Search TorNews

Find cybersecurity news, guides, and research articles

Popular searches:

Home » News » Government & Policy » Dark Web Spy Ring Busted in South Korea Over 120,000 Hacked IP Cameras

Dark Web Spy Ring Busted in South Korea Over 120,000 Hacked IP Cameras

Last updated:December 2, 2025
Human Written
  • South Korea’s NPA (National Police Agency) has just arrested four suspects, who collectively hacked into over 120,000 internet-enabled cameras in the country, making a massive gain from their illicit activities.

  • Two of the perpetrators mainly targeted devices from intimate locations, such as gynecology offices, selling sexually exploitative videos on the darknet.

  • Law enforcement officials in South Korea stated that the four individuals arrested were involved in an extensive hacking operation targeting Internet Protocol (IP) cameras across the country.

Massive Surveillance Breach Four Suspects Apprehended in South Korea for IP Camera Spying

According to police authorities, investigators discovered that the criminals used dictionary attacks on weakly protected IP cameras in order to gain access to these devices.  This marks one of the largest surveillance breach operations in South Korea.

According to the NPA, the suspects worked independently, but collectively hacked into a staggering 120,000 internet-enabled cameras across the country. The suspects allegedly hacked into various kinds of buildings, including residential properties and medical offices.

Notably, the two most prolific suspects committed the nefarious acts for financial gain. These two reportedly edited the footage of sexual exploitative videos obtained from the footage and sold them on illegal, known dark web forums.

Hacking Methods and Suspect Information

It is worth stating that the scale of the criminal enterprise varied broadly among all four suspects. Two main suspects carried out most of the attacks. One allegedly hacked 63,000 cameras, while the other reportedly compromised about 70,000.

According to local reports, these two suspects mainly focused their efforts on collating footage from extremely sensitive and intimate locations, including the offices of private gynecologists. The videos created were then sold on an undisclosed dark web platform, which law enforcement labels as Site C —the same types of markets that see frenzied trading in other stolen data, such as credit card details.

In addition, two of the suspects were able to generate huge illicit revenue from their criminal activities. The suspect who hacked into 70,000 cameras allegedly earned ₩18 million ( which is roughly $12,200). The second hacker, who committed 63,000 breaches, reportedly earned ₩35 million ( roughly $23,800).

The two other offenders, who did 136 and 15000 camera hacks respectively, were not very active in comparison to the two primary offenders, and had many different backgrounds, as noted by a Korean media company (Yonhap).

Korean media reported that the two main offenders held ordinary jobs, while the other two were either unemployed or self-employed. Police in South Korea are still investigating the four offenders, and authorities have not publicly released their names.

Technical Weaknesses and Police Response

According to findings from police investigations, none of the individuals employed any technologically advanced attacks, but mainly exploited the common security negligence of their victims. The attackers mainly hacked the cameras by locating internet-enabled devices that still used default, weak, or easily identifiable factory passwords.

This hacking technique, known as a dictionary breach or credential stuffing, doesn’t rely on high-end hacking software. Instead, it exploits the negligence of the victim to change their devices’ default logins.

The criminals hacked a significant number of security cameras, warning consumers about the vulnerability of IoT devices and urging them to protect any internet-connected hardware immediately.

Share this article

About the Author

Memchick E

Memchick E

Digital Privacy Journalist

Memchick is a digital privacy journalist who investigates how technology and policy impact personal freedom. Her work explores surveillance capitalism, encryption laws, and the real-world consequences of data leaks. She is driven by a mission to demystify digital rights and empower readers with the knowledge to protect their anonymity online.

View all posts by Memchick E >
Comments (0)

No comments.