Ads Area

Rajkot Hospital Cyber Scandal: Default Password Leads to Massive Privacy Breach

Rajkot, Gujarat: One of India’s most shocking cybercrime incidents has come to light from Rajkot, where a major hospital’s CCTV system was hacked due to the use of a default password, “admin123.” The breach resulted in the theft of thousands of private videos from the hospital’s gynecology ward, many of which were later sold and circulated on foreign pornographic networks.


According to investigators, the stolen footage was sold through Telegram groups for prices ranging from ₹700 to ₹4,000 per clip. The videos first surfaced publicly when teaser clips appeared on YouTube channels such as “Megha MBBS” and “CP Monda,” drawing widespread attention and outrage.

50,000 Videos Leaked; 80 Surveillance Systems Hacked Nationwide

Police reports reveal that between January and December 2024, hackers infiltrated the CCTV system of Rajkot’s Payal Maternity Hospital and stole approximately 50,000 private videos from its gynecology ward.

Further investigations uncovered that at least 80 CCTV systems across major Indian cities — including Pune, Mumbai, Nashik, Surat, Ahmedabad, and Delhi — were similarly compromised. The affected cameras were installed in hospitals, schools, offices, factories, and even private residences, exposing severe lapses in digital security practices.

Hackers Used “Brute Force Attack” Technique

Authorities confirmed that the hackers employed a “brute force attack” — a cyber technique in which software rapidly tests countless password combinations until it gains access.

Two key suspects have been arrested in connection with the case:

Parit Dhamelia, a B.Com graduate, allegedly developed and used three different software tools to steal passwords and was identified as the primary mastermind behind the breach.

Rohit Sisodia, who holds a diploma in Medical Laboratory Technology, reportedly used the stolen login credentials to hack into cameras and download private footage. He was arrested in Delhi.

Despite initial arrests, investigators revealed that the stolen videos continued to circulate online until June 2025, indicating the depth and persistence of the cybercrime network.

Warning: Security Vulnerabilities Persist

Investigators have warned that a large number of CCTV systems across India still operate using factory-set default passwords such as “admin123.” Authorities have urged institutions and individuals to immediately update their passwords and strengthen security measures to prevent similar breaches in the future.

Post a Comment

0 Comments
* Please Don't Spam Here. All the Comments are Reviewed by Admin.

Below Post Ad

www.indiansdaily.com GLOBAL INDIAN COMMUNITY

Ads Area

avatar
EDITOR Welcome to www.indiansdaily.com
Hi there! Can I help you?,if you have anything please ask throgh our WhatsApp
:
Chat WhatsApp