ESHYFT’s Data Breach Debacle: When “Uber for Nurses” Leaves the Door Wide Open

ESHYFT, the “Uber for nurses,” had an S3 bucket spill more beans than a clumsy cook. Over 86,000 records of sensitive nurse data were left exposed for months, making it a prime target for cybercriminals. While ESHYFT connects nurses to shifts, it seems they also inadvertently connected their data to the public.

Pro Dashboard

Hot Take:

Hold onto your scrubs, folks, because ESHYFT just turned the healthcare data world into the Wild West with their wide-open S3 bucket! Who knew that playing nurse matchmaker could come with such a hefty side of data exposure drama? Next time, maybe they should consider a padlock or two, or at least a password. Yikes!

Key Points:

  • Over 86,000 records linked to ESHYFT, a healthcare tech company, were exposed in a public S3 bucket.
  • Data included highly sensitive information like facial images, ID documents, and medical records.
  • Researcher Jeremiah Fowler discovered and reported the exposure, but it remained public for over a month.
  • ESHYFT provides a platform connecting nurses with per-diem shifts, collecting lots of personal data.
  • Proper encryption could prevent such data breaches, but it requires significant development effort.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?