Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Breach of 120 000 IP cameras in South Korea: security tips | Kaspersky official blog

0
Medium
Vulnerability
Published: Thu Dec 11 2025 (12/11/2025, 15:15:37 UTC)
Source: Kaspersky Security Blog

Description

A large-scale breach compromised approximately 120,000 IP cameras across South Korea, primarily due to weak or default passwords and lack of software updates. The attackers exploited these vulnerabilities to produce and sell sexually explicit footage, impacting private homes and commercial venues. The breach highlights the risks inherent in IP cameras designed for remote access without enforced security controls. The attackers used brute-force or default credentials to gain access, with two suspects responsible for the majority of illicit content sales. This incident underscores the importance of changing default passwords, applying timely updates, and using strong, unique credentials. European organizations using similar IP camera technologies face similar risks, especially in sectors relying on IoT devices for security and monitoring. Mitigation requires proactive credential management, network segmentation, and vendor engagement for firmware updates. Countries with high IoT adoption and significant small business sectors are most at risk. The threat severity is assessed as high due to the privacy violations, ease of exploitation, and broad scope of affected devices.

AI-Powered Analysis

AILast updated: 12/11/2025, 15:24:29 UTC

Technical Analysis

In late 2025, South Korean law enforcement uncovered a massive breach involving approximately 120,000 IP cameras installed in private residences and commercial establishments such as karaoke lounges, pilates studios, and medical clinics. The attackers exploited inherent weaknesses in IP camera security, primarily the use of default or weak passwords and outdated firmware lacking security patches. IP cameras, designed for remote internet access, stream video feeds directly to connected devices, making them vulnerable if authentication is weak or absent. The attackers likely used brute-force techniques or simply exploited unchanged default credentials to gain unauthorized access. Four suspects were arrested; two of them sold hundreds of sexually explicit videos derived from the hacked cameras on foreign adult websites, generating tens of thousands of US dollars. The breach exposed significant privacy violations, including footage involving minors. The investigation revealed that the compromised devices were scattered across various locations, and victims were advised to change passwords. The incident illustrates common security pitfalls in IoT devices: lack of enforced password changes, manual and often neglected firmware updates, and vendor neglect post-sale. The attackers’ ability to compromise such a large number of devices demonstrates the scalability of attacks against poorly secured IoT ecosystems. This breach serves as a cautionary tale about the risks of deploying IP cameras without robust security measures and highlights the need for continuous vigilance, especially in environments where sensitive or private activities are monitored.

Potential Impact

For European organizations, this threat poses significant privacy and security risks, especially for small businesses, healthcare providers, and residential users relying on IP cameras for surveillance. Unauthorized access to video feeds can lead to severe privacy violations, reputational damage, and potential regulatory penalties under GDPR due to exposure of personal and sensitive data. The illicit use and distribution of footage can cause legal liabilities and undermine trust in security infrastructure. Additionally, compromised cameras can serve as entry points for broader network intrusions or be co-opted into botnets, impacting availability and integrity of organizational systems. The ease of exploitation due to default credentials and lack of updates means many European entities with similar devices are vulnerable. The incident also raises concerns about the security posture of IoT devices in critical sectors, including healthcare and hospitality, which are prevalent across Europe. The breach highlights the need for improved IoT security governance and vendor accountability to prevent similar large-scale compromises.

Mitigation Recommendations

European organizations should implement strict policies mandating immediate replacement of default credentials on all IP cameras and IoT devices with strong, unique passwords. Employ multi-factor authentication where supported to add an additional security layer. Regularly audit and inventory all connected devices to identify vulnerable or unsupported models and replace or isolate them as needed. Establish automated or scheduled firmware update mechanisms to ensure devices receive timely security patches, and engage with vendors to demand ongoing support and security updates. Network segmentation should be applied to isolate IP cameras from critical business systems, limiting lateral movement in case of compromise. Deploy intrusion detection systems tuned to detect unusual camera access patterns or brute-force attempts. Educate users and administrators on IoT security best practices, emphasizing the risks of weak credentials and outdated software. Consider deploying network-level access controls and VPNs for remote camera access to reduce exposure. Finally, maintain incident response plans that include IoT device breaches to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/south-korea-120000-ip-cameras-hacked/54961/","fetched":true,"fetchedAt":"2025-12-11T15:24:12.829Z","wordCount":1546}

Threat ID: 693ae21c7d4c6f31f7b56f42

Added to database: 12/11/2025, 3:24:12 PM

Last enriched: 12/11/2025, 3:24:29 PM

Last updated: 12/11/2025, 7:12:06 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats