{"id":54961,"date":"2025-12-11T10:15:37","date_gmt":"2025-12-11T15:15:37","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=54961"},"modified":"2025-12-11T14:20:24","modified_gmt":"2025-12-11T19:20:24","slug":"south-korea-120000-ip-cameras-hacked","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/south-korea-120000-ip-cameras-hacked\/54961\/","title":{"rendered":"Korean-style webcam breach: 120 000 IP cameras hacked"},"content":{"rendered":"<p>South Korean law enforcement <a href=\"https:\/\/www.korea.kr\/briefing\/pressReleaseView.do?newsId=156732247&amp;\" target=\"_blank\" rel=\"noopener nofollow\">has arrested four suspects linked to the breach of approximately 120\u00a0000 IP cameras<\/a> installed in private homes and commercial spaces \u2014 including <a href=\"https:\/\/www.bbc.com\/news\/articles\/cj01q6p7ndlo\" target=\"_blank\" rel=\"noopener nofollow\">karaoke lounges, pilates studios, and a gynecology clinic<\/a>. Two of the hackers sold sexually explicit footage from the cameras through a foreign adult website. In this post, we explain what IP cameras are, and where their vulnerabilities lie. We also dive into the details of the South Korea incident and share practical advice on how to avoid becoming a target for attackers hunting for intimate video content.<\/p>\n<h2>How do IP cameras work?<\/h2>\n<p>An IP camera is a video camera <a href=\"https:\/\/en.wikipedia.org\/wiki\/IP_camera\" target=\"_blank\" rel=\"noopener nofollow\">connected to the internet via the Internet Protocol (IP)<\/a>, which lets you view its feed remotely on a smartphone or computer. Unlike traditional <a href=\"https:\/\/en.wikipedia.org\/wiki\/Closed-circuit_television\" target=\"_blank\" rel=\"noopener nofollow\">CCTV surveillance systems<\/a>, these cameras don\u2019t require a local surveillance hub \u2014 like you see in the movies \u2014 or even a dedicated computer to be plugged into. An IP camera streams video directly in real time to any device that connects to it over the internet. Most of today\u2019s IP camera manufacturers also offer optional cloud storage plans, letting you access recorded footage from anywhere in the world.<\/p>\n<p>In recent years, IP cameras have surged in popularity to become ubiquitous, serving a wide range of purposes \u2014 from monitoring kids and pets at home to securing warehouses, offices, <a href=\"https:\/\/www.kaspersky.com\/blog\/airbnb-security-tips\/48732\/\" target=\"_blank\" rel=\"noopener nofollow\">short-term rental apartments<\/a> (often illegally), and small businesses. Basic models can be picked up online for as little as US$25\u201340.<\/p>\n<div id=\"attachment_54964\" style=\"width: 1290px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/11101322\/south-korea-120000-ip-cameras-hacked-1-EN.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-54964\" class=\"size-full wp-image-54964\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/12\/11101322\/south-korea-120000-ip-cameras-hacked-1-EN.jpg\" alt=\"A typical budget-friendly IP camera offered for sale \" width=\"1280\" height=\"653\"><\/a><p id=\"caption-attachment-54964\" class=\"wp-caption-text\">You can find a Full HD IP camera on an online marketplace for under US$25 \u2014 affordable prices have made them incredibly popular for both home and small business use<\/p><\/div>\n<p>One of the defining features of IP cameras is that they\u2019re originally designed for remote access. The camera connects to the internet and silently accepts incoming connections \u2014 ready to stream video to anyone who knows its address and has the password. And this leads to two common problems with these devices.<\/p>\n<ol>\n<li><strong>Default passwords.<\/strong> IP camera owners often keep the simple default usernames and passwords that come preconfigured on the device.<\/li>\n<li><strong>Vulnerabilities in outdated software.<\/strong> Software updates for cameras often require manual intervention: you need to log in to the administration interface, check for an update, and install it yourself. Many users simply skip this altogether. Worse, updates might not even exist \u2014 many camera vendors ignore security and drop support right after the sale.<\/li>\n<\/ol>\n<h2>What happened in South Korea?<\/h2>\n<p>Let\u2019s rewind to what unfolded this fall in South Korea. Law-enforcement authorities reported a breach of roughly 120\u00a0000 IP cameras, and the arrest of four suspects in connection with the attacks. Here\u2019s what <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/korea-arrests-suspects-selling-intimate-videos-from-hacked-ip-cameras\/\" target=\"_blank\" rel=\"noopener nofollow\">we know about each of them<\/a>.<\/p>\n<ul>\n<li>Suspect 1, unemployed, hacked approximately 63\u00a0000 IP cameras, producing and later selling 545 sexually explicit videos for a total of 35 million South Korean won, or just under US$24\u00a0000.<\/li>\n<li>Suspect 2, an office worker, compromised around 70\u00a0000 IP cameras and sold 648 illicit sexual videos for 18 million won (about US$12\u00a0000).<\/li>\n<li>Suspect 3, self-employed, hacked 15\u00a0000 IP cameras and created illegal content, including footage involving minors. So far, there\u2019s no information suggesting this individual sold any material.<\/li>\n<li>Suspect 4, an office worker, appears to have breached only 136 IP cameras, and isn\u2019t accused of producing or selling illegal content.<\/li>\n<\/ul>\n<p>The astute reader may have noticed the numbers don\u2019t quite add up \u2014 the figures above totaling well over 120\u00a0000. South Korean law enforcement hasn\u2019t provided a clear explanation for this discrepancy. Journalists speculate that some of the devices may have been compromised by multiple attackers.<\/p>\n<p>The investigation has revealed that only two of the accused actually sold the sexual content they\u2019d stolen. However, the scale of their operation is staggering. Last year, the website hosting voyeurism and sexual exploitation content \u2014 which both perpetrators used to sell their videos \u2014 received 62% of its uploads from just these two individuals. In essence, this video enthusiast duo supplied the majority of the platform\u2019s illegal content. It\u2019s also been reported that three buyers of these videos were detained.<\/p>\n<p>South Korean investigators were able to identify 58 specific locations of the hacked cameras. They\u2019ve notified the victims and provided guidance on changing the passwords to secure their IP cameras. This suggests \u2014 although the investigators haven\u2019t disclosed any details about the method of compromise \u2014 that the attackers used brute-forcing to crack the cameras\u2019 simple passwords.