Security

Cyber-crime

Arizona laptop farmer pleads guilty for funneling $17M to Kim Jong Un

300+ US companies, 70+ individuals hit by the fraudsters


An Arizona woman who created a "laptop farm" in her home to help fake IT workers pose as US-based employees has pleaded guilty in a scheme that generated over $17 million for herself... and North Korea.

Christina Marie Chapman pleaded guilty to conspiracy to commit wire fraud, aggravated identity theft, and conspiracy to launder monetary instruments in a US District Court on Tuesday.

She is scheduled to be sentenced on June 16, and under the terms of her plea deal, all parties will recommend the court put her behind bars for between 94 and 111 months. Chapman was arrested in May.

According to court documents, Chapman ran a laptop farm out of her home from October 2020 to October 2023. During this time she hosted computers for overseas IT workers — who were posing as American citizens and residents — to ensure the devices had local IP addresses, making them appear to be in the US.

Chapman also helped the foreign fraudsters steal the identities of more than 70 US nationals, then use those identities to apply for remote IT jobs, according to the Feds. 

Those who successfully obtained employment as part of the scam then received payroll checks at Chapman's home with direct deposits sent to her US bank accounts before ultimately being laundered and funneled to North Korea, and then potentially contributing to the DPRK's weapons programs, the court document says.

It's unclear how much of the ill-gotten gains Chapman pocketed, but according to the Justice Department, Chapman's overseas IT workers received more than $17.1 million for their work. Much of the income was falsely reported to the IRS and Social Security Administration in the names of real US individuals whose identities had been stolen.

Some of the overseas workers were hired at Fortune 500 companies, including a top-five television network, a premier Silicon Valley technology company, an aerospace and defense manufacturer, an American car manufacturer, a luxury retail chain, and a US-hallmark media and entertainment company.

The Norks specifically targeted some of these companies, likely for their sensitive IP and other valuable data in addition to providing a paycheck, and even "maintained postings for companies at which they wanted to insert IT workers," according to the DOJ.

In total, more than 300 US companies were scammed, and more than 70 people had false tax liabilities created in their name. Additionally, phony documents were submitted to the Department of Homeland Security on more than 100 occasions.

These types of scams have netted Pyongyang at least $88 million over six years. Earlier this week, The Register interviewed someone who was twice targeted. In both cases, the fraudsters used AI-based tools during video interviews with — wait for it — a security startup using AI to find vulnerabilities. ®

Send us news
20 Comments

I'm a security expert, and I almost fell for a North Korea-style deepfake job applicant …Twice

Remote position, webcam not working, then glitchy AI face ... Red alert!

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

North Korea targets crypto developers via NPM supply chain attack

Yet another cash grab from Kim's cronies and an intel update from Microsoft

SonicWall firewalls now under attack: Patch ASAP or risk intrusion via your SSL VPN

Roses are red, violets are blue, CVE-2024-53704 is sweet for a ransomware crew