90 Laptops, Millions Lost: North Korea’s Remote Work Scam Targets Women | US News

In March 2020, coinciding with the onset of the Covid pandemic, Christina Chapman, a resident of Arizona and Minnesota, received a LinkedIn message inviting her to “become the face of the US” for her company, which sought foreign IT workers to facilitate remote employment.

As remote work became commonplace, Chapman successfully connected foreign workers with numerous US companies, including major players in the Fortune 500 like Nike, referred to as a “Premier Silicon Valley Technology Company,” and “one of the world’s most renowned media and entertainment firms.”

Employers believed they were hiring US citizens; however, they were actually North Koreans.

Chapman was entangled in a North Korean governmental initiative to deploy thousands of “highly skilled IT workers” by commandeering identities to present them as US citizens or from other nations. This scheme reportedly generated millions of dollars intended to fund the regime’s nuclear weapons development, as per US Department of Justice court records.

Chapman’s peculiar saga concluded with an eight-year prison term, serving as a bizarre mix of tragic narratives involving geopolitics, international crime, and the isolation of working from home in a gig economy heavily reliant on digital interactions, obscuring the line between fact and fiction.

Federal and cybersecurity experts warn that covert North Korean workers not only assist adversaries of the US but also aid oppressive regimes affected by international sanctions related to weapons development while jeopardizing the identities of American citizens and potentially undermining domestic companies through “malicious cyber intrusions.”

“After Covid hit and everyone transitioned to virtual work, many tech jobs never returned to the office,” noted Benjamin Racenberg, senior intelligence manager at NISOS, a cybersecurity firm.

“Companies quickly recognized that they could source talent globally, leading to a situation where North Korea and other fraudulent employment sources manipulated the hiring system to secure jobs.”

North Korea required a US intermediary to execute this scheme, as companies are “unwilling to ship laptops to North Korea or China,” explained Adam Meyers, anti-side effects director at cybersecurity company CrowdStrike.

“They recruit individuals seeking gigs, proposing, ‘Hey, I can get you $200 per laptop you manage,'” said Myers, whose team has released a report on North Korea’s tactics.

Chapman had a troubling upbringing, navigating “between low-paying jobs and unstable housing,” according to a document submitted by her attorney. In 2020, she was also tasked with caring for her mother, diagnosed with kidney cancer.

About six months after the LinkedIn communication, Chapman commenced operations described by law enforcement as “laptop farms.”

In facilitating these operations, she supported North Koreans in masquerading as US citizens through identity verification. She sent laptops abroad and logged onto them so foreign workers could connect remotely, with salaries funneled to workers as indicated by court records.

Meanwhile, North Koreans constructed online identities that aligned with job specifications for remote IT roles, often securing positions via staffing agencies.

In one instance, a “Top 5 National TV Network and Media Company” based in New York employed a North Korean as a video streaming engineer.

Individuals impersonating “Daniel B” requested Chapman to join a Microsoft team together with their employers to facilitate conspirators’ participation. The indictment does not disclose the full name of the victim.

“I just typed the name Daniel,” Chapman communicated to a North Korean, as per online chat records. “When I ask why you are using two devices, please respond that the laptop’s microphone is malfunctioning.”

“Okay,” the foreign participant replied.

“Most people will accept that explanation,” Chapman responded.

Chapman acknowledged the illegality of her actions.

“I hope you can find someone else to handle your physical I-9. Those are federal documents. I’ll send it to you, but I’ll have someone else handle the paperwork. If you’re caught, you could go to federal prison for forgery,” Chapman told her co-conspirators.

Chapman was also active on social media, posting in a June 2023 video about her hectic schedule while grabbing breakfast on the go, as reported by Wired.

Behind her was a rack with at least 12 open laptops. When federal agents raided her home in October 2023, they discovered 90 laptops. In February of the same year, she pled guilty to conspiracy to commit wire fraud, identity theft, and conspiracy to obfuscate financial products.

Throughout her three-year collaboration with North Korea, some employees amassed hundreds of thousands of dollars from single companies, generating a total of $17 million for Chapman and the North Korean regime.

The fraud operation also involved stealing the identities of 68 individuals, according to the Department of Justice.

In a letter to the court prior to her sentencing, Chapman expressed gratitude to the FBI for her arrest, stating she was attempting to escape from a long-time associate. “And I truly didn’t know how to do that.”

