Misconfigured AWS S3 Bucket at HealthTech Startup Cura360 Exposes 250,000 Patient Records

Cura360 HealthTech Startup Leaks 250,000 Patient Records via Public AWS S3 Bucket

HIGH
April 26, 2026
5m read
Data BreachCloud SecurityPolicy and Compliance

Impact Scope

People Affected

250,000 patients

Industries Affected

HealthcareTechnology

Geographic Impact

United States (national)

Related Entities

Organizations

Amazon Web Services (AWS) Department of Health and Human Services

Products & Tech

Amazon S3

Other

Cura360HIPAA

Full Report

Executive Summary

Health-tech startup Cura360 has suffered a significant data breach, exposing the sensitive data of approximately 250,000 patients due to a misconfigured Amazon Web Services (AWS) S3 bucket. The storage bucket was inadvertently configured for public access, allowing its contents to be viewed and downloaded by anyone with a web browser. The exposed data includes a vast amount of protected health information (PHI), such as full names, addresses, dates of birth, health insurance details, diagnostic images (X-rays, MRIs), lab results, and doctors' notes. This incident represents a critical failure in cloud security governance and a severe violation of patient privacy, with significant regulatory implications under the Health Insurance Portability and Accountability Act (HIPAA).


Threat Overview

This incident is a case of data exposure due to human error and a lack of security controls, rather than a sophisticated external attack.

  • What: A publicly accessible AWS S3 bucket containing sensitive patient data.
  • Who: The misconfiguration was made by Cura360, an AI-powered diagnostic platform startup.
  • Data Exposed: Approximately 250,000 patient records, including:
    • Full names, addresses, dates of birth
    • Health insurance details
    • Detailed medical records (diagnostic images, lab results, doctors' notes)
  • Discovery: The leak was discovered and reported by an independent security researcher.
  • Root Cause: Failure to implement basic cloud security best practices. The S3 bucket was set to 'public' instead of 'private'.

Technical Analysis

The root cause is a simple but common misconfiguration in cloud services. AWS S3 buckets are private by default, meaning an administrator had to actively change the settings to make it public or apply a policy that had that effect.

Common Causes for S3 Misconfiguration:

  1. Manual Error: An administrator or developer manually set the bucket permissions to 'public' for a temporary reason (e.g., to easily share a file) and forgot to revert the setting.
  2. Incorrect IAM Policies: A poorly written Identity and Access Management (IAM) policy or Bucket Policy could have granted public read access (s3:GetObject) to all users (Principal: "*").
  3. Infrastructure as Code (IaC) Errors: An error in an IaC template (e.g., Terraform, CloudFormation) could have defined the bucket as public, and this error was then propagated automatically.

Once the bucket is public, anyone can access its contents if they know the bucket's name. Attackers and researchers use automated tools to scan for open buckets by trying common naming conventions (e.g., companyname-backup, companyname-data).

MITRE ATT&CK TTPs (Applicable to Data Access):


Impact Assessment

For Patients:

  • Extreme Privacy Violation: Exposure of the most sensitive personal and medical information.
  • High Risk of Fraud: The data can be used for medical identity theft, insurance fraud, and highly targeted phishing or blackmail campaigns based on medical conditions.
  • Emotional Distress: The knowledge that one's private medical history is public can cause significant emotional and psychological harm.

For Cura360:

  • Regulatory Penalties: The company faces massive fines from the Department of Health and Human Services (HHS) for HIPAA violations. Fines can range from thousands to millions of dollars.
  • Existential Threat: For a startup, the combination of regulatory fines, legal costs from class-action lawsuits, and loss of customer and investor confidence can be an existential threat to the business.
  • Loss of Trust: In the health-tech space, trust is paramount. A breach of this nature makes it extremely difficult to attract and retain customers (both patients and healthcare providers).

IOCs — Directly from Articles

No specific Indicators of Compromise are applicable, as this was a data exposure, not an intrusion.


Cyber Observables — Hunting Hints

Organizations should hunt for their own misconfigurations, not for external attackers in this scenario.

Type
other
Value / Pattern
S3 buckets with 'public' ACLs or policies allowing "Principal":"*".
Description
This is the direct indicator of a misconfiguration.
Context
AWS console, AWS CLI (aws s3api get-bucket-acl), or Cloud Security Posture Management (CSPM) tools.
Confidence
high
Type
log_source
Value / Pattern
AWS CloudTrail logs showing PutBucketAcl or PutBucketPolicy events.
Description
Auditing who made the change that exposed the bucket.
Context
SIEM or CloudTrail log analysis.
Confidence
high
Type
other
Value / Pattern
AWS Trusted Advisor or other CSPM tool alerts for 'Publicly Accessible S3 Buckets'.
Description
Automated detection of the misconfiguration.
Context
Cloud security tool dashboards.
Confidence
high

Detection & Response

Detection:

  • Cloud Security Posture Management (CSPM): The most effective method is to use a CSPM tool that continuously scans your cloud environment for misconfigurations, including public S3 buckets, and provides automated alerts.
  • AWS Native Tools: Utilize AWS services like AWS Config to create rules that detect non-compliant configurations, and Amazon Macie to discover and protect sensitive data within S3 buckets.
  • Regular Audits: Conduct periodic manual or scripted audits of all S3 bucket permissions.

