CCTV – Hikvision ransomware claim


What does it mean for firms using Hikvision for CCTV?

Hikvision has appeared on the ransomware leak site ransomware.live under the group name Alp-001. The listing says it was discovered on 21 March 2026 and includes claims of 19.9 TB of data being taken. Those details come from the leak listing itself, so they should be treated as claims rather than confirmed facts.

For most businesses, the key point is not to get lost in the headline. The real question is simpler than that:

If we use Hikvision, have we locked it down well enough?

What has actually happened?

A ransomware leak site has published a listing for hikvision.com. It includes claims about stolen data and other affected records, but those figures have not been independently verified on the page itself.

That does not automatically tell you what has happened inside your own business. What it does do is act as a reminder that systems linked to security still need to be secured properly.

Does this mean our Hikvision cameras are compromised?

No.

A claim against the manufacturer does not mean every business using Hikvision has been breached.

But it should be treated as a prompt to review your own setup. If a business has cameras or recorders that have been left untouched for years, use weak passwords, or are too open to the outside world, the risk is clearly higher than for a business that has kept things properly controlled.

Why should this matter to a business owner or manager?

Because this is not really a camera issue. It is a business risk issue.

If a security device is not properly controlled, it can create disruption, open the door to wider cyber risk, and add another weak point into the business. That matters because the impact of a cyber incident is rarely technical in the real world. It shows up as downtime, stress, loss of confidence, disruption to staff, and potential damage to reputation.

But aren’t cameras there to improve security?

Yes, but that does not mean they are secure by default.

That is the trap. Something can be bought for safety or security and still become a weakness if it is not looked after properly. Hikvision’s own security guidance stresses the need for strong passwords, secure activation and other hardening measures, which underlines that these devices still need managing properly.

What should we do if we use Hikvision?

Start with the simple questions:

  • Do we know what Hikvision devices we have?
  • Do we know who can access them?
  • Are they still using weak or old passwords?
  • Have they been reviewed recently?
  • Are they more exposed than they need to be?

This is less about diving into technical settings and more about making sure a security product has not quietly become a business weakness.

What can we do right now to reduce risk?

There are a few practical steps that make sense straight away.

Check they are properly protected

Hikvision’s own guidance warns that default and weak passwords are a critical threat and recommends strong passwords when devices are activated.

In simple terms, if a device is still using an easy password, or a password nobody has reviewed for years, that needs fixing.

Review how open they are

Hikvision’s hardening guidance says services like DDNS can increase security risk by exposing a device to the internet, and says they should remain disabled if not needed. It also recommends disabling UPnP when remote or cloud-based access is not required.

In plain English, the more open the system is to the outside world, the more chance it has of attracting the wrong attention.

Keep them updated

Hikvision has published firmware updates with security enhancements in the past.

That means if a device has not been reviewed or updated for a long time, it is worth checking whether it is still being properly maintained.

Treat old kit as a risk

If a device cannot be updated, supported or properly controlled anymore, it stops being reassuring and starts becoming a liability.

Are weak passwords really that big a deal?

Yes.

Hikvision’s own security guide says default and weak passwords pose a critical threat, and it recommends strong passwords from the moment the device is activated. It also recommends enabling login lock features to defend against brute-force attempts.

For a business, the takeaway is simple: weak passwords make it far easier for the wrong person to get in.

Do we need to panic?

No.

But this is not something to shrug off either.

The sensible response is not panic. It is review. If your Hikvision setup is well managed, properly protected and not unnecessarily exposed, that is a very different position from having old surveillance kit sitting in the background with little attention paid to it.

Final thought

This is really a reminder that anything connected to your business can become part of your cyber risk if it is not managed properly.

If you use Hikvision, now is a good time to ask a few straightforward questions:

  • Is it locked down properly?
  • Is access tighter than it used to be?
  • Has it been reviewed recently?
  • Are we relying on it without really knowing how exposed it is?

That is where the real value is here. Not fear. Just a sensible review before a problem lands on your desk.

Use Hikvision in your business?
Now is a good time to review who can access it, how open it is, and whether it still meets the standard you would expect from something connected to your business.

Our Accreditations

Our Reviews

Subscribe for Latest Cyber Security News & Tips