An Arizona woman and TikTok influencer has received a multi-year prison sentence for helping North Korean IT workers fraudulently secure remote jobs at over 300 U.S. companies. Christina Marie Chapman, 50, was sentenced to 102 months in prison by a…An Arizona woman and TikTok influencer has received a multi-year prison sentence for helping North Korean IT workers fraudulently secure remote jobs at over 300 U.S. companies. Christina Marie Chapman, 50, was sentenced to 102 months in prison by a…

US TikTok influencer helped North Korean operatives land jobs at 300 Companies: DOJ

2025/07/25 17:15
4분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

An Arizona woman and TikTok influencer has received a multi-year prison sentence for helping North Korean IT workers fraudulently secure remote jobs at over 300 U.S. companies.

Summary
  • U.S. TikTok influencer Christina Chapman was sentenced to 102 months for helping North Korean IT workers secure remote jobs at U.S. companies.
  • Chapman operated a “laptop farm” in Arizona, aiding DPRK operatives in laundering over $17 million through stolen identities.
  • DOJ alleges the scheme exposed sensitive U.S. firms—including aerospace and tech—to foreign infiltration.

Christina Marie Chapman, 50, was sentenced to 102 months in prison by a federal judge in Washington, D.C., after pleading guilty to charges of wire fraud conspiracy, aggravated identity theft, and money laundering conspiracy.

The sentence also includes three years of supervised release. She was ordered to forfeit more than $284,000 and pay $176,850 in restitution.

Chapman operated a “Laptop Farm” for North Korean operatives

According to U.S. authorities, Chapman played a central role in enabling North Korean IT workers to pose as U.S. citizens in order to obtain remote tech jobs. 

Starting around 2020, she operated a “laptop farm” out of her home in Arizona, where computers sent by U.S. companies were connected to remote operatives overseas. 

Using this setup, the bad actors—based largely in China and near North Korea—were able to mask their true locations and appeared as though they were working from within the United States.

Investigators say Chapman went further by shipping at least 49 devices to overseas locations, including a city near the China–North Korea border. A search of her home in October 2023 resulted in the seizure of over 90 laptops, many labeled with the identities of Americans whose personal information had been stolen or borrowed to commit fraud.

What does the Department of Justice allege?

The Department of Justice accused Chapman of helping North Korean workers submit false job applications under stolen U.S. identities, receive wages through U.S. banks, and launder earnings through her own accounts. 

She reportedly forged payroll checks and received direct deposits from the companies that unknowingly hired the North Korean operatives. The income was then transferred overseas while falsely reported to the IRS and the Social Security Administration under the names of U.S. victims.

According to the complaint, Chapman’s actions helped generate over $17 million in illicit revenue for herself and the Democratic People’s Republic of Korea. 

Prosecutors said her efforts also put sensitive American infrastructure at risk by allowing foreign operatives to gain virtual access to Fortune 500 firms, government agencies, aerospace companies, and Silicon Valley tech firms.

Chapman’s operation has been active for several years and was one of the largest of its kind tied to North Korean infiltration efforts.

In total, at least 68 stolen identities were used to deceive 309 U.S. businesses and two international companies. Some job applications even targeted U.S. government agencies, although these attempts were reportedly unsuccessful.

The DOJ’s investigation revealed that Chapman not only managed and organized the hardware infrastructure but also maintained detailed records linking each device to a specific company and identity.

“Today’s sentencing brings justice to the victims whose identities were stolen for this international fraud scheme,” said Special Agent in Charge Carissa Messick of the IRS Criminal Investigation.

Crypto industry remains at risk

Over the years, the North Korean regime has siphoned billions of dollars worth of cryptocurrency assets to fund its sanctioned weapons programs. 

U.S. intelligence reports and private investigations have shown that the DPRK deploys thousands of skilled IT professionals overseas, many of whom use VPNs, fake documents, and stolen identities to embed themselves within Western companies.

A report by Chainalysis found that North Korea-linked hackers stole $1.34 billion in cryptocurrency in 2024 alone. The crypto industry has proven to be a frequent target due to its decentralised nature and relatively relaxed hiring protocols for remote roles.

U.S. agencies have escalated efforts to disrupt North Korea’s IT infiltration network by targeting key infrastructure and operatives.

Despite these efforts, U.S. officials estimate that hundreds of DPRK-linked workers remain embedded in firms worldwide, including in the crypto space.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!