150,000 patients
Telehealth provider HealthPath has confirmed a critical data exposure incident after a security researcher discovered a publicly accessible Amazon S3 bucket containing the sensitive medical data of approximately 150,000 patients. The unsecured bucket held over 700,000 files, including X-rays, lab results, and insurance forms, which were accessible to anyone on the internet. The company stated the misconfiguration was a result of 'human error' during a system update and has since secured the bucket. However, the exposure of highly sensitive Protected Health Information (PHI) constitutes a severe breach of patient privacy and places HealthPath under investigation for potential violations of the Health Insurance Portability and Accountability Act (HIPAA), which could result in substantial fines.
This incident is a classic example of a cloud security misconfiguration, one of the most common causes of data breaches. The failure to implement basic security controls on a storage bucket containing PHI represents a grave oversight with serious consequences for patient privacy.
The incident was not a sophisticated hack but a failure of basic security hygiene. The core issue was an improperly configured Access Control List (ACL) or bucket policy on an Amazon S3 bucket.
T1530 - Data from Cloud Storage Object): During a system update on January 20, 2026, an engineer or automated script likely set the permissions for the S3 bucket to be publicly readable. This made the data accessible to anyone who knew the bucket's URL.It is critical to note that while HealthPath claims no evidence of malicious access, it is nearly impossible to prove a negative. Once a bucket is public, it is often scanned and its contents downloaded by automated bots within hours. Organizations must assume the data has been compromised.
Detecting cloud misconfigurations should be an automated and continuous process:
Preventing such exposures requires a combination of technology, process, and training:
M1054 - Software Configuration): Integrate security checks into the CI/CD pipeline. Use 'infrastructure-as-code' scanning tools to detect insecure configurations (like public S3 buckets) before they are ever deployed to production.Implement secure baseline configurations for cloud services and use tools to continuously monitor for deviations.
Encrypt sensitive data like PHI at rest to provide a layer of protection even if storage is misconfigured.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats