{"id":40917,"date":"2021-05-17T19:58:38","date_gmt":"2021-05-17T19:58:38","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/"},"modified":"2021-05-17T19:58:38","modified_gmt":"2021-05-17T19:58:38","slug":"eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/","title":{"rendered":"Eufycam Wi-Fi security cameras streamed video feeds from other people&#8217;s homes"},"content":{"rendered":"<p><span data-label=\"in brief\">In brief<\/span> Unlucky owners of Eufycam security cameras were horrified earlier today when they opened their app for the equipment and saw video streams from strangers&#8217; homes instead of their own.<\/p>\n<p>A software bug was blamed for the fault, which has been corrected, we&#8217;re told.<\/p>\n<p>These 1080p Wi-Fi-connected devices are made by Anker, and are designed to be used indoors and outdoors. They can record to microSD cards and\/or the cloud, and viewable via a mobile app. On Monday, some users found themselves staring at feeds from other people&#8217;s homes \u2013 even those in other countries \u2013 and feared they were being watched, too. The privacy breakdown sparked an eruption of complaints on <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.reddit.com\/r\/EufyCam\/\">Reddit<\/a> and Anker&#8217;s support forum.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,leaderboard,mpu,\" data-lg=\",fluid,leaderboard,\" data-xlg=\",fluid,superleaderboard,billboard,leaderboard,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>&#8220;I use Eufy to monitor my baby daughter&#8217;s room,&#8221; said one Redditor. &#8220;Tonight I logged into the app and instead have complete access to the security systems of someone in a different country. I can view streams from all of their cameras, turn lights on and off, and have access to the HomeBase settings. Their contact details including email addresses appear in my app.<\/p>\n<p>&#8220;This is a terrible security and privacy breach. If I&#8217;m able to view other people&#8217;s cameras, anyone could be looking in on my daughter. I have unplugged the camera in her room for now, but I imagine this is seriously bad news for Eufy. I will certainly be contacting a lawyer in the morning.&#8221;<\/p>\n<p>A spokesperson for Anker told us just a small number of customers were affected: &#8220;Due to a software bug during our latest server upgrade at 4:50 AM EST today, a limited number (0.001 per cent) of our users were able to access video feeds from other users\u2019 cameras. Our engineering team recognized this issue at around 5:30 AM EST, and quickly got it fixed by 6:30AM EST.&#8221;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,leaderboard,mpu,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>We&#8217;re told customers in the US, New Zealand, Australia, Cuba, Mexico, Brazil, and Argentina were affected though not GDPR-armed Europe.<\/p>\n<p>&#8220;We realize that as a security company we didn\u2019t do good enough,&#8221; the spokesperson added. &#8220;We are sorry we fell short here and are working on new security protocols and measures to make sure that this never happens again.&#8221;<\/p>\n<p>If they haven&#8217;t already done so, users <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/communitysecurity.eufylife.com\/t\/statement-from-eufy-security\/1181099\">should<\/a> unplug and then reconnect their devices, log out of the Eufy security app, and log in again to see the correct feeds.<\/p>\n<h3 class=\"crosshead\"> <span>DarkSide ransomware gang flees<\/span><br \/>\n<\/h3>\n<p>The DarkSide crew, which <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/05\/13\/colonial_pipeline_ransom\/\" rel=\"noopener noreferrer\">shut down<\/a> a major US oil pipeline with a ransomware infection, has insisted it has closed its doors, claiming unnamed law enforcement agents have taken control of its ransom-collection site, content delivery network, and cryptocurrency wallets. The crooks have extracted at least $17m from victims since March, according to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.elliptic.co\/blog\/elliptic-follows-bitcoin-ransoms-paid-by-darkside-ransomware-victims\">analysis<\/a> by Elliptic.<\/p>\n<p>DarkSide&#8217;s business model is to provide ransomware software and backend systems to affiliates that do the actual job of infecting and encrypting victims&#8217; networks. The gang then gives those partners a cut of any ransom paid. This criminal enterprise bit off more than it can chew by hitting America&#8217;s Colonial Pipeline, and attracting the attention of the FBI at least. Now the Eastern European crew claims it&#8217;s shutting down and ending its affiliate scheme \u2013 though it could simply be laying low to later rebrand itself and start all over again.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener noreferrer\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>&#8220;In view of the above and due to the pressure from the US, the affiliate program is closed,&#8221; it said, in a forum post <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.intel471.com\/blog\/darkside-ransomware-shut-down-revil-avaddon-cybercrime\">spotted by<\/a> Intel471 on Thursday. &#8220;Stay safe and good luck.&#8221;<\/p>\n<p>The group said it was giving out free decryption tools to victims who have yet to cough up. There are still funds in escrow from organizations that have paid a ransom, and DarkSide said it will make one last payment to affiliates by May 23.<\/p>\n<p>DarkSide isn&#8217;t alone in seemingly changing course. The Babuk ransomware crooks said they are stepping back, and have handed their source code to another team. The extortionists, who have <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2021\/04\/27\/washington_dc_police_ransomware\/\" rel=\"noopener noreferrer\">recently stolen<\/a> and <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.washingtonpost.com\/local\/public-safety\/dc-police-hackers-ransomware-babuk\/2021\/05\/13\/d0280fb4-b3f7-11eb-a980-a60af976ed44_story.html\">then published<\/a>, records from the Washington DC Metropolitan Police, say they will maintain existing operations for the time being.<\/p>\n<p>Meanwhile the operators of the REvil ransomware have changed their terms and conditions, saying that all future targets for their malware by their partners must be pre-approved and can&#8217;t include government, healthcare, educational, and charity organizations \u2013 because, we reckon, those are the ones that generate the most headlines, and ransomware gangs really hate publicity as it tends to attract more scrutiny by law enforcement and infosec researchers.<\/p>\n<p>If a handful of notable attacks finally stirs concerted international action against ransomware operators where they live, this could be a shift in the situation. But it&#8217;s far more likely others will come in to fill any gaps, and the scourge will continue.<\/p>\n<h3 class=\"crosshead\"> <span>Biden signs executive order on US cybersecurity<\/span><br \/>\n<\/h3>\n<p>Last week saw the panic buying of gas across the US East Coast due to the aforementioned pipeline ransomware attack. Amid that, President Biden unveiled his plan to make America secure again, or at least try to.<\/p>\n<p>As executive orders go, it&#8217;s <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\">a massive one<\/a>: more than 8,000 words that are good news for cloud platforms, bug hunters, and threat data sharers, although sysadmins may face a task or two. Here are the essentials.<\/p>\n<ul>\n<li>If you sell to a federal agency, security threats and incidents must be reported to the Feds in a timely manner, and personnel contracts banning such information sharing will need to be amended to enable this.<\/li>\n<li>Within its own IT systems, the government plans to shift as fast as possible to cloud-based, zero-trust operations and fully supporting &#8220;multifactor authentication and encryption,&#8221; the latter a hot-button issue of late.<\/li>\n<li>Biden wants action on supply-chain issues, such as those at the heart of the <a target=\"_blank\" href=\"https:\/\/search.theregister.com\/?q=SolarWinds\" rel=\"noopener noreferrer\">SolarWinds<\/a> fiasco, and the government is drawing up minimum security standards for agencies and those who supply them. It also orders a pilot scheme for an IoT device security labeling program so buyers know what they are letting themselves in for.<\/li>\n<li>Future major security incidents will be examined by a Cybersecurity Safety Review Board, made up of representatives from government and the private sector. They will issue post-incident reports and recommendations for best practice, though the report will be non-binding.<\/li>\n<li>The government will develop a playbook for how federal bodies deal with future attacks, including defining key terms to avoid inter-agency confusion.<\/li>\n<li>Federal agencies must keep and share event logs of incidents and security teams must coordinate with each other more efficiently.<\/li>\n<\/ul>\n<p>There are some lofty goals here though the devil is going to be in the implementation, and the speed of change. Miscreants aren&#8217;t sitting still.<\/p>\n<h3 class=\"crosshead\"> <span>US senator questions Pentagon about buying Americans&#8217; location data<\/span><br \/>\n<\/h3>\n<p>Senator Ron Wyden (D-OR) has written a formal request [<a target=\"_blank\" href=\"https:\/\/regmedia.co.uk\/2021\/05\/14\/wyden.pdf\" rel=\"noopener noreferrer\">PDF<\/a>] to the Pentagon to find out if it&#8217;s buying sensitive data on US persons&#8217; whereabouts without a search warrant.<\/p>\n<p>Uncle Sam&#8217;s Homeland Security is <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/12\/03\/aclu_phone_location\/\" rel=\"noopener noreferrer\">facing a lawsuit<\/a> for buying people&#8217;s location data from commercial vendors, thus getting around all that pesky business of getting a court order. Wyden wants to know if any Department of Defense agencies are doing the same warrant-less tracking by buying location data collected from phones, DNS traffic, vehicles, and any other internet traffic data.<\/p>\n<p>Wyden said he&#8217;s had some answers but not enough, and has spent the last year digging into the topic. Expect more on this in the coming months.<\/p>\n<h3 class=\"crosshead\"> <span>And while we&#8217;re on government spying, social media is next<\/span><br \/>\n<\/h3>\n<p>The US Homeland Security is setting up a task force to monitor social media posts for evidence of looming domestic terrorism.<\/p>\n<p>&#8220;We&#8217;re not looking at who are the individual posters,&#8221; a senior official <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.nbcnews.com\/politics\/national-security\/dhs-launches-warning-system-find-domestic-terrorism-threats-public-social-n1266707\">told NBC<\/a>. &#8220;We are looking at what narratives are resonating and spreading across platforms. From there you may be able to determine what are the potential targets you need to protect.&#8221;<\/p>\n<p>While the monitoring of public social media posts by the government isn&#8217;t illegal, and has been very useful in identifying the insurrectionists who stormed the Capitol in January, it worries civil liberties groups.<\/p>\n<p>Frankly, we&#8217;re amazed Homeland Security isn&#8217;t already doing this kind of surveillance. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/05\/17\/in_brief_security\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus: Biden&#8217;s order on security, US govt acquiring data on citizens, and more In brief\u00a0 Unlucky owners of Eufycam security cameras were horrified earlier today when they opened their app for the equipment and saw video streams from strangers&#8217; homes instead of their own.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-40917","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Eufycam Wi-Fi security cameras streamed video feeds from other people&#039;s homes 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eufycam Wi-Fi security cameras streamed video feeds from other people&#039;s homes 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T19:58:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Eufycam Wi-Fi security cameras streamed video feeds from other people&#8217;s homes\",\"datePublished\":\"2021-05-17T19:58:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/\"},\"wordCount\":1371,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/\",\"name\":\"Eufycam Wi-Fi security cameras streamed video feeds from other people's homes 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-05-17T19:58:38+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eufycam Wi-Fi security cameras streamed video feeds from other people&#8217;s homes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Eufycam Wi-Fi security cameras streamed video feeds from other people's homes 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/","og_locale":"en_US","og_type":"article","og_title":"Eufycam Wi-Fi security cameras streamed video feeds from other people's homes 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-17T19:58:38+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Eufycam Wi-Fi security cameras streamed video feeds from other people&#8217;s homes","datePublished":"2021-05-17T19:58:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/"},"wordCount":1371,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/","url":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/","name":"Eufycam Wi-Fi security cameras streamed video feeds from other people's homes 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-05-17T19:58:38+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YKLsT8E3Prv60vsamhR56gAAAEA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/eufycam-wi-fi-security-cameras-streamed-video-feeds-from-other-peoples-homes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Eufycam Wi-Fi security cameras streamed video feeds from other people&#8217;s homes"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40917"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40917\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}