Hackers Compromise 120k IP Cameras for Pornographic Videos
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
TM RedHotCyber 970x120 042543
Hackers Compromise 120k IP Cameras for Pornographic Videos

Hackers Compromise 120k IP Cameras for Pornographic Videos

Redazione RHC : 4 December 2025 21:34

South Korean police have reported the arrest of four individuals who, presumably independently, compromised over 120,000 IP cameras. According to investigators, at least two of them did so to steal video from places like gynecological practices. They then edited the footage into pornographic videos and sold them online.

According to local media , two of the four suspects (whose names have been withheld) were office workers, while the others were listed as unemployed or self-employed. Just two of those arrested were responsible for the majority of the cyberattacks: approximately 63,000 and 70,000 compromised devices, installed in private homes and commercial properties.

Adult cameras and videos from everyone’s homes

The criminals sold the stolen videos from the cameras on a website that police simply called “Site C,” earning 35 million won ($23,800) and 18 million won ($12,200), respectively.

The other two defendants hacked 15,000 and 136 cameras respectively.

No charges have yet been filed against those arrested, as the investigation is ongoing. Authorities also announced that they arrested three people who had purchased similar videos.

“Crimes committed via IP cameras cause severe trauma to victims. We will eradicate this threat by proactively investigating such crimes,” said Park Woo-hyun, head of the National Police Agency’s cybercrime investigation unit.

According to police, the attackers mainly exploited weak default passwords and predefined combinations that could be easily cracked by brute force.

Law enforcement visited 58 locations where cameras had been hacked to warn owners of compromised devices and provide password security advice.

Best practices for securing IP cameras

To drastically reduce the risk of compromise, experts recommend the following measures:

1. Change default passwords immediately

  • Factory passwords are the first thing attackers test.
  • Choose long, complex, and unique passwords for each device.

2. Enable two-factor authentication (2FA)

  • When available, it greatly reduces the possibility of unauthorized access.

3. Update your firmware regularly

  • Manufacturers release patches that fix known vulnerabilities.
  • Set up automatic updates when possible.

4. Disable remote access if not needed

  • Many attacks occur over the Internet.
  • If you need to access remotely, use a VPN instead of direct exposure.

5. Restrict network access

  • Isolate cameras on a separate network (VLAN) or guest network.
  • Prevent them from being reachable from all devices in your home or office.

6. Check exposed ports

  • Avoid indiscriminate port forwarding on routers and modems.
  • Block unnecessary ports and monitor for suspicious connections.

7. Disable unused services

  • UPnP, P2P, and other remote services can be exploited by attackers.
  • Keep only essential services active.

8. Choose IP cameras from reliable manufacturers

  • Untrustworthy brands may not provide security updates.
  • Always check the brand’s reputation and patch availability.

9. Monitor logs regularly

  • Monitor logins, failed attempts, and abnormal behavior.

10. Change your credentials periodically

  • Reduces the risk of compromised credentials remaining valid for long periods of time.

  • #cybercrime
  • camera hacking
  • cybersecurity threats
  • data breach
  • device security
  • hacking prevention
  • IP camera security
  • Online Safety
  • password protection
  • surveillance camera risks
Immagine del sitoRedazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli