2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Hackers compromised 80 CCTV systems across India, stealing over 50,000 clips and selling them for profit on porn channels. The attackers exploited weak passwords and used various hacking tools to access cameras in hospitals, schools, and homes. Key members of the operation were arrested, facing charges under cyber terrorism laws.
If you do, here's more
In India, a major cybercrime has exposed vulnerabilities in digital security, with hackers stealing over 50,000 CCTV clips from various facilities. These breaches spanned hospitals, schools, and private residences across multiple cities, including Pune, Mumbai, and Delhi. The stolen footage was sold on Telegram channels for prices ranging from Rs 700 to Rs 4,000, feeding into an international porn network. The operation, which lasted nine months, was uncovered when clips from Payal Maternity Hospital surfaced on YouTube.
Hackers exploited weak security, primarily using default passwords like "admin123," to gain access. A brute force attack was employed, where software systematically tested password combinations. Parit Dhameliya, the lead hacker, utilized tools to identify IP addresses of cameras and scan for vulnerabilities. After compromising systems, he and other accomplices accessed live feeds through legitimate applications designed for remote viewing. The operation involved a network of individuals, including financial facilitators like Praj Patil, who handled payments for access.
The scale of unauthorized access was staggering, with over 11,000 successful sessions recorded. Investigators tracked the activity through extensive log files from early 2024. Law enforcement acted quickly, arresting key members within 39 hours of the first report. Those apprehended faced charges under the BNS and IT Acts, highlighting the serious implications of this cybercrime.
Questions about this article
No questions yet.