500 Companies FOOLED by North Korean Operatives!!

While American families struggle with soaring prices and uncertainty, North Korea has quietly raked in millions from Fortune 500 companies—using stolen American identities and our own remote work boom to bankroll its weapons program.

At a Glance

  • North Korea infiltrated 309 U.S. companies, including major tech firms, using a vast remote IT worker fraud network.
  • Arizona resident Christina Chapman sentenced to 102 months for enabling the scheme that funneled $17 million to North Korea’s munitions department.
  • The Department of Justice and FBI warn that North Korea’s cyber-espionage and IT fraud operations remain highly active and adaptive.
  • Experts say lax remote hiring practices and weak identity verification leave American companies dangerously exposed.

North Korean Infiltration: Exploiting U.S. Weakness for Profit

North Korea, a regime sanctioned to the hilt and cut off from honest trade, has turned to cyber-fraud as its cash cow—and Americans are footing the bill. According to the Justice Department and leading cybersecurity analysts, Kim Jong Un’s henchmen have systematically infiltrated hundreds of U.S. businesses by posing as remote IT professionals, using stolen or fake identities to get hired by unsuspecting American firms. These aren’t fringe startups, either. We’re talking about Fortune 500 companies, the supposed backbone of American innovation and security, writing checks to North Korean agents who use the proceeds to fund ballistic missiles and nuclear warheads. The root of the problem? The left’s obsession with remote work, open borders, and trust-based hiring—policies that play right into the hands of adversaries who laugh at our naivete and red tape.

Remember the pandemic? While millions of Americans were told to stay home, North Korea’s cyber operatives jumped at the chance. They exploited the remote work revolution—championed by Big Tech and the Biden-era bureaucracy—to worm their way into 309 American companies. By using nearly 100 laptops and 68 stolen identities, these operatives bilked $17 million from American firms with every penny helping to develop weapons pointed right back at us. The Department of Justice calls it a “code red” for our tech sector, yet progressives scoffed at the idea that remote hiring could be a national security risk. Now, the chickens have come home to roost.

Inside the Chapman Case: How an American Enabled North Korean Espionage

Christina Chapman, an Arizona resident, stands at the center of the largest North Korean IT fraud case ever prosecuted in the U.S. She wasn’t some shadowy hacker hiding behind a VPN; she was a neighbor, a citizen, and—ironically—a facilitator of America’s enemies. Chapman managed a network of nearly 100 laptops and orchestrated the use of 68 stolen American identities to help North Korean operatives pose as trustworthy U.S.-based IT workers. Her motivations? Cold, hard cash—never mind the fact that every dollar she funneled to Pyongyang’s munitions department was a dollar stolen from American workers and a boost to a hostile regime’s weapons program.

When federal agents raided her Arizona home in October 2023, they found more than 90 laptops and a paper trail leading to cities along the Chinese border—hotbeds for North Korean operatives. Chapman was sentenced to 102 months in prison, fined $176,850, and forced to forfeit more than $284,000. But as U.S. Attorney Jeanine Pirro made clear, dismantling Chapman’s operation is just the beginning. The broader North Korean network is still up and running, pulling in between $250 million and $600 million every year from Western companies too blind—or too politically correct—to see the wolf at the door.

The Broader Threat: Why American Companies and Policies Are Failing

Experts warn that North Korea’s cybercrime machine is only getting stronger. Chainalysis, a leading blockchain analytics firm, reports a record $2.17 billion in cryptocurrency thefts in the first half of 2025 alone, with North Korea responsible for the lion’s share. The ByBit crypto exchange hack—attributed directly to North Korean actors—cost $1.4 billion. Daily NK, a respected source of insights into North Korean operations, describes these cyber operatives as a “lifeline” for Kim’s regime. The DOJ and FBI are pounding the table, demanding that U.S. companies wake up and overhaul their hiring and verification procedures, but the inertia of corporate America and the lingering effects of leftist policies keep the door wide open.

Every American should be furious. Not only are our companies being fleeced, but our national security is being compromised—all while the government lectures us about “diversity” and “remote empowerment.” The regime in Pyongyang doesn’t care about pronouns or “equity.” They care about cash and chaos, and they’re getting both from American naivete. The tech sector, in particular, has been asleep at the wheel, relying on “trust but don’t verify” hiring that practically invites foreign adversaries to the table. If this level of incompetence and willful blindness continues, the next breach won’t just hit the balance sheet—it could cost lives.