“The area we lived in provided few job opportunities that aligned with my needs,” Chapman wrote. “I sincerely apologize to those affected. I am not someone who seeks to harm others, so it’s devastating to realize I was part of a scheme that sought to inflict damage.”

Last week, U.S. District Judge Randolph Moss sentenced Chapman to over eight years in prison, seizing $284,000 intended for North Korea along with a $176,000 fine.

Chapman and her collaborators were not alone in such fraud; in January, the federal government indicted a scheme where two North Koreans, Mexican citizens, and two US citizens obtained positions in at least 64 US companies, generating over $866,000 in revenue, as reported by the Department of Justice.

Racenberg from NISOS expressed concern that cybercriminals will increasingly leverage artificial intelligence to enhance such schemes.

He advised companies to conduct “open-source research” on applicants, as fraudsters frequently replicate content from existing resumes.

“If you input the initial lines of your resume, you may discover two or three other resumes online that are strikingly similar, using identical companies or timelines,” Racenberg cautioned. “That should raise some red flags.”

During interviews, if background noises resemble a call center or if applicants refuse to remove a fake or blurry background, this should also raise concerns, according to Myers from CrowdStrike.

Businesses should also encourage new hires to visit offices and require the return of laptops directly rather than mailing them.

Five years after the pandemic, more companies are gradually insisting their employees return to the office at least part-time. If all businesses did the same, would that eradicate the threat?

“While this may reduce occurrences, it doesn’t guarantee everything will revert to former practices,” Racenberg commented. “However, the likelihood of reverting completely is quite low.”

Source: www.theguardian.com

British Student Jailed for Selling Phishing Kits Tied to £100 Million Scam | Cybercrime News

A 21-year-old student has been sentenced to seven years in jail for designing and distributing online kits responsible for £100 million worth of fraud.

Ollie Holman created phishing kits that replicated the websites of governments, banks, and charities, enabling criminals to steal personal information from unsuspecting victims.

In one instance, the kit was used to create a fake donation page for a charity, resulting in the theft of credit card details from individuals attempting to make contributions.

Based in East Court, northwest London, Holman produced and distributed 1,052 phishing kits targeting 69 organizations across 24 countries. He also offered tutorials on how to use the kits and established a network of nearly 700 contacts. The counterfeit websites included in the kits could store sensitive information such as login credentials and banking details.

It is believed that Holman marketed these kits from 2021 to 2023, earning approximately £300,000, with distribution carried out via the encrypted messaging platform Telegram.

Holman, who pursued a degree in electronics and computer engineering at the University of Kent in Canterbury, laundered the proceeds through a cryptocurrency wallet.

The London Police’s specialized card and payment crime unit initiated an investigation following intelligence from WMC Global regarding the sale of fraud kits online.

Holman was arrested in October 2023, with a search of his university accommodation leading to the seizure of his devices. Despite his arrest, he continued to provide support to kit buyers through his Telegram channel, prompting a re-arrest in May 2024.

Detectives found links between Holman’s computer and the creation of the kits, which were distributed throughout Europe; one kit was tied to a scam totaling around 1 million euros (£870,000).

Holman pleaded guilty to seven charges, including producing materials for fraud, aiding a criminal enterprise, and possessing criminal property. He received a seven-year sentence at Southwark Crown Court.

Following the sentencing, DS Ben Hurley remarked that Holman facilitated extensive global fraud. “The financial losses associated with Holman’s actions are in the millions. Despite his substantial profits from selling the software, he failed to comprehend the harm caused to victims,” he stated.

Sarah Jennings, a specialist prosecutor with the Crown Prosecutor’s Office, expressed her hope that the verdict serves as a warning to other fraudsters. “No matter how advanced your methods are, you cannot conceal yourself behind online anonymity or encrypted platforms,” she commented.

The CPS has indicated plans to return Holman to court to recover the illicit profits he earned from his criminal activities.

Source: www.theguardian.com

100,000 UK Taxpayer Accounts Compromised in £47 Million HMRC Phishing Scam

HM’s revenues and customs have experienced a loss of £47 million due to phishing scams that have compromised tens of thousands of tax accounts, a panel of lawmakers has been informed.

On Wednesday, two senior tax officials briefed the Treasury Commission, reporting that 100,000 individuals have been contacted or are being contacted after their accounts were locked as part of an “organized crime” investigation initiated last year.

