A4x AIoT: Breach of 120 000 IP cameras in South Korea: security tips

A4x AIoT: Breach of 120 000 IP cameras in South Korea: security tips

Massive IP Camera Breach in South Korea Exposes 120,000 Devices, Leads to Arrests

South Korean authorities have arrested four individuals linked to the compromise of approximately 120,000 IP cameras across private homes, businesses, and sensitive locations—including karaoke lounges, pilates studios, and a gynecology clinic. Two of the suspects exploited the breach to produce and sell sexually explicit footage through a foreign adult website, generating tens of thousands of dollars in illicit profits.

The Breach: Key Details

  • Suspects & Scale:

    • Suspect 1 (unemployed) hacked 63,000 cameras, selling 545 explicit videos for ~$24,000.
    • Suspect 2 (office worker) compromised 70,000 cameras, selling 648 videos for ~$12,000.
    • Suspect 3 (self-employed) breached 15,000 cameras, including footage involving minors, but no evidence of sales.
    • Suspect 4 (office worker) accessed 136 cameras but was not accused of content distribution.
    • Overlap in compromised devices may explain why the total exceeds 120,000.
  • Method of Attack: Investigators suspect brute-force attacks or exploitation of default credentials, as many users failed to change factory-set passwords. Authorities notified 58 identified victims and advised password updates.

  • Impact on Illegal Content Platform: The two primary sellers accounted for 62% of last year’s uploads to the adult website, making them the platform’s dominant suppliers. Three buyers of the footage were also detained.

Why IP Cameras Are Vulnerable

IP cameras, which stream video directly over the internet, are increasingly popular for home and business security due to their affordability (starting at $25–$40) and remote-access capabilities. However, their design introduces critical security risks:

  • Default Passwords: Many users retain weak, preconfigured credentials (e.g., admin/admin), which attackers easily exploit.
  • Outdated Firmware: Manufacturers often neglect security updates, leaving devices exposed to known vulnerabilities. Users frequently skip manual updates, and some vendors abandon support post-purchase.

The South Korean case underscores how unsecured IoT devices can become tools for large-scale privacy violations, with real-world consequences for victims. Authorities continue to investigate the full scope of the breach.

Source: https://www.kaspersky.com/blog/south-korea-120000-ip-cameras-hacked/54961/

A4x AIoT cybersecurity rating report: https://www.rankiteo.com/company/a4x

"id": "A4X1765471370",
"linkid": "a4x",
"type": "Breach",
"date": "10/2025",
"severity": "100",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'customers_affected': 'Approximately 120,000 camera '
                                              'owners and individuals recorded',
                        'industry': ['Hospitality (karaoke lounges)',
                                     'Fitness (pilates studios)',
                                     'Healthcare (gynecology clinic)'],
                        'location': 'South Korea',
                        'type': ['Private homes', 'Commercial spaces']}],
 'attack_vector': 'Brute-forcing, Default Credentials Exploitation',
 'customer_advisories': 'Public advisories on securing IP cameras and '
                        'preventing unauthorized access.',
 'data_breach': {'data_exfiltration': 'Yes (videos sold on foreign adult '
                                      'website)',
                 'file_types_exposed': ['Video files'],
                 'number_of_records_exposed': 'Approximately 120,000 cameras '
                                              'breached, 1,193 illicit videos '
                                              'sold',
                 'personally_identifiable_information': 'Potentially '
                                                        '(individuals recorded '
                                                        'in private settings)',
                 'sensitivity_of_data': 'High (intimate and private content)',
                 'type_of_data_compromised': 'Video footage (sexually '
                                             'explicit, personal, sensitive)'},
 'description': 'South Korean law enforcement arrested four suspects linked to '
                'the breach of approximately 120,000 IP cameras installed in '
                'private homes and commercial spaces, including karaoke '
                'lounges, pilates studios, and a gynecology clinic. Two '
                'hackers sold sexually explicit footage from the cameras '
                'through a foreign adult website.',
 'impact': {'brand_reputation_impact': 'Severe for affected individuals and '
                                       'businesses',
            'data_compromised': 'Sexually explicit footage, Personal and '
                                'sensitive video feeds',
            'legal_liabilities': 'Potential for affected entities and '
                                 'perpetrators',
            'systems_affected': 'Approximately 120,000 IP cameras'},
 'initial_access_broker': {'data_sold_on_dark_web': 'Yes (videos sold on '
                                                    'foreign adult website)'},
 'investigation_status': 'Ongoing (suspects arrested, victims notified)',
 'lessons_learned': 'Importance of changing default credentials, using strong '
                    'and unique passwords, and regularly updating device '
                    'software to prevent unauthorized access.',
 'motivation': ['Financial gain', 'Illegal content creation', 'Voyeurism'],
 'post_incident_analysis': {'corrective_actions': 'Enforce password changes, '
                                                  'educate users on security '
                                                  'best practices, and '
                                                  'encourage regular software '
                                                  'updates.',
                            'root_causes': 'Default credentials, weak '
                                           'passwords, lack of software '
                                           'updates, and manual intervention '
                                           'required for security patches.'},
 'recommendations': ['Replace factory-set credentials with unique logins and '
                     'passwords.',
                     'Avoid weak or common passwords for all accounts and '
                     'devices.',
                     'Use a reliable password manager to generate and store '
                     'complex passwords.',
                     'Enable two-factor authentication where possible.',
                     'Regularly update device software to patch '
                     'vulnerabilities.'],
 'references': [{'source': 'South Korean law enforcement'},
                {'source': 'Journalistic reports on the incident'}],
 'regulatory_compliance': {'legal_actions': 'Arrests of four suspects and '
                                            'three buyers',
                           'regulations_violated': ['Potential violations of '
                                                    'privacy laws, Illegal '
                                                    'content distribution '
                                                    'laws']},
 'response': {'communication_strategy': 'Public disclosure by law enforcement, '
                                        'Victim notifications',
              'containment_measures': 'Arrest of four suspects, Victim '
                                      'notification and password change '
                                      'guidance',
              'law_enforcement_notified': 'Yes (South Korean law enforcement)',
              'remediation_measures': 'Guidance on changing default passwords '
                                      'and securing IP cameras'},
 'stakeholder_advisories': 'Guidance provided to victims on securing IP '
                           'cameras and changing passwords.',
 'threat_actor': ['Unemployed individual',
                  'Office worker',
                  'Self-employed individual',
                  'Office worker'],
 'title': 'Mass Breach of 120,000 IP Cameras in South Korea',
 'type': 'Data Breach, Voyeurism, Illegal Content Distribution',
 'vulnerability_exploited': 'Default passwords, Outdated software, Lack of '
                            'manual updates'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.