheme a national security threat. Chapman called it “helping her friends.” Really.

KIM JONG UN’S YOUNG DAUGHTER BEING GROOMED TO LEAD REGIME AFTER MILITARY PARADE VISIT IN CHINA: EXPERT

Eventually, the scam began to unravel. Investigators noticed odd patterns like dozens and dozens of remote hires all listing the same Arizona address, or company systems being accessed from countries the workers supposedly had never visited.

Chapman was arrested and sentenced in July 2025 to 102 months in federal prison.

And the wildest part? She did it all from her living room. Talk about working from home! 

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Devank Shrivastava

Share
Published by
Devank Shrivastava

Recent Posts

Tax season scams surge as filing confusion grows

Tax season already brings stress. In 2026, it brings added confusion. Changes to tax filing…

19 hours ago

AI wearable helps stroke survivors speak again

Losing the ability to speak clearly after a stroke can feel devastating. For many survivors,…

19 hours ago

Under Armour data breach claims trigger alerts for millions of users

Sportswear and fitness brand Under Armour is investigating claims of a massive data breach after…

2 days ago

Amazon Prime settlement could put money back in your pocket

Amazon has agreed to pay $2.5 billion to settle allegations brought by the Federal Trade…

2 days ago

Major US shipping platform left customer data wide open to hackers

Cargo theft is no longer just about stolen trucks and forged paperwork. Over the past…

2 days ago

YouTube lets parents limit or block Shorts for teens

YouTube is rolling out new parental controls designed to give families more say over how…

3 days ago