SELECT LANGUAGE BELOW

How an Arizona woman assisted North Korean workers in entering US companies

How an Arizona woman assisted North Korean workers in entering US companies

Cyber Operations Center Discovered in Suburban Arizona

This isn’t a plot from a Netflix drama; it really unfolded in a quiet area known as Litchfield Park, about 20 minutes from Phoenix.

Christina Chapman, a 50-year-old woman, seemed like your typical suburbanite. But hidden within her unassuming home was a secret cyber operations hub designed to assist North Korean IT workers in acquiring military supplies by breaching numerous U.S. firms.

Guilty Plea in North Korean Infiltration Case

The above image gives just a glimpse into her operation.

North Korean employees can’t just hop on job sites like LinkedIn or apply to companies like Google or Amazon, given the sanctions. So, they resort to a different tactic.

They illegally assume real American identities, complete with names, birthdays, and social security numbers, to blend in as remote IT staff and infiltrate American businesses without raising eyebrows.

Of course, if a company provides these “remote new hires” with a laptop and phone, how does that get to Pyongyang? That part’s tricky.

Christina’s Role

For three years, Christina transformed her ordinary home into a covert base supporting North Korean cybercriminals.

She managed to gather over 100 laptops and smartphones from various U.S. companies, including major banks and significant tech firms, and even at least one government contractor.

Employers thought they were hiring remote workers based in the U.S. Little did they know they were sending equipment to North Korean agents.

Once delivered, Chapman set up a VPN and remote desktop tools like AnyDesk and Chrome Remote Desktop. She also utilized voice-altering software to make it seem as if these operatives were logging in from the U.S. She even shipped 49 laptops and other gear to overseas locations, notably to cities in China bordering North Korea.

Scheme Unfolds

These fake workers were basically siphoning American resources and cash straight into the hands of the Kim regime.

If human resources needed video verification, Chapman would jump in, dressed up and pretending to be the person on the resume. She orchestrated the entire setup like a talent agency for cybercriminals, conducting mock interviews and laundering paychecks through U.S. banks.

Her take? At least $800,000 in “service fees.” Yet, the FBI estimated that North Korea ultimately made off with over $17 million, considering it a significant national security threat. Chapman described her efforts as “helping a friend.” Seriously.

Cracking the Case

Eventually, the scheme began to fall apart. Investigators spotted unusual trends, such as multiple remote workers all using the same Arizona address and accessing company systems from unfamiliar countries.

Chapman was apprehended and sentenced to over eight years in federal prison in July 2025.

And the most surprising part? She pulled it all off right from her living room. Talk about a new kind of remote work!

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News