This isnât a ripped-from-the-headlines new Netflix series. This really happened in a quiet neighborhood called Litchfield Park thatâs about a 20-minute drive from Phoenix, Arizona.
Christina Chapman, 50, looked like your average middle-aged suburban woman. But inside her humble home? A secret cyber ops center built to help North Korean IT workers buy equipment and tools for their military by infiltrating hundreds of U.S. companies.Â
That picture above was just a small part of her setup.
đ°đľ Hereâs how it worked
North Korean workers arenât browsing LinkedIn or applying at Google, Amazon and Meta. They canât. Sanctions block them from working for American companies, at least legally. So what do they do?Â
They steal real Americansâ identities, including names, birth dates, Social Security numbers and more. Then, they use them to pose as remote IT workers, slipping into U.S. companies under anyoneâs radar.
But when companies send out laptops and phones to their âremote new hiresâ? Those devices canât exactly be shipped to Pyongyang.
đđťââď¸ Enter Christina
Over the course of three years, Christina turned her suburban home into a covert operations hub for North Koreaâs elite cybercriminals.
She received more than 100 laptops and smartphones shipped from companies all across the U.S. These werenât no-name startups. Weâre talking major American banks, top-tier tech firms and at least one U.S. government contractor.Â
All thought they were hiring remote U.S.-based workers. They had no idea they were actually onboarding North Korean operatives.
Once the gear arrived, Chapman connected the devices to VPNs, remote desktop tools like AnyDesk and Chrome Remote Desktop, and even rigged up voice-changing software.Â
The goal? To make it seem like the North Koreans were logging in from inside the United States. Chapman also shipped 49 laptops and other devices supplied by U.S. companies to locations overseas, including multiple shipments to a city in China on the border with North Korea.
đ¸ Follow the money
These fake employees âshowed upâ every day, submitting code, answering emails, taking meetings, all from halfway around the world. In reality, they were siphoning U.S. tech and cash straight into Kim Jong Unâs regime.
When HR teams requested video verification, Chapman didnât blink.Â
She jumped on camera herself, sometimes in costume, pretending to be the person in the rĂŠsumĂŠ. She ran the whole operation like a talent agency for cybercriminals, staging fake job interviews, coaching the operatives on what to say and even laundering their salaries through U.S. banks.
Her take? At least $800,000, paid as âservice fees.â
The total haul for North Korea? Over $17 million in stolen salaries, according to the FBI, which called the scheme a national security threat. Chapman called it âhelping her friends.â Really.
Eventually, the scam began to unravel. Investigators noticed odd patterns like dozens and dozens of remote hires all listing the same Arizona address, or company systems being accessed from countries the workers supposedly had never visited.
Chapman was arrested and sentenced in July 2025 to 102 months in federal prison.
And the wildest part? She did it all from her living room. Talk about working from home!
The post The suburban hacker house: She helped North Korea infiltrate American tech appeared first on Komando.com.