Executive Summary
In early 2024, South Korean authorities arrested four suspects for hacking into more than 120,000 IP cameras nationwide, exfiltrating sensitive video footage, and distributing it through a foreign adult website. Attackers exploited insecure and poorly configured IoT camera devices lacking adequate network segmentation or encrypted traffic, allowing for remote access and large-scale unauthorized surveillance. The breach exposed thousands of individuals to privacy violations and highlighted severe weaknesses in the deployment and security of IoT devices within residential and business environments.
This incident underscores a rising trend of IoT device exploitation for privacy invasions, raising alarms globally about insufficient network protections and the urgency for robust segmentation, encrypted communications, and egress security policies as IoT adoption grows.
Why This Matters Now
As IoT device usage dramatically increases, many deployments remain vulnerable due to weak security standards and insufficient segmentation. The recent IP camera mass-hack illustrates how attackers can exploit these weaknesses to execute large-scale intrusions and data leaks. Urgent action is required to enforce best practices and regulatory compliance to protect privacy and prevent similar incidents.
Attack Path Analysis
Attackers initiated their campaign by exploiting vulnerabilities or weak security on internet-exposed IP cameras to gain initial access. Once inside, they escalated privileges to gain control over camera management interfaces and broader device access. They moved laterally to compromise additional cameras across different segments or networks. The adversaries established command and control channels to remotely administer compromised cameras and coordinate operations. Stolen video data was then exfiltrated by transferring large amounts of private footage to external infrastructure. Finally, the impact stage involved monetization by selling intimate footage to a foreign adult site, causing privacy breaches and reputational damage.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited security weaknesses in internet-connected IP cameras, such as default credentials or unpatched firmware, to gain unauthorized access.
Related CVEs
CVE-2024-7029
CVSS 8.8A command injection vulnerability in Avtech AVM1203 IP cameras allows unauthenticated remote attackers to execute arbitrary commands.
Affected Products:
Avtech AVM1203 IP Camera – FullImg-1023-1007-1011-1009 and prior
Exploit Status:
exploited in the wildCVE-2025-1316
CVSS 9.3An OS command injection vulnerability in Edimax IC-7100 IP cameras allows remote attackers to execute arbitrary commands.
Affected Products:
Edimax IC-7100 IP Camera – All versions
Exploit Status:
exploited in the wildCVE-2024-8957
CVSS 9.8An OS command injection vulnerability in PTZOptics PT30X-SDI/NDI-xx cameras allows unauthenticated remote attackers to execute arbitrary commands.
Affected Products:
PTZOptics PT30X-SDI/NDI-xx – < 6.3.40
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Valid Accounts
Network Sniffing
Remote Services
Brute Force
Exfiltration Over Web Service
Account Discovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – User Authentication for All Users
Control ID: 8.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management
Control ID: Article 10
CISA ZTMM 2.0 – Enforce MFA Across Critical Assets
Control ID: Identity: Use of Multi-Factor Authentication
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Hospitality
Hotels face massive IP camera compromise risks with 120,000+ devices hacked, exposing guest privacy through unencrypted traffic and inadequate east-west segmentation controls.
Health Care / Life Sciences
Healthcare facilities vulnerable to IoT device compromise affecting patient privacy through hacked surveillance systems, violating HIPAA compliance requirements for encrypted traffic protection.
Real Estate/Mortgage
Property management companies using IP cameras for security face privacy breaches and tenant safety concerns through compromised surveillance systems lacking proper segmentation.
Retail Industry
Retail stores with extensive IP camera networks risk customer privacy violations and security footage theft, requiring enhanced zero trust segmentation and threat detection.
Sources
- Korea arrests suspects selling intimate videos from hacked IP camerashttps://www.bleepingcomputer.com/news/security/korea-arrests-suspects-selling-intimate-videos-from-hacked-ip-cameras/Verified
- Korea Tightens IP Camera Security After 120,000 Devices Hacked for Sex Crime Contenthttps://en.sedaily.com/technology/2025/12/08/korea-tightens-ip-camera-security-after-120000-devicesVerified
- 120,000 home cameras hacked, sexual footage sold online, South Korean police sayhttps://www.washingtonpost.com/world/2025/12/02/south-korea-home-cameras-hacked/Verified
- CISA Warns of Avtech Camera Vulnerability Exploited in Wildhttps://www.securityweek.com/cisa-warns-of-avtech-camera-vulnerability-exploited-in-wild/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust network segmentation, east-west traffic controls, egress policy enforcement, and real-time threat detection would have severely limited the attackers' ability to compromise, move laterally, and exfiltrate data from IP cameras. CNSF-aligned controls enforce least privilege, detect anomalous behavior, and prevent unauthorized data movement, thereby disrupting the kill chain at multiple points.
Control: Zero Trust Segmentation
Mitigation: Unauthorized remote access to devices would be blocked.
Control: Threat Detection & Anomaly Response
Mitigation: Privilege misuse or unusual administrator actions would trigger alerts.
Control: East-West Traffic Security
Mitigation: Lateral propagation attempts are prevented or detected.
Control: Cloud Firewall (ACF) & Inline IPS (Suricata)
Mitigation: Suspicious outbound C2 channels are identified and terminated.
Control: Egress Security & Policy Enforcement
Mitigation: Exfiltration to unauthorized destinations stopped or alerted.
Broad and rapid data leaks are detected in near real-time, minimizing exposure.
Impact at a Glance
Affected Business Functions
- Security Monitoring
- Privacy Compliance
Estimated downtime: 7 days
Estimated loss: $500,000
Unauthorized access to sensitive video footage from private residences and businesses, leading to significant privacy violations and potential legal liabilities.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce zero trust segmentation and identity-based policy to restrict remote IP camera access by default.
- • Implement continuous anomaly and privilege escalation detection on all IP-enabled devices and networks.
- • Apply east-west traffic controls to block lateral movement among IoT devices and critical workloads.
- • Deploy strict egress filtering and real-time policy enforcement to prevent unauthorized data exfiltration.
- • Centralize visibility and incident response to rapidly detect and remediate cloud or hybrid IoT breaches.



