Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm

Posted on July 28, 2025July 28, 2025 By CWS

An Arizona girl acquired a big federal jail sentence for orchestrating a classy cybercrime operation that enabled North Korean Info Know-how (IT) employees to infiltrate a whole bunch of American firms whereas producing thousands and thousands in income for the Democratic Folks’s Republic of Korea (DPRK). 

The case represents one of many largest documented situations of state-sponsored employment fraud focusing on U.S. firms and highlights important vulnerabilities in distant work verification techniques.

Key Takeaways1. Arizona girl sentenced to 102 months for serving to North Korean IT employees infiltrate 309 U.S. firms.2. Operated a “laptop computer farm” to deceive firms whereas delivery gadgets to North Korean operatives.3. Focused Fortune 500 firms, prompting new federal safety steerage.

Identification Theft and Employment Fraud Scheme

Christina Marie Chapman, 50, of Litchfield Park, Arizona, was sentenced to 102 months in federal jail for her central function in a fancy fraud community that spanned a number of years and compromised 309 U.S. companies. 

The scheme concerned systematic identification theft of 68 U.S. residents, whose private data was used to create false employment profiles for North Korean IT employees in search of distant positions at main American firms.

Chapman operated what investigators termed a “laptop computer farm” from her residence, the place she acquired and hosted company-issued computer systems, creating the phantasm that work was being carried out domestically. 

Laptop computer Farm

The technical infrastructure included direct deposit techniques configured to funnel wages into Chapman’s U.S. monetary accounts, refined payroll test forgery operations, and worldwide delivery networks that transported 49 laptops and different company gadgets to abroad places, together with cities alongside the China-North Korea border. 

Regulation enforcement seized greater than 90 laptops through the execution of a search warrant in October 2023.

The focused firms represented various sectors of the American economic system, together with Fortune 500 firms, a serious tv community, Silicon Valley expertise corporations, aerospace producers, automotive firms, luxurious retailers, and media conglomerates. 

North Korean operatives maintained detailed goal repositories of firms they sought to infiltrate and tried unsuccessful penetrations of two U.S. authorities companies.

Chapman’s Sentencing

U.S. District Court docket Choose Randolph D. Moss imposed further penalties, together with three years of supervised launch, forfeiture of $284,555.92 supposed for North Korean operatives, and a judgment of $176,850. 

Chapman pleaded responsible to conspiracy to commit wire fraud, aggravated identification theft, and conspiracy to launder financial devices on February 11.

The investigation, performed by FBI Phoenix Subject Workplace and IRS Legal Investigation Phoenix Subject Workplace, revealed that the scheme generated over $17 million in illicit income. 

Appearing Assistant Legal professional Basic Matthew R. Galeotti emphasised that the operation “exploited greater than 300 American firms and authorities companies” whereas funding the DPRK regime. 

This occasion led to improved company safety procedures for digital worker verification and coordinated federal directions for HR consultants on figuring out makes an attempt by North Korean IT employees to infiltrate.

Expertise sooner, extra correct phishing detection and enhanced safety for your corporation with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Arizona, Farm, Helping, Korean, Laptop, North, Operating, Sentenced, Woman, Workers

Post navigation

Previous Post: Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Next Post: 10 Best Cloud Monitoring Tools in 2025

Related Posts

Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Cyber Security News
Developers Beware of npm Phishing Email That Steal Your Login Credentials Cyber Security News
Threat Modeling for DevSecOps Practical Guide Cyber Security News
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild Cyber Security News
CoinDCX Hacked – $44.2 million Wiped off From the Platform Cyber Security News
50,000+ Azure AD Users Access Token Exposed From Unauthenticated API Endpoint Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS
  • NASCAR Confirms Personal Information Stolen in Ransomware Attack
  • Threat Actors Claiming Breach of Airpay Payment Gateway
  • Root Evidence Launches With $12.5 Million in Seed Funding
  • Scattered Spider Targeting VMware vSphere Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UNC3886 Hackers Exploiting 0-Days in VMware vCenter/ESXi, Fortinet FortiOS, and Juniper Junos OS
  • NASCAR Confirms Personal Information Stolen in Ransomware Attack
  • Threat Actors Claiming Breach of Airpay Payment Gateway
  • Root Evidence Launches With $12.5 Million in Seed Funding
  • Scattered Spider Targeting VMware vSphere Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News