
South Korean authorities have arrested four individuals for a massive cybercrime operation involving the hacking of over 120,000 internet-connected cameras. Exploiting weak default passwords, the perpetrators accessed private spaces in residences and medical facilities to produce and sell hundreds of sexually exploitative videos for virtual currency. This operation highlights a critical failure in consumer IoT security, underscoring the immense psychological and privacy harm inflicted on victims across the nation.
Quick Take
- Four suspects arrested for hacking 120,000+ IP cameras and producing hundreds of illicit videos sold through virtual currency
- Weak default passwords on consumer security devices enabled systematic exploitation of intimate spaces, including residences, fitness facilities, and medical clinics
- Primary suspects generated approximately $18,300 in virtual currency from over 1,150 videos, demonstrating the financial incentive driving organized cybercrime
- Police warn consumers to immediately change camera passwords and remain vigilant, while authorities work with foreign agencies to shut down distribution networks
Massive Scale of IoT Vulnerability Exposed
The scope of this operation reveals a critical failure in consumer device security infrastructure. Over 120,000 internet-connected cameras fell victim to exploitation, spanning private residences, commercial fitness establishments, and medical clinics. This indiscriminate targeting demonstrates that cybercriminals are systematically compromising intimate spaces without regard for location type or occupant awareness. The perpetrators maintained sustained access to these devices, extracting footage for extended periods before detection.
Over 120,000 home cameras hacked in S Korea for 'sexploitation' footage https://t.co/q8K0HPM4Sj
— BBC News (World) (@BBCWorld) December 1, 2025
Weak Passwords Enable Organized Cybercrime
South Korean authorities identified weak password practices as the primary vulnerability enabling this operation. Police noted that some guessed passwords consisted of repetitive characters, such as the same letter repeated multiple times. This elementary security failure allowed criminals to gain access to thousands of devices without sophisticated hacking techniques. The simplicity of the attack vector underscores how consumer negligence and inadequate manufacturer default configurations combine to create systemic vulnerability across the entire IoT landscape.
Criminal Operation Generated Substantial Revenue
The financial motivation driving this operation becomes evident through the virtual currency transactions documented by authorities. The two primary suspects alone generated approximately $12,000 and $6,300 respectively through the sale of over 500 and nearly 650 videos. This revenue stream demonstrates the profitability of organized intimate content theft, incentivizing additional perpetrators to exploit the same vulnerability vectors. The existence of a dedicated distribution website indicates a sophisticated infrastructure designed to monetize stolen intimate footage on a commercial scale.
Multiple Perpetrators Operating Without Coordination
Investigators identified four arrested individuals plus three additional suspects charged with purchasing or viewing the illicit material. Notably, the primary perpetrators operated independently without formal coordination, yet exploited identical vulnerability vectors and utilized the same distribution platform. This decentralized criminal ecosystem suggests that once a vulnerability becomes known within criminal networks, multiple actors simultaneously target the same infrastructure. The pattern indicates systemic weakness rather than isolated criminal activity.
Victims Face Immense Psychological and Privacy Harm
South Korean police emphasized that illegal filming inflicts “immense suffering” on victims whose intimate spaces were violated without consent or knowledge. The 120,000+ individuals whose cameras were compromised now face the psychological trauma of knowing their private moments were recorded, distributed, and monetized by strangers. This extends beyond individual victims to families, business operators, and medical professionals whose facilities were targeted. The violation represents a fundamental breach of privacy expectations in spaces where individuals should feel secure.
Law Enforcement Response and Consumer Protection Measures
Authorities have initiated victim notification procedures and are providing security guidance to affected consumers. Police urged IP camera users to “remain vigilant and immediately and regularly change their access passwords.” Simultaneously, authorities are collaborating with foreign law enforcement agencies to identify and shut down the distribution website and its operators. The investigation remains ongoing, with potential for additional arrests as international cooperation progresses and investigators trace the complete criminal network.
Watch the report: Four Arrested In South Korea After 120,000 Home Cameras Hacked For ‘Sexploitation’ Videos | 10 News+
Sources:
Over 120,000 home cameras hacked for ‘sexploitation’ footage
Four arrested in South Korea over IP camera spying spree • The Register.
Korean police arrest hackers who sold 120,000 IP camera videos – CHOSUNBIZ.
Sexploitation footage: Over 120,000 home cameras hacked in South Korea, four arrested | Indiablooms – First Portal on Digital News Management












