MODERATE SEVERITYChilden

NurseryCam Data Breach

NurseryCam Childcare Monitoring Service Security Failure (2021): Live Nursery Video Feeds of Children Accessible via Critical Vulnerabilities

NurseryCam provides live video streaming of children in daycare or nursery environments, allowing parents to monitor activity remotely. Connects physical camera systems with online access portals tied to families and childcare providers.

Verified by ObscureIQ Intelligence

4.0Severity
11KRecords
1Fields
2021Year

ObscureIQ Breach Intelligence Scores
6.0
Breach Risk Index
40
Data Value
10
Market Recency
1889
days
Since Breach

Risk Interpretation

Extremely high risk. Exposure can enable stalking, child privacy violations, household targeting, and unauthorized observation of children and caregivers. Streaming-access systems create acute physical-safety concerns.

🎯 Impact & Downstream Threats

The institutional impact on NurseryCam was effectively terminal. The service was shut down, and the parent companies Footfallcam Ltd and Meta Technologies Ltd faced UK ICO scrutiny, regulatory exposure under GDPR and UK data-protection law, and substantial reputational damage that extended across their broader IoT-product portfolio. The case has been formally cited in UK regulatory guidance about IoT device security and parental-monitoring services. Reputational impact concentrated within the UK

Primary downstream threats:
  • Targeted phishing campaigns using exposed email addresses

🔓 Threat Vectors

Phishing, credential stuffing & account takeover

📋 Breach Intelligence

EntityNurseryCam
Organization • Global
Breach Date2021-02-01
HIBP Added2021-02-23
Records~11K (10,600 records)
Attack VectorUnknown
Threat ActorAnonymous hacker (12K parent credentials dumped); separate researcher disclosure by Andrew "Cybergibbons" Tierney
SourceHave I Been Pwned / ObscureIQ
SensitivityMinors
Breach ID987.0
StatusConfirmed

📝 Executive Summary

NurseryCam, a UK-based childcare-monitoring service that allowed parents at approximately 40 UK nurseries to view live video feeds of their children, suffered a security breach disclosed publicly on February 19-20, 2021. The incident is best characterized as a series of egregious security failures rather than a single data breach. Independent security researcher Andrew 'Cybergibbons' Tierney had documented multiple critical vulnerabilities in early February 2021 including the absence of TLS encryption on video streams, the persistence of access permissions for parents whose children no longer attended the nursery, the ability for parents to access camera feeds in nursery rooms where their children were not present, insecure direct object reference vulnerabilities allowing arbitrary video feed access by URL manipulation, and the use of shared administrator credentials that were published in the company's public instruction manual. A separate hacker exploited these vulnerabilities and obtained parent account credentials from approximately 12,000 NurseryCam users, which were dumped online, prompting the company to take its cameras offline.

The breach affected approximately 10,000 to 12,000 parent records based on records indexed by Have I Been Pwned and the original hacker disclosure. Compromised fields included email addresses, names, usernames, and SHA-1-hashed passwords. The hacker publicly stated they had no intention of using the data to harm anyone and that they wanted to force NurseryCam to raise its security standards. Far more critically, the vulnerabilities themselves enabled unauthorized live-video access to children at the affected nurseries, with no reliable record of how many parties may have viewed the feeds during the multi-year period the vulnerabilities existed.

For affected parents and the broader population of children at the affected UK nurseries, the practical risk profile combines standard credential exposure with significant child-safety concerns. The credential exposure supports credential-stuffing attacks against any other accounts where parents reused the same password, and parents should change any reused passwords on other accounts. The more serious concern relates to the live-video access vulnerabilities themselves: because the vulnerabilities had reportedly existed for at least six years prior to public disclosure (since at least 2015 per a parent's earlier report), unknown parties may have had access to live video streams of children at NurseryCam-equipped nurseries during that period without detection. Parents whose children attended NurseryCam-equipped nurseries between approximately 2015 and 2021 may wish to review the timeline of their child's nursery attendance against the documented vulnerability period and discuss any concerns with their nursery and with applicable UK child-safeguarding authorities.

