
Ninety laptops, millions of dollars: US woman jailed over North Korea remote-work scam
As working from home became the norm for many people, Chapman was able to find jobs for the foreign workers at hundreds of US companies, including some in the Fortune 500, such as Nike; 'a premier Silicon Valley technology company'; and one of the 'most recognizable media and entertainment companies in the world'.
The employers thought they were hiring US citizens. They were actually people in North Korea.
Chapman was participating in the North Korean government's scheme to deploy thousands of 'highly skilled IT workers' by stealing identities to make it look like they were in the US or other countries. They have collected millions of dollars to boost the government's nuclear weapons development, according to the US justice department and court records.
Chapman's bizarre story – which culminated in an eight-year prison sentence – is a curious mix of geopolitics, international crime and one woman's tragic tale of isolation and working from home in a gig-dominated economy where increasingly everything happens through a computer screen and it is harder to tell fact from fiction.
The secret North Korean workers, according to the federal government and cybersecurity experts, not only help the US's adversary – a dictatorship which has been hobbled by international sanctions over its weapons program – but also harm US citizens by stealing their identities and potentially hurt domestic companies by 'enabling malicious cyber intrusions' into their networks.
'Once Covid hit and everybody really went virtual, a lot of the tech jobs never went back to the office,' said Benjamin Racenberg, a senior intelligence manager at Nisos, a cybersecurity firm.
'Companies quickly realized: I can get good talent from anywhere. North Koreans and other employment fraudsters have realized that they can trick hiring systems to get jobs. I don't think that we have done enough as a community to prevent this.'
To run the schemes, the North Koreans need facilitators in the United States, because the companies 'aren't going to willingly send laptops to North Korea or even China', said Adam Meyers, head of counter-adversary operations for CrowdStrike, a cybersecurity firm.
'They find somebody that is also looking for a gig-economy job, and they say, 'Hey, we are happy to get you $200 per laptop that you manage,'' said Meyers, whose team has published reports on the North Korean operation.
Chapman grew up in an abusive home and drifted 'between low-paying jobs and unstable housing', according to documents submitted by her attorneys. In 2020, she was also taking care of her mother, who had been diagnosed with renal cancer.
About six months after the LinkedIn message, Chapman started running what law enforcement officials describe as 'laptop farms'.
In addition to hosting computers, she helped the North Koreans pose as US citizens by validating stolen identity information; sent some laptops abroad; logged into the computers so that the foreign workers could connect remotely; and received paychecks and transferred the money to the workers, according to court documents.
Meanwhile, the North Koreans created fictitious personas and online profiles to match the job requirements for remote IT worker positions. They often got the jobs through staffing agencies.
In one case, a 'top-five five national television network and media company' headquartered in New York hired one of the North Koreans as a video-streaming engineer.
The person posing as 'Daniel B' asked Chapman to join a Microsoft Teams meeting with the employer so that the co-conspirator could also join. The indictment does not list victims' full names.
'I just typed in the name Daniel,' Chapman told the person in North Korea, according to court records of an online conversation. 'If they ask WHY you are using two devices, just say the microphone on your laptop doesn't work right.'
'OK,' the foreign actor responded.
'Most IT people are fine with that explanation,' Chapman replied.
Chapman was aware that her actions were illegal.
'I hope you guys can find other people to do your physical I-9s. These are federal documents. I will SEND them for you, but have someone else do the paperwork. I can go to FEDERAL PRISON for falsifying federal documents,' Chapman wrote to a group of her co-conspirators.
Chapman was also active on social media. In a video posted in June 2023, she talked about having breakfast on the go because she was so busy, and her clients were 'going crazy!', Wired reported.
Behind Chapman were racks with at least a dozen open laptops with sticky notes. In October 2023, federal investigators raided her home and found 90 laptops. In February this year, she pleaded guilty to conspiracy to commit wire fraud, aggravated identity theft and conspiracy to launder monetary instruments.
Over the three years that Chapman worked with the North Koreans, some of the employees received hundreds of thousands of dollars from a single company. In total, the scheme generated $17m for Chapman and the North Korean government.
The fraudsters also stole the identities of 68 people, who then also had false tax liabilities, according to the justice department.
In a letter to the court before her sentencing, Chapman thanked the FBI for arresting her because she had been 'trying to get away from the guys that I was working with for awhile [sic] and I wasn't really sure how to do it'.
'The area where we lived didn't provide for a lot of job opportunities that fit what I needed,' Chapman wrote. 'To the people who were harmed, I send my sincerest apologies. I am not someone who seeks to harm anyone, so knowing that I was a part of a company that set out to harm people is devastating to me.'
Last week, US district court judge Randolph Moss sentenced Chapman to more than eight years in prison; to forfeit $284,000 that was to be paid to the North Koreans, and to pay a fine of $176,000.
Chapman and her co-conspirators were not the only ones conducting such fraud. In January, the federal government also charged two people in North Korea, a Mexican citizen and two US citizens for a scheme that helped North Korean IT workers land jobs with at least 64 US companies and generated at least $866,000 in revenue, according to the justice department.
Racenberg, of Nisos, said he expected cybercriminals to use artificial intelligence to 'get better and better' at performing such schemes.
Companies should conduct 'open-source research' on applicants because oftentimes the fraudsters reuse résumé content, Racenberg said.