<\/p>\n<p>Another possibility is that the camera owners, as is often the case, simply never changed the default usernames and passwords. These default credentials are frequently widely known, so it\u2019s entirely plausible that to gain access the attackers only needed to know the camera\u2019s IP address and try a handful of common username and password combinations.<\/p>\n<h2>How to avoid becoming a victim of voyeur hackers<\/h2>\n<p>The takeaways from this whole South Korean <span style=\"text-decoration: line-through;\">dorama<\/span> drama are straight from our playbook:<\/p>\n<ul>\n<li><strong>Always replace the factory-set credentials<\/strong> with your own logins and passwords.<\/li>\n<li><strong>Never use weak or common passwords<\/strong> \u2014 even for seemingly harmless accounts or gadgets. You don\u2019t have to work at the <a href=\"https:\/\/edition.cnn.com\/2025\/11\/06\/europe\/louvre-password-cctv-security-intl\" target=\"_blank\" rel=\"noopener nofollow\">Louvre<\/a> to be a target. You never know which credentials attackers will try to crack, or where that initial breach might lead them.<\/li>\n<li><strong>Always set unique passwords.<\/strong> If you reuse passwords, a single data leak from one service can put all your other accounts at risk.<\/li>\n<\/ul>\n<p>These rules are universal: they apply just as much to your social media and banking accounts as they do to your robot vacuums, IP cameras, and every other smart device in your home.<\/p>\n<p>To keep all those unique passwords organized without losing your mind, we strongly recommend a reliable password manager. <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Password Manager<\/a>\u00a0can both store all your credentials securely and generate truly random, complex, and uncrackable passwords for you. With it, you can be confident that no one will guess the passwords to your accounts or devices. Plus, it <a href=\"https:\/\/www.kaspersky.com\/blog\/kaspersky-password-manager-authenticator\/48841\/\" target=\"_blank\" rel=\"noopener nofollow\">helps you generate one-time codes<\/a> for two-factor authentication, save and autofill <a href=\"https:\/\/www.kaspersky.com\/blog\/full-guide-to-passkeys-in-2025-part-1\/53688\/\" target=\"_blank\" rel=\"noopener nofollow\">passkeys<\/a>, and sync your sensitive data \u2014 not just logins and passwords, but also bank card details, documents, and even private photos \u2014 in encrypted form across all your devices.<\/p>\n<blockquote><p>Wondering if a hidden camera is filming you? Read more in our posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/webcam-stalking\/52733\/\" target=\"_blank\" rel=\"noopener nofollow\">Webcam stalking: fact or fiction?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/airbnb-security-tips\/48732\/\" target=\"_blank\" rel=\"noopener nofollow\">Airbnb security: tips for safe travel<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-find-spy-cameras\/43199\/\" target=\"_blank\" rel=\"noopener nofollow\">Four ways to find spy cameras<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-find-spy-cameras-and-other-iot-devices\/44833\/\" target=\"_blank\" rel=\"noopener nofollow\">Lumos: IoT device detection system<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ip-cameras-unsecurity-eufy\/46574\/\" target=\"_blank\" rel=\"noopener nofollow\">IP camera security: the bad, the ugly, and the evil<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>From karaoke rooms to gynecology clinics \u2014 these are just some of the tens of thousands of locations where compromised IP cameras were discovered in South Korea. Here&#8217;s how to avoid unwittingly starring in steamy videos you didn&#8217;t authorize.<\/p>\n","protected":false},"author":2726,"featured_media":54963,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788,2683],"tags":[901,1126,1934,729,658,794,187,1566,43,97,4279,768,422,4277,342],"class_list":{"0":"post-54961","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-threats","9":"tag-breach","10":"tag-cameras","11":"tag-cctv","12":"tag-espionage","13":"tag-internet-of-things","14":"tag-iot","15":"tag-passwords","16":"tag-porn","17":"tag-privacy","18":"tag-security-2","19":"tag-spy-cameras","20":"tag-surveillance","21":"tag-threats","22":"tag-video-surveillance","23":"tag-webcams"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/south-korea-120000-ip-cameras-hacked\/54961\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/south-korea-120000-ip-cameras-hacked\/29954\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/south-korea-120000-ip-cameras-hacked\/25023\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/south-korea-120000-ip-cameras-hacked\/29831\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/south-korea-120000-ip-cameras-hacked\/28844\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/south-korea-120000-ip-cameras-hacked\/31730\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/south-korea-120000-ip-cameras-hacked\/30369\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/south-korea-120000-ip-cameras-hacked\/41035\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/south-korea-120000-ip-cameras-hacked\/14119\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/south-korea-120000-ip-cameras-hacked\/23477\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/south-korea-120000-ip-cameras-hacked\/33017\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/south-korea-120000-ip-cameras-hacked\/30029\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/south-korea-120000-ip-cameras-hacked\/35741\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/south-korea-120000-ip-cameras-hacked\/35371\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/internet-of-things\/","name":"Internet of things"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=54961"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54961\/revisions"}],"predecessor-version":[{"id":54967,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/54961\/revisions\/54967"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/54963"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=54961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=54961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=54961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}