TL;DR
If you have Dahua or IMOU IP cameras manufactured roughly between 2015 and 2023, there is a significant probability they are already compromised. Attackers exploit the well-known CVE-2021-33044 vulnerability and the P2P cloud service (Easy4ip) to remotely create hidden administrator accounts on your cameras.
In this article we'll break down how to detect compromise, what specific markers attackers leave behind, and what to do if your cameras are already hijacked.
Symptoms of compromise: what to look for
If you're a sysadmin maintaining a CCTV system, or a business owner with Dahua/IMOU cameras installed, or simply a user of surveillance cameras — make sure to check for these indicators:
1. Unknown users in the account list
Log into the camera or recorder's web interface: Setup → System → Users.
If you see a user with a random-looking name (e.g. ajmnocf, default, goguberlin, fcam, hackedby, AlexGogu) with administrator privileges and a "comment" like CISA — this is a direct indicator of compromise. It's not a regular account; it's a botnet marker tagging the camera as "captured territory".
2. Suspicious links in configuration fields
In channel names, descriptions, comments, or other text fields, you may find a Discord server invite link (e.g. FCAM - discord.gg/DpSH***). This is a coordination channel for a community trading access to compromised cameras and sharing video streams.
Do not visit this link under any circumstances — it's an active threat actor resource, and even browsing it may put your security at risk.
3. Anomalous network traffic
The cameras continuously attempt outbound connections to external servers:
165.154.0.0/16— Dahua P2P infrastructure47.254.0.0/16,47.91.0.0/16,47.245.0.0/16— Dahua cloud on Alibaba Cloud (Hong Kong/Singapore)Ports
8800,15301,12367UDP/TCP
This is the botnet's command channel routed through legitimate Dahua cloud infrastructure.
4. A deleted user reappears
A classic sign — you delete the suspicious account, and 30-60 minutes later it's back. The botnet "re-installs" it through the P2P channel from a command server.
5. Settings change "by themselves"
After Factory Default and reconfiguration, certain parameters (P2P state, ONVIF users, network configuration) revert to the previous compromised state.
How it works: technical breakdown
CVE-2021-33044: authentication bypass without a password
This is a critical vulnerability with a CVSS score of 9.8 (out of 10), which CISA officially added to the Known Exploited Vulnerabilities Catalog in August 2024. It has been actively exploited since 2021.
The vulnerability works as follows: during authentication, an attacker passes the parameter clientType: "NetKeyboard" in the login request (CVE-2021-33044) or specifies "loopback" as the connection source (CVE-2021-33045). If your camera runs a Dahua firmware released before mid-2021, in these cases attackers completely bypass password validation and gain administrator access.
Technically:
Normal login: MD5("admin:realm:PASSWORD")
Exploit: MD5("admin:realm:") — empty password
Vulnerable firmware accepts the empty-password hash and returns a valid session token. No brute force, no default credentials — just authentication bypass.
The P2P attack vector
How does an attacker reach your camera inside your local network behind NAT?
A Dahua camera with P2P (Easy4ip) enabled automatically registers with Dahua's cloud infrastructure, receiving a unique UID. Anyone with this UID can connect to the camera through Dahua's relay servers, bypassing your NAT and firewall. This is by design — it's the feature that powers "remote viewing via the DMSS app without port forwarding".
Attackers:
Scan Dahua's P2P infrastructure for accessible UIDs
Connect to the camera through a P2P relay
Apply CVE-2021-33044 to bypass authentication
Create an admin user (
ajmnocfand similar)Plant a Discord invite as a territorial marker
Install a persistent daemon for re-entry
This isn't a local problem. It's a global campaign
To avoid making bare claims — here are the public sources documenting this exact problem:
CISA (US) — added CVE-2021-33044 to the Known Exploited Vulnerabilities Catalog in August 2024
Bleeping Computer — estimated 1.2 million potentially vulnerable Dahua cameras exposed on the internet (per Shodan)
IPVM (the leading independent IP video surveillance publication) — multi-year coverage of Dahua compromises
Bitdefender — disclosed CVE-2025-31700/31701 in July 2025, enabling persistent daemons in camera firmware
Cyber Security Agency of Singapore — official advisory
ipcamtalk.com forum — active "Hacked DAHUA cam and added that names" thread
The username ajmnocf we encountered is not yet in public threat intel databases — it's a new variant of the same botnet just now emerging. If you find this user on your cameras, you're seeing the same active campaign.
What to do: action checklist
If you've found signs of compromise
Step 1. Isolate from the internet
First and most important — immediately cut cameras off from WAN. If you use MikroTik, add firewall rules. If you have a consumer router, disable port forwarding and UPnP. Without a connection to its command server, the botnet can't do anything.
Step 2. Preserve evidence
Before resetting, take screenshots of the compromised users, links, and settings — for incident reporting and future analysis.
Step 3. Factory Default + Initialize
Through Dahua's official Config Tool utility, perform Factory Default (full reset) on each camera — not "Default" (soft reset, which doesn't clear user accounts). Then go through the initialization procedure with a new strong password.
Step 4. Firmware update
Download the latest official firmware from the Dahua or IMOU official sites — official sources only. Install it on every camera.
Step 5. Security configuration
On every camera, make sure to:
Disable P2P / Easy4ip (Setup → Network → P2P → Disable)
Disable UPnP, DDNS, Bonjour, Multicast, SNMP
Uncheck "Anonymous Login" in user settings
Disable Auto Register / Active Registration
Disable Cloud Upgrade
Set a strong unique password (16+ characters)
Check ONVIF users (a separate list!) — remove unauthorized ones
Change default HTTP/RTSP/SDK ports
Configure IP Filter (Whitelist) — only NVR and admin IPs
Step 6. Check the NVR
If your cameras are compromised, there's a high probability the recorder is too. Repeat the procedure for the NVR/DVR.
Step 7. Network audit
Check other devices on the local network — a compromised camera may have served as an entry point for attacks against servers, workstations, and other devices.
Preventive measures (for everyone)
Even if you haven't found signs of compromise, we recommend:
Network level:
Place cameras in a dedicated VLAN
Block camera outbound internet access at the firewall
Allow camera access only from NVR and admin workstation IPs
Local DNS (e.g. via MikroTik), redirect Dahua cloud domain queries to 127.0.0.1
Use VPN for remote access (WireGuard, OpenVPN), not P2P
Camera level:
Disable all cloud features (P2P, DDNS, Auto Register, Cloud Upgrade)
Strong unique passwords
Regular firmware updates
On-camera IP filtering
Architecture level:
For existing Dahua/Hikvision deployments — strictly isolate them from the internet
Document each site's configuration
What we do when we find a compromised system
In our client work we regularly encounter this problem. Our standard playbook:
Audit — inventory of cameras, models, firmware versions, account status, and cloud feature configuration
Evidence collection — preserve indicators of compromise (users, links, traffic anomalies) before any remediation
Isolation — firewall configuration (typically MikroTik) to block external communication
Cleanup — Factory Default + Initialize + firmware update + full reconfiguration per security checklist
Network segmentation — moving cameras to a VLAN with restricted access
VPN for remote access — replacing P2P with a secure channel
Monitoring — logging configuration to detect further anomalies
Documentation — client report with incident description and recommendations
If you'd like to have your system checked — we provide these services. Contact us ↗.
Conclusion
The compromise of Dahua and IMOU IP cameras is not a theoretical threat or a local bug. It's a documented global campaign exploiting:
The critical CVE-2021-33044/33045 vulnerability (authentication bypass without a password)
Legitimate Dahua P2P infrastructure as a delivery channel for attacks
Weak default settings on millions of devices worldwide
The good news: the problem is solvable. The right combination of network isolation, configuration cleanup, and disabling P2P completely blocks the attack. Cameras keep working, you don't lose access — only the remote access method changes (VPN instead of Dahua cloud).
The bad news: the problem won't go away on its own. Without intervention, cameras will remain part of the botnet, leaking video streams to unknown destinations and participating in attacks on other systems.
If your cameras still have P2P enabled and are exposed to the internet, the best time for an audit has already passed. The second-best time is now.
References
This material is educational and analytical. Sensitive details (full Discord invite link, exact threat actor artifacts) are deliberately omitted to prevent dissemination of active attack infrastructure.