Particle.news
Download on the App Store

India’s Hospital CCTV Hack Mapped: Default Passwords, Automated Tools, 50,000 Clips Sold

Investigators now outline an automated exploit that leveraged default CCTV logins to feed a paid market for stolen hospital footage.

Overview

  • Police say at least 80 CCTV dashboards across roughly 20 states were compromised from January to early December 2024, yielding more than 50,000 clips from hospitals, schools, offices, factories, cinemas and homes.
  • The operation combined public IP discovery (suIP.biz), high‑speed scanning (Masscan), credential extraction (SWC) and logins via the legitimate DMSS app after brute‑force attacks on systems left on factory passwords such as “admin123.”
  • Teasers on YouTube channels including “Megha Mbbs” and “cp monda” funneled buyers to private Telegram groups where clips were sold for about ₹700 to ₹4,000 and circulated into international porn and fetish networks.
  • Core suspects including Prajwal Teli, Praj Patil and Chandraprakash Phoolchand were arrested within 39 hours of the FIR in February 2025 and charged under the BNS and IT Acts, with cyber‑terrorism sections invoked.
  • Logs tracked over 11,000 external sessions routed through VPNs appearing in Bucharest and New York, and investigators report stolen videos persisted on Telegram at least until June, underscoring calls for basic fixes like changing defaults, MFA and network segregation.