Rajkot, Gujarat: One of India’s most shocking cybercrime incidents has come to light from Rajkot, where a major hospital’s CCTV system was hacked due to the use of a default password, “admin123.” The breach resulted in the theft of thousands of private videos from the hospital’s gynecology ward, many of which were later sold and circulated on foreign pornographic networks.
According to investigators, the stolen footage was sold through Telegram groups for prices ranging from ₹700 to ₹4,000 per clip. The videos first surfaced publicly when teaser clips appeared on YouTube channels such as “Megha MBBS” and “CP Monda,” drawing widespread attention and outrage.
50,000 Videos Leaked; 80 Surveillance Systems Hacked Nationwide
Police reports reveal that between January and December 2024, hackers infiltrated the CCTV system of Rajkot’s Payal Maternity Hospital and stole approximately 50,000 private videos from its gynecology ward.
Further investigations uncovered that at least 80 CCTV systems across major Indian cities — including Pune, Mumbai, Nashik, Surat, Ahmedabad, and Delhi — were similarly compromised. The affected cameras were installed in hospitals, schools, offices, factories, and even private residences, exposing severe lapses in digital security practices.
Hackers Used “Brute Force Attack” Technique
Authorities confirmed that the hackers employed a “brute force attack” — a cyber technique in which software rapidly tests countless password combinations until it gains access.
Two key suspects have been arrested in connection with the case:
Parit Dhamelia, a B.Com graduate, allegedly developed and used three different software tools to steal passwords and was identified as the primary mastermind behind the breach.
Rohit Sisodia, who holds a diploma in Medical Laboratory Technology, reportedly used the stolen login credentials to hack into cameras and download private footage. He was arrested in Delhi.
Despite initial arrests, investigators revealed that the stolen videos continued to circulate online until June 2025, indicating the depth and persistence of the cybercrime network.
Warning: Security Vulnerabilities Persist
Investigators have warned that a large number of CCTV systems across India still operate using factory-set default passwords such as “admin123.” Authorities have urged institutions and individuals to immediately update their passwords and strengthen security measures to prevent similar breaches in the future.

.png)
.png)
The opinions posted here do not belong to 🔰www.indiansdaily.com. The author is solely responsible for the opinions.
As per the IT policy of the Central Government, insults against an individual, community, religion or country, defamatory and inflammatory remarks, obscene and vulgar language are punishable offenses. Legal action will be taken for such expressions of opinion.