John Paul Marks, CEO of HMRC, stated that the affected taxpayers will face “no financial loss.”

He explained to the committee: “About 0.2% of the Pay population is being notified, with approximately 100,000 individuals informed that unusual activity has been detected on their Pay accounts.”

Marks clarified that this pertains to individual workers’ payment accounts, not business accounts.

He further elaborated: “This incident involved organized crime phishing for identity data outside of the HMRC system, which unfortunately affects banks and other entities that utilize that data to set up Payer accounts for refunds or accessing existing accounts.”

He informed MPs of investigations into issues from last year that “involve jurisdictions beyond the UK,” which led to “arrests last year.”

Angela McDonald, HMRC’s deputy chief executive and second permanent secretary, added:


“Ultimately, we successfully protected £19 billion that was targeted during last year’s attacks.”

McDonald made it clear that this breach is “not a cyber attack, there has been no hacking, and data has not been extracted.”

She went on to state: “The act of compromising someone’s system to extract data and implement ransomware constitutes a cyber attack. That is not what transpired here.”

HMRC reported that it has secured the details of the affected accounts and has eliminated logins to prevent future unauthorized access.

Incorrect information has been purged from tax records, and authorities are verifying that no other details have been altered.

Affected individuals will receive notifications from HMRC within the next three weeks.

Marks noted that HMRC’s phone line experienced an outage on Wednesday afternoon, but this was “accidental” and would be “up and running” by Thursday.

A spokesperson for HMRC stated: “We have taken steps to safeguard our customers after identifying attempts to access a minimal amount of tax revenues and will collaborate with law enforcement both domestically and internationally to bring the culprits to justice.

“This was not a cyber attack; instead, it involved criminals utilizing personal information from phishing activities or data obtained from other sources to attempt to claim funds from HMRC.”

“We are sending letters to affected customers to assist in securing their accounts and to reassure them that they have not lost any money.”

Last week, UK banks and payment companies were advised to enhance their anti-fraud systems for international transactions due to a rising number of fraudsters targeting individuals abroad.

Recent statistics indicated that international payments account for 11% of the losses attributed to push payment fraud in 2024.

Source: www.theguardian.com

Beware: ‘Hello Mom!’ WhatsApp Scam Targeting Parents and Friends

“Hi Mom,” the opening message states. “I’ve misplaced my phone.” It unfolds into a distressing narrative: somehow, the sender has also been locked out of their bank account.

Fortunately, friends usually have access to phones. It was through their device that the message was revealed. Alternatively, they might request assistance with rent or direct payment to their landlord or for any urgent bills that have surfaced.

Messages can arrive via WhatsApp or text. Scammers don’t always impersonate children; they might pose as friends or even parents.

Data from Santander indicates that among bank customers, the impersonation of a son is the most effective scam, followed by a daughter, then a mother.

Chris Ainsley, the head of fraud risk management at the bank, notes that fraud is progressing at “broken speeds.” He remarks, “AI voice impersonation technology is now being utilized to create audio messages for WhatsApp and SMS, enhancing the realism of fraud.”

What does fraud look like?

WhatsApp ‘hi mum’ text scam screenshot. Photo: Santander

A seemingly friendly message from someone claiming to be close to you often comes from unknown numbers. If you don’t reply, they may persist before giving up. If you do respond, the scammer will typically engage in conversation but often with vague details.

They will quickly claim to need urgent funds for something and pressure you to act swiftly.

The “sender” may allege that their regular bank account has problems, instructing you to send money to an unfamiliar account.

WhatsApp ‘hi mum’ text scam screenshot. Photo: Santander

What the message asks for

money. They’ll claim they urgently need cash to buy a new phone or for living expenses.

WhatsApp ‘hi mum’ text scam screenshot Photo: Santander

The bank details they provide will likely belong to someone else. They will claim it belongs to “friends” or someone they owe, and the amount requested is usually not a round figure. These accounts belong to scammers or third parties used as money mules.

What to do

If you suspect that a loved one is in actual trouble, verify the situation. Reach out using their usual number. Don’t be alarmed if they don’t reply immediately.

You can ask questions that only they would know the answers to.

To protect yourself against future scams, consider establishing a family password that can be requested to confirm the sender’s identity.

WhatsApp ‘hi mum’ text scam screenshot Photo: Santander

If you have sent money, contact your bank right away to see if you can halt the transactions.

