Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

120,000 cameras hacked: How Connected Devices Become Your Greatest Vulnerability

In today’s interconnected world, almost every piece of equipment in a modern office or home is “smart”. From the climate control system and the coffee machine to the security cameras monitoring your front door, these devices offer immense convenience and efficiency. However, as our reliance on the Internet of Things (IoT) grows, so does a significant and often overlooked security risk.

Recent global events have highlighted just how vulnerable these devices can be. In late 2025, a massive hacking campaign in South Korea saw over 120,000 internet-connected cameras in homes and businesses compromised. The attackers exploited basic security oversights to gain live access to private feeds, which were then used for malicious and exploitative purposes. This incident serves as a stark reminder that if a device is connected to the internet, it is a potential doorway for a cybercriminal.

Why Are Connected Devices So Vulnerable?

Many users view a smart camera or a connected thermostat as a simple appliance rather than what it truly is: a small, specialised computer. Because they are often designed for ease of use rather than high-end security, they frequently lack the robust protections found on a standard laptop or server.

There are several common reasons why these devices become weak points:

  • Default Credentials: Many devices are shipped with a standard username and password (like “admin” and “1234”). If these are not changed immediately upon setup, an attacker can gain access in seconds using automated tools.
  • Infrequent Updates: Unlike your computer’s operating system, which prompts you for updates regularly, IoT firmware is often neglected. Many manufacturers do not provide long-term security patches, leaving known vulnerabilities open for years.
  • Lack of Encryption: Some lower-cost devices transmit data across your network without encryption. This means that if an attacker manages to get a foothold on your Wi-Fi, they could potentially “listen in” on your camera feeds or intercept sensitive commands.
  • Invisible Presence: Because these devices often sit in the background, they are rarely monitored. A hacked camera might continue to function perfectly while secretly sending data to a malicious server halfway across the world.

The Risk Beyond the Device

The danger isn’t just that someone might see through your camera. In a business environment, a compromised IoT device can be used as a “pivot point.” Once an attacker has control of a smart device, they can use it to scan the rest of your internal network, looking for ways to access your more sensitive systems, such as your financial records or client databases.

Think of it like a burglar finding an unlocked window in a garden shed. They might not find anything valuable in the shed itself, but once they are inside the garden, they have a much better chance of finding a way into the main house.

Practical Steps to Enhance Your Security

While no device is ever entirely risk-free, there are several strategies you can consider to significantly strengthen your defences:

  • Change All Passwords Immediately: Never leave a device on its factory default settings. Use a unique, complex password for every single connected item.
  • Create a Guest or IoT Network: Consider setting up a separate Wi-Fi network specifically for your smart devices. This isolates them from your main computers and servers, limiting the “blast radius” if one device is breached.
  • Audit Your Devices: Periodically check which devices are connected to your network. If you are no longer using a “smart” feature, consider disabling its internet access entirely.
  • Research Before You Buy: Prioritise reputable manufacturers that have a clear track record of providing regular security updates for their products.

How Vertex Can Help

Navigating the complexities of a modern, connected network can be a daunting task for any business. At Vertex, we specialise in helping organisations identify these hidden vulnerabilities before they can be exploited. Whether through a comprehensive Cyber Security Audit or technical Penetration Testing, our team of experts can help you ensure that your “smart” investments don’t become your greatest liabilities.

If you would like to understand more about securing your connected environment or wish to discuss a tailored security plan, please contact the expert team at Vertex Cyber Security or visit our website for further information.

CATEGORIES

Cyber Security

TAGS

cyber security - Data Privacy - iot - Network Protection - Smart Devices

SHARE

SUBSCRIBE

PrevPreviousYou Can’t Fake Physics: How 110ms of Lag Exposed a North Korean Infiltrator

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.