🏢 About NurseryCam

NurseryCam was a UK-based subscription childcare-monitoring service operated by Footfallcam Ltd and Meta Technologies Ltd, headquartered in Guildford, England, with Melissa Kao as director. The service deployed CCTV cameras inside UK nurseries (daycare centers for children aged approximately five months to six years) and provided parents with remote access to live video streams of their children at nursery via a web portal and mobile application. NurseryCam was deployed at approximately 40 nurseries across the UK and marketed itself with the claim of being 'safer than online banking.' As a childcare-monitoring platform, NurseryCam maintained parent account data including identity, contact information, login credentials, and access to live and stored video feeds of children at participating nurseries.

Platform | Live nursery and daycare video streaming | Subscription-based childcare monitoring service | Global
Globalnurserycam.co.uk

🗂 Why They Hold Your Data

Childcare video-streaming platforms collect parent accounts, child-related records, camera or room access data, billing records, and live-stream access information tied to daycare or nursery monitoring.

📰 Recent Developments

NurseryCam was shut down on February 20-21, 2021 following the breach disclosure and has not returned to operation under the same brand. The UK Information Commissioner's Office began assessing the matter following the data-breach report. The case has been widely cited in UK IoT-security commentary as a leading example of vendor unresponsiveness to security disclosure, particularly because Footfallcam Ltd had a documented pattern of attempting to strongarm security researchers including Andrew 'Cybergibbons' Tierney into deleting public Twitter discussion of vulnerabilities in its FootfallCam sister-product. A NurseryCam parent had reported essentially the same class of vulnerability to the company in 2015, six years before the 2021 breach forced disclosure, with NurseryCam reportedly brushing off the report at the time.

🔍 Data Points Exposed

1 verified field types:
Email addresses

Canonical Fields

email_address

🌐 Dark Web Verification

Confirmed
  • Dataset containing ~11K records identified in breach intelligence sources
  • Data indexed and searchable across breach notification platforms
  • Source: NurseryCam Data Breach

🛡 Recommended Actions

⚠️ Do not assume this is low sensitivity.

1Freeze Your Credit
Place a credit freeze with Equifax, Experian, and TransUnion.
2Expect Targeted Phishing
Watch for emails referencing this breach. Verify through official channels.
3Enable MFA Everywhere
Enable multi-factor authentication on all accounts.
4Monitor Accounts
Watch for unauthorized activity on financial and personal accounts.
5Check Your Exposure
ObscureIQ clients: this breach is indexed in your profile.

Protect Yourself

Check If You’re Affected

Enter your email to check if your data appears in this breach.

Get Free Breach Alerts

Be the first to know when new breaches are disclosed.

High-Risk? Get an Exposure Audit

Full-spectrum exposure audits for executives and public figures.

Request Consultation

ObscureIQ Advisory

We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.

If you are:
  • A public-facing individual
  • A high-profile executive
  • A customer of NurseryCam
  • Or concerned about credential reuse
Services
AuditsWipesThreat MonitoringTraining

Classification Tags

ChildenEmail

Powered by the ObscureIQ Breach Intelligence Database

© 2026 ObscureIQ · All Rights Reserved · Data Licensing

Latest from ObscureIQ

Credit

What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)

July 14, 2025
Every time there’s a major data breach, companies scramble to offer “free” credit monitoring. It sounds like a responsible move.…
breach economycredit freezecredit scoreequifaxexperian
Credible Threats

Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.

September 2, 2025
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars. Over 80% of security incidents now start in the browser. Chrome.…
brave browserbreachesbrowser exploitbrowserschrome
Analysis

Sextortion Spam

May 10, 2025
Sextortion scams aren’t new, but they remain one of the most effective forms of cyber-enabled fraud. These scams don’t rely…
bitcoindeadlinefeargoogle maps apiransom