Chinese pornography websites post secretly filmed videos in Korea by hacking Chinese IP cameras in Korea

https://www.chosun.com/national/national_general/2024/09/29/NYH6KOQBG5CGPNCWTZSH4SQWL4/

Posted by everydayretarded

1 Comment

  1. everydayretarded on

    Article is way too long so I think posting and translating the whole story in comments won’t be a good idea, however this is translation for initial parts of article written by chatgpt. Rest of the article is mostly about explaining how vulnerable Chinese-made cameras are to hacking, what other kinds of secretly filmed videos are getting posted in those websites, and how to prevent cameras that you put from becoming ‘spy cam’ for hacking(keep being aware of them, update IP camera settings such as passwords and ID often, and when buying IP cameras check the certificates domestic products have as some Chinese IP cameras disguise as if they’re made in Korea)

    **More than 80% of Chinese-made IP cameras, widely used as CCTV in South Korea, have been exposed to hacking risks, as confirmed by a report from** ***Weekly Chosun*****. Hacked footage has been shared on Chinese obscene websites, and almost every space where IP cameras are used could be viewed from China. Many Koreans are unknowingly exposed to such risks, as Chinese-made IP cameras are often mistaken for CCTV.**

    According to *Weekly Chosun*’s investigation of an L(not an actual name) Chinese pornographic website from September 6 to 25, apartments with wall pads (home network devices typically installed on living room walls) and private homes where IP cameras were voluntarily installed, as well as businesses, hospitals, and almost all public places in South Korea, were exposed to the risk of IP camera hacking.

    The footage exposed on these pornographic websites was shocking. The videos featured spaces frequently visited by Koreans where they had no choice but to expose their bodies, including Pilates and pole dance studios, room cafés, karaoke booths, delivery rooms in obstetrics and gynecology clinics, rental party rooms, clothing stores, pension pools, waxing shops, and skin care massage parlors. Specific locations or personal information could easily be identified, such as a photo studio in Cheongju, Chungcheongbuk-do, a locker room at the G Sports Center in Seoul, and an injection room at Y Hospital in Gangnam. It is not an exaggeration to say that almost “every place” and “every person” in South Korea where an IP camera is installed has become a target of hacking.

    As of September 26, L Chinese pornographic websites contained about 800 IP camera hacking videos with specific locations, dates, and personal information. Around 500 of these videos belonged to the “Korean” category. Since each video could contain footage of as few as two or as many as 20 people, it is estimated that more than 1,000 South Koreans have fallen victim to IP camera hacking on this site alone. On average, 1 to 2 new videos were being uploaded to this category every 2 to 3 days.

    **”Hacked Korean IP Cameras: The changing room of three Korean employees. A beautiful waitress at the ×××× restaurant is changing clothes and getting ready to take your order.”**

    This is the title of a video found in the “IP Camera (Internet Camera)” category of the L Chinese pornographic website on September 24. The 50-second preview clip, accessible to anyone, contained unfiltered footage of seven women, seemingly ordinary people, changing into their uniforms before work, revealing exposure during the process. The footage was specific enough to identify the businesses, such as a tanghulu shop in the G area of Daegu and an S franchise sandwich shop, based on their uniforms. The name of the neighborhood was written on the uniforms, making it possible to pinpoint the store locations. In the left corner of the screen, the shooting date, day of the week, and time were displayed as “05-02-2024,” “Thursday,” and “14:01:41.”

    **”Hackers deliberately made noise to interrupt a Korean couple’s love life. The man was terrified.”**

    This was another video found in the same category. In the footage, a high-frequency noise suddenly echoed in a household, startling a naked couple and their dog, who began looking around for the source of the sound. The video ended the moment the startled man made eye contact with the camera.

    IP cameras are cameras that exchange information via the internet. Although they can be used for surveillance, monitoring, or caregiving, similar to CCTV (closed-circuit television), they are more versatile and much cheaper, making them more widely sold. In particular, home IP cameras are marketed for various purposes, such as monitoring pets, infants, or the elderly, under names like “pet cam,” “baby cam,” and “home cam.” These home-use IP cameras often feature real-time video streaming, remote control capabilities, and even two-way audio communication between the person being filmed and the user. IP cameras can typically be installed for around 100,000 to 300,000 won (USD 80 to 240), whereas CCTV installation can cost over 3 million won (USD 2,400).

    However, these IP cameras, intended for “information security,” have become a “leakage” path for sensitive data. Unlike CCTV, which is disconnected from the internet and connected through dedicated lines, making it less vulnerable to hacking, IP cameras are accessible via the internet, making them more prone to hacking. With just the device’s internet address (IP address) and manufacturer information, it can take only a minute to hack into an IP camera. Moreover, hacking programs designed to target IP cameras are widely available online, revealing a serious vulnerability in security. Most of the IP camera hacking footage found on domestic and international pornographic websites comes from China. Chinese hacking groups are essentially spying on our daily lives. They selectively edit “exposure” or “obscene acts” from the everyday lives of South Koreans to increase the appeal of their content.