Nation-state actors are reported to be systematically exploiting internet-connected IP cameras across multiple vendors for surveillance operations, leveraging endemic weakness classes including hardcoded credentials, missing authentication, and unauthenticated RTSP streams rather than a single disclosed CVE. No vendor-issued patch addresses this campaign; remediation requires configuration hardening, network segmentation, and credential rotation across all deployed camera hardware regardless of manufacturer. Organizations should treat IP cameras as high-value intelligence targets requiring enterprise-grade controls — internet exposure should be eliminated, cameras should be isolated on dedicated VLANs with deny-all egress, and all factory-default credentials must be replaced.