You can report suspicious WhatsApp messages through the app. Simply select the message and choose to report it.

Fraudulent texts can be forwarded to 7726 to report them to your telecommunications provider.

You can also report scams to Action Fraud.

Whenever prompted to transfer funds, always be truthful about the situation to ensure the sender’s legitimacy.

Source: www.theguardian.com

Arup, a British engineering firm, duped out of £20m in deepfake scam

Arup, a British engineering firm, fell victim to a deepfake scam when an employee mistakenly transferred HK$200 million (approximately 20 million yen) to criminals during an artificial intelligence-generated video call.

Reports from Hong Kong police in February revealed that an employee of an unnamed company was duped into sending a large sum of money in a fraudulent call impersonating a company executive.

Arup confirmed that they were the company involved and had reported the incident to the Hong Kong police earlier this year. They admitted that fake audio and video had been used in the fraud.

The company stated, “Our financial stability and business operations remained unaffected, and there was no compromise to our internal systems.”

Arup’s global chief information officer, Rob Greig, mentioned that the organization faces frequent cyberattacks, including deepfakes, as seen in this incident.

Greig emphasized the need for increased awareness regarding the sophistication of cyber attackers, especially after Arup’s experience.

A report from the Financial Times newspaper first identified Arup as the target of the scammers.

Arup, known as one of the world’s leading consulting engineering firms, employs over 18,000 individuals and is recognized for its involvement in projects like the Sydney Opera House and London’s Crossrail transport scheme.

Another recent case involving a deepfake scam targeted WPP CEO Mark Read, as reported by The Guardian last week.

Hong Kong police disclosed that employees transferred HK$200 million in total to five local bank accounts in 15 transactions during a video conference call where the perpetrators posed as senior company officials.

The investigation into the scam is ongoing, but no arrests have been made yet, with the case classified as “obtaining property by deception.”

Source: www.theguardian.com

Millions at Risk Following ‘Super Saturday’ Scam: Science & Technology News Provides Tips

Millions of mobile phone users have been warned about possible text scams in the run-up to Christmas, reaching a peak today on what has been dubbed “Super Saturday.”

The BT-owned EE network says cybercriminals are trying to take advantage of the busy last-minute shopping season to carry out delivery-style scams that suggest packages are waiting to be dropped off or have been delayed. He said there is a possibility.

This technique tricks recipients into clicking a link that unknowingly installs malware (malicious software) or leads them to a phishing page designed to collect personal or financial data. There is likely to be.

EE said it had successfully blocked around 3 million SMS scams sent to customers’ mobile phones on this day last year.

The company expects to stop up to 5 million such scams this month. It also announced that it has blocked more than 45 million fraudulent texts so far in 2023.

EE said in a statement: “December’s most common SMS scams were delivery-related, as shoppers scrambled to organize their packages at the last minute in time for the holidays.”

“These include missed delivery or tracking text scams that prompt customers to click on a link that gives criminals the opening they need to steal consumer data and money.”

image:
Photo: Alamy

The company is urging consumers to be wary of scams, especially in the coming weeks, as the stress of preparing for the holidays can “impair your judgment and make you less alert.”

read more:
Booking.com customers warned of ‘well-designed scam’
Scammers’ tactics are becoming increasingly complex – here’s what to watch out for
UK launches charter to fight fraud, false advertising and romance scams

Johnny Bunt, director of regulation at BT Group’s consumer arm EE, said: “Super Saturday is set to be the busiest day of the year for mass retailers.”

“With deliveries piling up on doorsteps, scammers will be looking for ways to capitalize on the festive enthusiasm.

“As one of the UK’s front lines against SMS scam texts, we have a clear picture of the threat level here at BT and EE, and we have already seen an alarming spike in delivery fraud in particular.”

We’re sharing some tips to help you stay safe from scams.

• Never click on links in text from unknown sources.
• Trust your intuition. If something is questionable, there is probably a catch.
• Keep your device software up to date
• Never give out your bank account details, passwords, or security codes on linked websites.
• If you receive a call from your bank, consider calling back on the published number or using the 159 service.
• If someone calls you as scheduled, if in doubt, hang up and call back to a trusted number.
• If you receive a suspicious text, please forward the number and incident to 7726 toll-free for investigation by your mobile phone provider.
• Once reported, block the number and notify others about the scam to avoid falling victim to it.

Source: news.sky.com