
North Korea has been quietly pocketing millions from unsuspecting U.S. companies and citizens with a brazen cyber fraud scheme that exposes just how vulnerable our borders—and our businesses—have become in this era of remote work and lax security.
At a Glance
- North Korean operatives infiltrated 309 U.S. companies, including major Fortune 500 firms, using stolen American identities and remote work fraud.
- Arizona resident Christina Chapman was sentenced to 102 months in prison for enabling the scheme, which funneled $17 million to North Korea’s weapons programs.
- Federal agencies seized nearly 100 laptops and continue to warn that North Korea’s IT worker network remains highly active, generating up to $600 million a year.
- The surge in remote work during COVID-19 opened the door for foreign actors to pose as U.S.-based employees, turning basic hiring into a national security risk.
North Korea’s Cybercrime Empire: U.S. Companies Under Siege
North Korea’s regime has long relied on cyber operations to fund its rogue weapons programs, but the scale of its latest infiltration is staggering. Over the last several years, Pyongyang has shifted from old-school espionage to outright cybercrime and remote IT work fraud, deploying thousands of trained operatives worldwide. COVID-19, with its explosion in remote work, handed Kim Jong Un’s hackers the perfect cover: fake American workers, logging in from afar, siphoning money and secrets from the heart of the U.S. economy. The result? Not just a handful of companies fooled—309 U.S. firms and counting, including some of our biggest corporate icons, duped by North Korean imposters using stolen identities and ghost laptops set up by stateside accomplices.
The U.S. Department of Justice has described the situation as a “code red” for national security. What makes this sting even more outrageous is how easily it unfolded: a single Arizona woman, Christina Chapman, managed the technical infrastructure, orchestrating a network of fake workers and nearly 100 laptops that helped North Korean operatives land jobs as supposed U.S. techies. The scam poured at least $17 million directly into the regime’s pockets—money now fueling the very missile programs aimed at threatening our allies and soldiers abroad.
Inside the Chapman Case: How a U.S. Citizen Helped Fund Kim’s War Machine
Christina Chapman’s sentencing in July 2025 marked a rare public win for law enforcement, but it barely scratched the surface of the problem. Chapman, motivated by greed and with a shocking disregard for her country, enabled North Korean agents to pose as legitimate American IT workers. She provided stolen identities, managed devices, and handled logistics, all while collecting a cut of the ill-gotten gains. The Department of Justice and FBI raided her Arizona home, seizing more than 90 laptops, with dozens more shipped overseas to help the North Korean network operate undetected.
Investigators found Chapman’s operation responsible for millions in direct payments to North Korea’s notorious Munitions Development Department. The munitions division—responsible for nuclear and missile programs—used these funds to skirt international sanctions. By the time Chapman was sentenced, the DOJ estimated her network had helped North Korea steal $17 million. But this is just one cell in a much larger operation: U.S. authorities now believe North Korea’s IT worker schemes generate between $250 and $600 million annually, much of it flowing through cryptocurrency channels that are nearly impossible to trace or recover.
America’s Remote Work Weakness: How Did This Happen?
The rise of remote work—accelerated by draconian COVID-era policies—opened the floodgates for fraud. With companies desperate to fill tech roles and onboarding happening entirely online, North Korean operatives exploited every weakness in background checks and digital verification. Fake identities, fake resumes, and a web of middlemen made it child’s play to slip undetected into America’s most sensitive industries. The FBI and DOJ have issued repeated warnings, but the message seems lost on too many corporate leaders. Even now, as the Chapman case fades from headlines, North Korea’s cyber army keeps adapting, finding new ways to worm into U.S. networks and payrolls.
Left unchecked, this is more than a financial threat. Every dollar stolen is a blow to American workers, a theft from our intellectual property, and a direct subsidy to a regime that dreams of nuclear blackmail. The fact that this could happen in the world’s most advanced economy—while politicians and bureaucrats were busy pushing their own ridiculous agendas—should infuriate every taxpayer and every patriot.
Corporate America and Washington: Wake Up or Keep Paying the Price
Industry experts and federal officials agree: North Korea’s cyber-enabled fraud is now a central pillar of its sanctions evasion strategy. Chainalysis, the leading blockchain security firm, warns that IT worker fraud and crypto theft are lifelines for Kim’s regime. The DOJ and FBI urge companies to overhaul their hiring practices, double down on employee verification, and finally take the threat as seriously as it deserves. But with the remote work genie out of the bottle, the vulnerabilities are far from fixed. Tech companies, in particular, are scrambling to invest in cybersecurity, identity verification, and “zero trust” architectures that assume every login could be a wolf in sheep’s clothing.
The implications stretch far beyond the balance sheet. For every American whose identity was stolen, for every company forced to spend millions on compliance and security, and for every taxpayer who watches their hard-earned dollars funneled into foreign hands, the message is clear: our enemies are exploiting our openness, our technology, and our complacency. This is the cost of ignoring national security in the pursuit of political correctness and globalist fantasies. If the Chapman case teaches us anything, it’s that the era of trust-but-don’t-verify is over. The only question is whether America’s leaders and business titans are finally ready to get serious—or if they’ll keep letting hostile regimes cash in on our mistakes.
Sources:
FBI Public Service Announcement (2025-02-26)