Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm

Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm

Posted on July 28, 2025July 28, 2025 By CWS

An Arizona girl acquired a big federal jail sentence for orchestrating a classy cybercrime operation that enabled North Korean Info Know-how (IT) employees to infiltrate a whole bunch of American firms whereas producing thousands and thousands in income for the Democratic Folks’s Republic of Korea (DPRK). 

The case represents one of many largest documented situations of state-sponsored employment fraud focusing on U.S. firms and highlights important vulnerabilities in distant work verification techniques.

Key Takeaways1. Arizona girl sentenced to 102 months for serving to North Korean IT employees infiltrate 309 U.S. firms.2. Operated a “laptop computer farm” to deceive firms whereas delivery gadgets to North Korean operatives.3. Focused Fortune 500 firms, prompting new federal safety steerage.

Identification Theft and Employment Fraud Scheme

Christina Marie Chapman, 50, of Litchfield Park, Arizona, was sentenced to 102 months in federal jail for her central function in a fancy fraud community that spanned a number of years and compromised 309 U.S. companies. 

The scheme concerned systematic identification theft of 68 U.S. residents, whose private data was used to create false employment profiles for North Korean IT employees in search of distant positions at main American firms.

Chapman operated what investigators termed a “laptop computer farm” from her residence, the place she acquired and hosted company-issued computer systems, creating the phantasm that work was being carried out domestically. 

Laptop computer Farm

The technical infrastructure included direct deposit techniques configured to funnel wages into Chapman’s U.S. monetary accounts, refined payroll test forgery operations, and worldwide delivery networks that transported 49 laptops and different company gadgets to abroad places, together with cities alongside the China-North Korea border. 

Regulation enforcement seized greater than 90 laptops through the execution of a search warrant in October 2023.

The focused firms represented various sectors of the American economic system, together with Fortune 500 firms, a serious tv community, Silicon Valley expertise corporations, aerospace producers, automotive firms, luxurious retailers, and media conglomerates. 

North Korean operatives maintained detailed goal repositories of firms they sought to infiltrate and tried unsuccessful penetrations of two U.S. authorities companies.

Chapman’s Sentencing

U.S. District Court docket Choose Randolph D. Moss imposed further penalties, together with three years of supervised launch, forfeiture of $284,555.92 supposed for North Korean operatives, and a judgment of $176,850. 

Chapman pleaded responsible to conspiracy to commit wire fraud, aggravated identification theft, and conspiracy to launder financial devices on February 11.

The investigation, performed by FBI Phoenix Subject Workplace and IRS Legal Investigation Phoenix Subject Workplace, revealed that the scheme generated over $17 million in illicit income. 

Appearing Assistant Legal professional Basic Matthew R. Galeotti emphasised that the operation “exploited greater than 300 American firms and authorities companies” whereas funding the DPRK regime. 

This occasion led to improved company safety procedures for digital worker verification and coordinated federal directions for HR consultants on figuring out makes an attempt by North Korean IT employees to infiltrate.

Expertise sooner, extra correct phishing detection and enhanced safety for your corporation with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Arizona, Farm, Helping, Korean, Laptop, North, Operating, Sentenced, Woman, Workers

Post navigation

Previous Post: Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
Next Post: 10 Best Cloud Monitoring Tools in 2025

Related Posts

Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0 Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0 Cyber Security News
CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks CISA Warns of Linux Sudo Vulnerability Actively Exploited in Attacks Cyber Security News
Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Microsoft Confirms Error Entry in Windows Firewall With Advanced Security Cyber Security News
Princeton University Data Breach – Database with Donor Info Compromised Princeton University Data Breach – Database with Donor Info Compromised Cyber Security News
Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request Attackers Targeting Construction Firms Exploiting Mjobtime App Vulnerability Using MSSQL and IIS POST Request Cyber Security News
Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark