Four Hackers Arrested for Breaching 120,000 Home Cameras in South Korea

Four Hackers Arrested for Breaching 120,000 Home Cameras in South Korea

Four Arrested in South Korea for Hacking Surveillance Cameras

Four individuals have been apprehended in South Korea for unlawfully accessing homemade surveillance cameras installed in residences and businesses. Their aim was to capture and sell explicit recordings on an international pornographic platform.

Details of the Arrests

According to South Korean authorities, the suspects operated independently rather than as a group. They were arrested separately. These cameras, known as IP ( Protocol) cameras, are often used for monitoring , the elderly, pets, or for security purposes. However, the connectivity of these devices makes them susceptible to exploitation. Most come with default passwords that, if not changed, can be easily exploited by hackers.

Many live-streaming websites currently broadcast footage from numerous cameras, primarily located in public areas or focused on outdoor settings.

Extent of the Hacking Activities

One of the arrested suspects, an unemployed individual, gained access to 63,000 cameras, producing 545 sexual content videos and earning approximately €20,000 in cryptocurrencies from sales. Another suspect, who worked in an office, accessed 70,000 cameras, created 648 videos, and made around €10,000. Authorities estimate that these two individuals produced 62% of the content published on the global porn website, which features recordings from various countries. The South Korean police are collaborating with international authorities in efforts to shut down the website.

The other two suspects hacked fewer cameras and did not sell the content; instead, they stored it on their devices. Authorities have notified 58 individuals who fell victim to the hacking. South Korean police have also arrested three individuals who purchased the illicit content online, which is also considered a .

Rising Trend of Vulnerable Surveillance Systems

Despite the severity of this incident, similar cases are increasingly common due to the ease of access for those with basic technical skills. In November 2022, a similar incident was reported in India where hackers sold approximately 50,000 clips taken from hospitals, schools, and homes nationwide. Authorities highlighted the simplicity of the technical processes involved, relying on three software tools to find cameras, exploit open ports for remote access, and gain more sophisticated access to passwords.

Noteworthy Previous Incidents

Other significant cases in recent years include a 2021 vulnerability that affected 150,000 cameras from the Verkada company and a recent report revealing more than 40,000 security cameras broadcasting openly on the Internet.

The Growing Risk

The cumulative findings from these hacking incidents suggest that there are likely hundreds of thousands of cameras positioned within public and private structures that can be easily accessed remotely. A combination of insecure devices, uneducated users, and the proliferation of IP cameras creates a fertile ground for large-scale abuses. Experts advocate changing default passwords, updating firmware regularly, and limiting remote access as effective preventive measures.