ESHYFT’s Data Breach Debacle: When “Uber for Nurses” Leaves the Door Wide Open
ESHYFT, the “Uber for nurses,” had an S3 bucket spill more beans than a clumsy cook. Over 86,000 records of sensitive nurse data were left exposed for months, making it a prime target for cybercriminals. While ESHYFT connects nurses to shifts, it seems they also inadvertently connected their data to the public.

Hot Take:
Hold onto your scrubs, folks, because ESHYFT just turned the healthcare data world into the Wild West with their wide-open S3 bucket! Who knew that playing nurse matchmaker could come with such a hefty side of data exposure drama? Next time, maybe they should consider a padlock or two, or at least a password. Yikes!
Key Points:
- Over 86,000 records linked to ESHYFT, a healthcare tech company, were exposed in a public S3 bucket.
- Data included highly sensitive information like facial images, ID documents, and medical records.
- Researcher Jeremiah Fowler discovered and reported the exposure, but it remained public for over a month.
- ESHYFT provides a platform connecting nurses with per-diem shifts, collecting lots of personal data.
- Proper encryption could prevent such data breaches, but it requires significant development effort.
Already a member? Log in here