- Over 80% of South Korea's security cameras are Chinese-made and prone to hacking.
- Hundreds of hacked videos, including sensitive locations, are sold on illegal Chinese websites.
- Many users believe backdoors and poor after-sales support contribute to the hacking issue.
More than 80% of Chinese-made internet cameras (IP cameras) used in South Korea have been found to be hackable.
Videos captured by these cameras, which are commonly installed in public and private facilities, are surfacing on illegal Chinese websites.
The footage, which includes sensitive locations such as delivery rooms, fitness centers, and swimming pools, carries a significant risk of personal information disclosure.
According to Weekly Chosun, approximately 800 hacked videos had been confirmed as of September 26, with around 500 tagged as “Korean”.
The footage, which often shows specific locations and dates, has raised concerns about potential data leaks.
These illegal videos are uploaded every two to three days and sold online, exacerbating the problem.
Alarmingly, there is an increasing demand for these videos in South Korea, with some users even posting requests for footage from specific locations.
Experts attribute the high hacking rate to the widespread use of Chinese-made IP cameras, which account for roughly 80% of South Korea's surveillance network.
One user stated, “I've heard that Chinese products include backdoors. I suppose it is for the Chinese government to collect information.”
Another user expressed concern about poor after-sales support, mentioning that security flaws frequently go unpatched, leaving devices vulnerable. They may be cheap, but there's a reason why they're cheap.
The convenience of remote monitoring has made internet-connected cameras popular, but critics warn about the risks.
Some see the dominance of Chinese products as part of a larger national strategy, warning that users are unknowingly jeopardizing their security by choosing cheaper alternatives.
Subscribe to our newsletter
Some users are now even questioning the safety of other Chinese smart devices, such as internet-connected locks, implying that they may pose similar risks.
Chinese companies' involvement in the platforms and firmware used by these cameras complicates the situation even more.
While some suggest completely excluding Chinese products, there is no national oversight in South Korea to advise consumers on which devices are secure.
This incident is very similar with concerns in other countries, including the United States, which had previously clashed with Huawei over fears of technological espionage.
While the full scope of Chinese influence on IP camera security is unknown, the fact that videos from South Korean facilities are leaking online is enough to spark calls for action.
The notorious Insecam website, which displayed live camera feeds using default passwords, is a well-known example of the risk posed by these cameras.
Cybercriminals can easily gain access to these devices simply because users do not change the default settings, leaving them vulnerable to anyone with the manufacturing password.
With new videos appearing every few days, what can be done to protect the public's privacy?
Many people believe that updating camera firmware, strengthening router encryption keys, and avoiding products with ties to Chinese companies are the only ways to keep hackers out permanently.