Telehealth Provider HealthPath Exposes 700,000 Patient Medical Files in S3 Bucket Leak

Unsecured Amazon S3 Bucket at HealthPath Exposes Medical Records of 150,000 Patients

HIGH
February 16, 2026
5m read
Data BreachCloud SecurityRegulatory

Impact Scope

People Affected

150,000 patients

Industries Affected

Healthcare

Geographic Impact

United States (national)

Related Entities

Products & Tech

Other

HealthPath

Full Report

Executive Summary

Telehealth provider HealthPath has confirmed a critical data exposure incident after a security researcher discovered a publicly accessible Amazon S3 bucket containing the sensitive medical data of approximately 150,000 patients. The unsecured bucket held over 700,000 files, including X-rays, lab results, and insurance forms, which were accessible to anyone on the internet. The company stated the misconfiguration was a result of 'human error' during a system update and has since secured the bucket. However, the exposure of highly sensitive Protected Health Information (PHI) constitutes a severe breach of patient privacy and places HealthPath under investigation for potential violations of the Health Insurance Portability and Accountability Act (HIPAA), which could result in substantial fines.


Threat Overview

  • Victim: HealthPath, a telehealth platform
  • Incident Type: Data Exposure via misconfigured cloud storage
  • Infrastructure: Amazon S3 bucket
  • Data Exposed: 700,000+ files containing PII and PHI, including names, dates of birth, patient IDs, medical scans (X-rays, MRIs), blood test results, and insurance forms.
  • Affected Population: An estimated 150,000 patients.
  • Root Cause: Human error; S3 bucket permissions set to public read.

This incident is a classic example of a cloud security misconfiguration, one of the most common causes of data breaches. The failure to implement basic security controls on a storage bucket containing PHI represents a grave oversight with serious consequences for patient privacy.

Technical Analysis

The incident was not a sophisticated hack but a failure of basic security hygiene. The core issue was an improperly configured Access Control List (ACL) or bucket policy on an Amazon S3 bucket.

  1. Misconfiguration (T1530 - Data from Cloud Storage Object): During a system update on January 20, 2026, an engineer or automated script likely set the permissions for the S3 bucket to be publicly readable. This made the data accessible to anyone who knew the bucket's URL.
  2. Discovery: A security researcher, using scanning tools that search for open S3 buckets, discovered the exposed data and privately disclosed it to HealthPath.

It is critical to note that while HealthPath claims no evidence of malicious access, it is nearly impossible to prove a negative. Once a bucket is public, it is often scanned and its contents downloaded by automated bots within hours. Organizations must assume the data has been compromised.

Impact Assessment

  • Patient Impact: The 150,000 affected patients are now at extreme risk of identity theft, highly targeted phishing scams (e.g., scams related to their specific medical conditions), and public embarrassment. The exposure of PHI is a profound violation of privacy.
  • Regulatory Impact (HIPAA): This is a clear-cut violation of the HIPAA Security Rule, which requires covered entities to 'protect against any reasonably anticipated threats or hazards to the security or integrity' of electronic PHI. HealthPath faces a mandatory investigation by the U.S. Department of Health and Human Services (HHS) and is likely to receive a multi-million dollar fine.
  • Business Impact: The incident will severely damage HealthPath's reputation and user trust. The company will incur significant costs related to the investigation, legal fees, patient notifications, and potential class-action lawsuits.

Detection & Response

Detecting cloud misconfigurations should be an automated and continuous process:

  1. Cloud Security Posture Management (CSPM): Implement a CSPM tool that continuously scans the cloud environment for misconfigurations, such as public S3 buckets, and provides automated alerts. This is the most effective way to detect such issues.
  2. AWS-Native Tools: Utilize AWS tools like AWS Config to create rules that trigger alerts when a bucket's policy changes to allow public access. Amazon GuardDuty can also detect suspicious access patterns to S3 buckets.
  3. Regular Audits: Conduct periodic manual and automated audits of all cloud storage permissions to ensure they adhere to the principle of least privilege.

Mitigation

Preventing such exposures requires a combination of technology, process, and training:

  1. Automate Security Checks (M1054 - Software Configuration): Integrate security checks into the CI/CD pipeline. Use 'infrastructure-as-code' scanning tools to detect insecure configurations (like public S3 buckets) before they are ever deployed to production.
  2. Block Public Access by Default: At the AWS account level, enable the 'Block Public Access' setting for all S3 buckets. This acts as a master control that overrides individual bucket policies, making it much harder to accidentally expose data.
  3. Data Classification and Encryption: Classify all data and apply appropriate security controls. All PHI should be encrypted at rest using strong encryption (M1041 - Encrypt Sensitive Information). While this doesn't prevent exposure, it can render the data useless to an unauthorized party if they do not also have the decryption keys.
  4. Developer Training: Train all engineers and developers on secure cloud configuration best practices. Ensure they understand the 'shared responsibility' model and the risks associated with misconfiguring cloud services.

Timeline of Events

1
January 20, 2026
A system update at HealthPath results in an S3 bucket being misconfigured for public access.
2
February 16, 2026
A security researcher discovers the open bucket and HealthPath secures it, later disclosing the exposure.
3
February 16, 2026
This article was published

MITRE ATT&CK Mitigations

Implement secure baseline configurations for cloud services and use tools to continuously monitor for deviations.

Encrypt sensitive data like PHI at rest to provide a layer of protection even if storage is misconfigured.

Audit

M1047enterprise

Regularly audit cloud configurations and permissions to proactively identify and remediate security gaps.

Sources & References

HealthPath Telehealth Service Exposes 700,000 Patient Documents in S3 Bucket Leak
Infosecurity Magazine (infosecurity-magazine.com) February 16, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

data exposurecloud securityAmazon S3misconfigurationhealthcareHIPAAPHI

📢 Share This Article

Help others stay informed about cybersecurity threats