Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why Pigeons at Rest Are at the Center of Complexity Theory

    May 14, 2025

    Apple might let you scroll with your eyes in the Vision Pro

    May 14, 2025

    Brian Chesky Lost His Mind One Night—and Now He’s Relaunching Airbnb as an Everything App

    May 14, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database
    Security

    Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database

    News RoomBy News RoomSeptember 13, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    Thousands of people’s highly sensitive health details, including audio and video of therapy sessions, were openly accessible on the internet, new research has revealed. The cache of information, associated with a US health care firm, included more than 120,000 files and more than 1.7 million activity logs.

    At the end of August, security researcher Jeremiah Fowler discovered the exposed trove of information in an unsecured database linked to virtual medical provider Confidant Health. The company, which operates across five states including Connecticut, Florida, and Texas, helps provide alcohol- and drug-addiction recovery, alongside mental health treatments and other services.

    Within the 5.3 terabytes of exposed data were extremely personal details about patients that go beyond personal therapy sessions. Files seen by Fowler included multiple-page reports of people’s psychiatry intake notes and details of the medical histories. “At the bottom of some of the documents it said ‘confidential health data,’” Fowler says.

    For instance, one seven-page psychiatry intake file, which appeared to be based on an hour session with a patient, details issues with alcohol and other substances, including how the patient claimed to have taken “small amounts” of narcotics from their grandparent’s hospice supply before the family member passed away. In another document, a mother describes the “contentious” relationship between her husband and son, including that while her son was using stimulants he accused her partner of sexual abuse.

    The exposed health documents include some medical notes on people’s appearance, mood, memory, their medications, and overall mental status. One spreadsheet seen by the researcher appears to list Confidant Health members, the number of appointments they’ve had, the types of appointment, and more.

    “There’s some heartbreaking, really painful family trauma, personal trauma,” Fowler says, adding that some of the files were audio and videos of patient sessions. “It’s almost like having your deepest darkest secrets that you’ve told your diary revealed, and it’s things that you never want to get out.”

    Alongside the medical files in the exposed database were administration and verification documents, including copies of driver’s licenses, ID cards, and insurance cards, Fowler says. The logs also contained indications that some data is collected by chatbots or artificial intelligence, making references to prompts and AI responses to questions.

    Confidant Health quickly shut off access to the exposed database after Fowler contacted the company, he says. The researcher, who alerts companies to exposed data and does not download any of it, says a proportion of the 120,000 files that were exposed had some form of password protection in place. Fowler says he reviewed around 1,000 files to verify the exposure and determine the source of the data so he could alert the company. He says it is unusual that an exposed database would include both locked and unlocked files.

    In a statement to WIRED, Confidant Health cofounder Jon Read says the company takes security concerns seriously and “take[s] issue with the sensational nature” of the findings. Read says once the company had been notified of the “improper configuration,” access to the exposed files was “fixed in less than an hour.”

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleThe OnePlus Watch 2, one of our top Android smartwatch picks, hits its best price
    Next Article Spotify is testing a new way to keep kids songs out of your listening history

    Related Posts

    Google’s Advanced Protection for Vulnerable Users Comes to Android

    May 14, 2025

    Google Is Using On-Device AI to Spot Scam Texts and Investment Fraud

    May 14, 2025

    An $8.4 Billion Chinese Hub for Crypto Crime Is Incorporated in Colorado

    May 14, 2025

    ICE’s Deportation Airline Hack Reveals Man ‘Disappeared’ to El Salvador

    May 13, 2025

    US Border Agents Are Asking for Help Taking Photos of Everyone Entering the Country by Car

    May 13, 2025

    The Trump Administration Sure Is Having Trouble Keeping Its Comms Private

    May 12, 2025
    Our Picks

    Apple might let you scroll with your eyes in the Vision Pro

    May 14, 2025

    Brian Chesky Lost His Mind One Night—and Now He’s Relaunching Airbnb as an Everything App

    May 14, 2025

    Grok really wanted people to know that claims of white genocide in South Africa are highly contentious

    May 14, 2025

    Google’s Advanced Protection for Vulnerable Users Comes to Android

    May 14, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    News

    Microsoft starts testing  ‘Hey, Copilot!’ in Windows

    By News RoomMay 14, 2025

    Microsoft is testing a feature for Copilot Voice that will let Windows 11 users start…

    7 of our favorite deals from Amazon’s 48-hour Pet Day sale

    May 14, 2025

    GM’s New Battery Tech Could Be a Breakthrough for Affordable EVs

    May 14, 2025

    Plugable’s new dock supports five displays from one USB-C port

    May 14, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.