Response:

  1. Immediate Remediation: As soon as the public bucket was identified, Cura360 correctly secured it by changing its permissions to private.
  2. Investigation: Analyze AWS CloudTrail and S3 access logs to determine when the bucket was made public, what data was accessed, and from what IP addresses. This is crucial for understanding the scope of the breach.
  3. Regulatory Notification: Notify the appropriate regulatory bodies (HHS for HIPAA) and affected individuals within the legally mandated timeframes.

Mitigation

Preventing this type of breach is entirely achievable with basic cloud security hygiene.

  1. Block Public Access (BPA): Enable the account-level 'Block Public Access' setting in AWS. This acts as a global safety net, preventing any bucket in the account from being made public, even if an administrator makes a mistake at the individual bucket level.
  2. Automate Security Checks: Integrate security checks into the CI/CD pipeline. Use tools to scan IaC templates for insecure configurations before they are ever deployed. (D3-ACH: Application Configuration Hardening)
  3. Principle of Least Privilege: Implement strict IAM policies that grant only the minimum necessary permissions. Avoid using wildcard permissions (s3:*).
  4. Data Classification and Encryption: Classify data and ensure that all sensitive data, such as PHI, is encrypted at rest in S3 using services like AWS KMS. While this wouldn't have prevented the exposure in this case (as the public permission grants access to decrypt), it is a critical defense-in-depth layer.
  5. Developer Training: Train all developers and administrators who work with cloud services on fundamental security best practices and the 'shared responsibility model'.

Timeline of Events

1
April 25, 2026
Security researcher discovers and reports the publicly accessible AWS S3 bucket.
2
April 25, 2026
Cura360 secures the S3 bucket and begins its investigation.
3
April 26, 2026
This article was published

MITRE ATT&CK Mitigations

Properly configure cloud storage permissions to be private by default and enable features like AWS S3 Block Public Access.

Audit

M1047enterprise

Continuously audit cloud configurations using CSPM tools to automatically detect and alert on misconfigurations like public S3 buckets.

Encrypt sensitive data at rest. While it wouldn't have prevented this specific exposure, it's a critical defense-in-depth control.

D3FEND Defensive Countermeasures

The Cura360 data leak is a textbook case that could have been entirely prevented by implementing Cloud Security Posture Management (CSPM). A CSPM tool should be deployed to continuously scan the company's entire AWS environment. It should be configured with a high-priority rule to detect any S3 bucket that is publicly accessible. For a healthcare company like Cura360, this rule should be even stricter, flagging any bucket containing data classified as PHI (using services like Amazon Macie) that does not have the 'Block Public Access' setting enabled. The CSPM tool should be integrated with a ticketing or alerting system to ensure that any such misconfiguration is flagged and remediated within minutes, not discovered by a researcher weeks or months later. This automated, continuous monitoring is non-negotiable for any organization handling sensitive data in the cloud.

To prevent misconfigurations like the one at Cura360 from ever reaching production, security must be shifted left and automated through Application Configuration Hardening within the CI/CD pipeline. All cloud infrastructure should be defined as Infrastructure as Code (IaC), using tools like Terraform or CloudFormation. Before any IaC code is deployed, it must pass through an automated security scan (using tools like tfsec, checkov, or AWS Config conformance packs) that checks for insecure configurations. A rule stating 'No S3 bucket can be defined with public read access' should be a mandatory, build-breaking check. This ensures that a developer's mistake or a faulty template is caught automatically before it can create a vulnerable resource in the production environment. This 'policy as code' approach is far more effective than relying on manual reviews.

Timeline of Events

1
April 25, 2026

Security researcher discovers and reports the publicly accessible AWS S3 bucket.

2
April 25, 2026

Cura360 secures the S3 bucket and begins its investigation.

Sources & References

HealthTech Startup Cura360 Leaks 250,000 Patient Records via Public S3 Bucket
Infosecurity Magazine (infosecurity-magazine.com) April 25, 2026
Misconfigured S3 bucket at health-tech firm Cura360 exposes trove of patient data
PortSwigger Daily Swig (portswigger.net) April 25, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Data LeakData BreachCloud SecurityAWSS3MisconfigurationCura360HIPAAPHI

📢 Share This Article

Help others stay informed about cybersecurity threats