Moneycontrol PRO
Outskill Genai
HomeNewsIndiaOne password, 50,000 victims: How a hospital’s CCTV turned into a porn pipeline

One password, 50,000 victims: How a hospital’s CCTV turned into a porn pipeline

A simple ‘admin123’ login exposed hospitals and homes across India. Here’s how hackers built a nationwide porn ring from CCTV feeds.

November 04, 2025 / 07:14 IST
Hackers turned hospital CCTV feeds into an underground porn network, and they did it with one password.

It began with a single password: admin123.

What should have been a harmless factory-set login at Rajkot’s Payal Maternity Hospital turned into the entry point for one of India’s most disturbing cyber scandals. Within months, hackers had broken into CCTV dashboards across hospitals, homes, schools and offices, silently recording private moments and selling them online.

The fallout was staggering: According to a Times of India report, over 50,000 intimate clips stolen and traded on international porn fetish networks, exposing massive security lapses in India’s digital infrastructure.

The digital trail: January to December 2024

Investigators told TOI that the breach at Payal Hospital wasn’t an isolated case. Access logs show that the hackers operated unchecked for nearly a year, from January 2024 to early December 2024, before arrests were finally made in February 2025.

During that period, the group allegedly infiltrated at least 80 CCTV dashboards across India, spanning 20 states, including hospitals in Pune, Mumbai, Nashik, Surat, Ahmedabad, and Delhi. Even private residences, cinema halls and corporate offices weren’t spared.

From Rajkot to Telegram: How the clips spread

The scandal came to light when teaser videos from Rajkot’s Payal Hospital surfaced on YouTube channels like 'Megha Mbbs' and 'cp monda.'

Viewers were redirected to Telegram groups where full videos were sold for Rs 700–Rs 4,000 per clip.

Even months after the first arrests, investigators found these clips still circulating on Telegram as late as June 2025, proving just how resilient and profitable this underground ecosystem had become.

Meet the masterminds: BCom graduate turned hacker

At the centre of the operation was Parit Dhameliya, a 20-something commerce graduate with a knack for coding.

According to the Ahmedabad cybercrime branch as cited by TOI, Dhameliya used three separate software programs to brute-force passwords on vulnerable CCTV systems, essentially using bots to try every possible combination of letters and numbers until one worked.

Once credentials were cracked, another accused, Rohit Sisodiya, entered the scene. Operating from Delhi under the guise of a medical lab technician, Sisodiya used legitimate remote-viewing software to access and stream live hospital feeds, a chilling misuse of everyday technology.

‘Admin123’: the password that unlocked a country

Perhaps the most alarming detail investigators uncovered was that many CCTV systems across India still used factory default passwords like 'admin123.'

It meant that thousands of systems, from hospitals to schools, were effectively open doors for cybercriminals.

An Ahmedabad cyber officer admitted, “This wasn’t high-tech hacking, it was carelessness. Default passwords and outdated firewalls made it easy.”

As one investigator put it, “We talk about AI and quantum computing, but our hospitals still run on admin123.”

Mira Sen has covered Indian politics and national developments for over a decade, closely tracking elections, national parties, policymakers, on-the-ground developments — and their impact on citizens.
first published: Nov 4, 2025 07:13 am

Discover the latest Business News, Sensex, and Nifty updates. Obtain Personal Finance insights, tax queries, and expert opinions on Moneycontrol or download the Moneycontrol App to stay updated!

Subscribe to Tech Newsletters

  • On Saturdays

    Find the best of Al News in one place, specially curated for you every weekend.

  • Daily-Weekdays

    Stay on top of the latest tech trends and biggest startup news.

Advisory Alert: It has come to our attention that certain individuals are representing themselves as affiliates of Moneycontrol and soliciting funds on the false promise of assured returns on their investments. We wish to reiterate that Moneycontrol does not solicit funds from investors and neither does it promise any assured returns. In case you are approached by anyone making such claims, please write to us at grievanceofficer@nw18.com or call on 02268882347