'If you put the first few lines of the résumé in, you might find two, three other résumés online that are exactly the same with these very similar companies or similar dates,' Racenberg added. 'That should raise some flags.'
During an interview, if there is background noise that sounds like a call center or if the applicant refuses to remove a fake or blurred background, that could also be cause for concern, Meyers, of CrowdStrike, said.
And companies should ask new hires to visit the office to pick up their laptop rather than mail it to them because that allows the company to see if the person who shows up is the same one you interviewed, Racenberg said.
Five years after the pandemic, more companies have also started to require employees to return to the office at least part time. If all corporations did that, would it eliminate the threat?
'It's going to prevent all of this from happening, yes,' Racenberg said. 'But are we going to go back to that? Probably not.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Independent
2 hours ago
- The Independent
Minnesota man gets 28 years for pandemic-era food fraud
A federal judge on Wednesday sentenced a leader of a sprawling, pandemic-era food fraud plot in Minnesota to 28 years in prison. Abdiaziz Shafii Farah, 36, must also pay nearly $48 million in restitution. He faces potentially more years in prison at a later sentencing hearing after previously pleading guilty in a juror bribery case involving a bag of $120,000 in cash. Farah is one of dozens of people charged in the Feeding Our Future case in which prosecutors alleged a scheme to steal $300 million from a federally funded program meant to feed children during the coronavirus pandemic. Farah and several co-defendants went to trial last year where he was convicted of 23 of 24 counts against him. Those offenses include multiple counts of federal programs bribery, wire fraud and money laundering. Prosecutors said Farah exploited the program by opening fraudulent sites where he claimed to be serving meals to thousands of children a day. Farah and his associates falsified meal counts and invoices, including fake children's names, prosecutors said. He directed the stolen money to others and perpetuated the fraud through a 'pay-to-play' system," prosecutors said. He and his associates stole more than $47 million in program money, and Farah took more than $8 million over a year and a half period, according to prosecutors. He used that money to buy five luxury vehicles and real estate, including property in Kenya, prosecutors said. That overseas property and money prosecutors say Farah laundered via China are out of reach of U.S. law enforcement. In a statement, Acting U.S. Attorney Joseph Thompson said Farah 'has done untold damage to this state" by 'robbing us blind' after finding opportunity in Minnesota. The Associated Press left a phone message with and sent an email to an attorney for Farah for comment. Seventy-three people have been charged in connection with the Feeding Our Future case; 51 have been found guilty.


Daily Mail
4 hours ago
- Daily Mail
Four dead after medical plane crashes
Four people were killed when a medical transport plane crashed in northeastern Arizona on Tuesday. The plane, operated by CSI Aviation of Albuquerque, New Mexico, was en route to pickup a patient from a hospital when it crashed and caught fire near Chinle Airport at around 12.40pm. The Navajo Police Department Chinle District, Navajo EMS and Navajo Nation Fire and Rescue Services rushed to the scene, and all four people on board were pronounced dead. The victims have not yet been identified, but their next of kin have been notified about their untimely passing. In the meantime, all access to the Chinle Airport is closed as the investigation continues. The National Transportation Safety Board and the Federal Aviation Administration is also en route to probe what may have caused the fatal collision. 'This is a tragic loss to the families of those onboard and to the medical air and first responder community,' the Navajo Police Department said in a statement. 'We extend our deepest condolences to their family and loved ones during this time.'


Scottish Sun
6 hours ago
- Scottish Sun
Woman vanishes after getting Scots bus sparking urgent police appeal as ‘concerns grow for safety'
Police Scotland has released details of the woman's appearance FIND HER Woman vanishes after getting Scots bus sparking urgent police appeal as 'concerns grow for safety' Click to share on X/Twitter (Opens in new window) Click to share on Facebook (Opens in new window) AN urgent hunt has been launched after a woman vanished from a bus station. Pauline Burke, 54, was last seen yesterday afternoon at the Galashiels Transport Interchange. Sign up for Scottish Sun newsletter Sign up Detectives are worried about her safety and are appealing for information on her whereabouts. Inspector Colin Deans said: 'Concerns are growing for Pauline's welfare and we need to make sure she is safe and well. 'Enquiries so far suggest she took a bus from Hawick to Galashiels. She may then have taken a train to Edinburgh and she also has connections in the Summerston area of Glasgow. 'We are asking anyone who has seen Pauline or knows where she might be to get in touch.' Pauline is around 5ft 2ins, of medium build with short, greying hair. She was last spotted wearing black trousers, a black body warmer and black Nike trainers. She also has reading glasses. Anyone with information is being urged to contact cops on the non-emergency 101 number. A Police Scotland spokesperson added: "Officers are asking for the help of the public to trace a 52-year-old woman reported missing from Hawick in the Scottish Borders. "Pauline Burke was last seen around 3.50pm on Tuesday, 5 August, at Galashiels Transport Interchange." Elsewhere a man has been arrested and charged after another was left seriously injured at a Scots caravan park. Emergency services raced to Whitecairn Caravan Park, Glenluce, Wigtownshire, after the alarm was raised last night. Police Scotland said a 35-year-old man was rushed to hospital for treatment after sustaining injuries. The force said there had been a disturbance involving a 38-year-old man who allegedly pulled a knife on officers. A force spokesperson said: "Around 1.30am on Wednesday, August 6, police were called to a report that a man had been found seriously injured in Whitecairn Caravan Park, Glenluce, Wigtownshire.