Potentially millions of patients across 70-80% of Dutch hospitals
ChipSoft, a leading Dutch software vendor whose Electronic Health Record (EHR) systems are integral to 70-80% of hospitals in the Netherlands, has fallen victim to a significant ransomware attack. The incident, which came to light on April 7, 2026, forced the company to disable key digital platforms, including its patient portal (Zorgportaal) and mobile application (HiX Mobile). In response, the Dutch healthcare CERT (Z-CERT) advised institutions to disconnect from ChipSoft's services, leading at least 11 hospitals to take their patient-facing systems offline. While no critical care processes have been halted, the attack has caused major operational disruptions and raised the possibility of a massive patient data breach.
The attack on ChipSoft is a classic example of a supply chain attack with far-reaching consequences. By targeting a single, central software provider, the unidentified threat actors have impacted a vast portion of the Dutch healthcare sector. The attack forced ChipSoft to take preemptive action by shutting down its public website and disabling connections to its Zorgportaal, HiX Mobile, and Zorgplatform services to contain the breach and prevent lateral movement into hospital networks.
Z-CERT, the Netherlands' computer emergency response team for healthcare, is coordinating the response. They issued a confidential memo urging all healthcare clients of ChipSoft to terminate connections and audit their internal systems for any signs of compromise. The identity of the ransomware group remains unknown, as no group has publicly claimed responsibility for the attack.
While the specific ransomware variant and initial access vector have not been disclosed, the attackers' actions are consistent with modern double-extortion ransomware operations. The TTPs likely involved are:
T1566 - Phishing) to exploitation of an unpatched vulnerability (T1190 - Exploit Public-Facing Application).T1537 - Transfer Data to Cloud Account. ChipSoft's admission that they cannot rule out data access suggests this step occurred.T1486 - Data Encrypted for Impact.T1490 - Inhibit System Recovery.The immediate impact has been significant operational disruption. At least 11 hospitals, including Sint Jans Gasthuis and Laurentius Hospital, have taken patient portals offline. This forces a reversion to manual, less efficient processes, such as telephone calls and paper records, increasing staff workload and the potential for errors.
No specific Indicators of Compromise (IOCs) have been publicly released at this time.
For healthcare organizations connected to ChipSoft or similar critical vendors:
vssadmin.exe delete shadows), and disabling of security software.D3FEND Reference: In a supply chain attack scenario, D3-OTF - Outbound Traffic Filtering is critical to block potential data exfiltration, and D3-PA - Process Analysis can detect the ransomware payload executing on endpoints.
This incident underscores the importance of supply chain risk management.
M1029 - Data Backup.D3FEND Reference: A robust backup strategy is a form of D3-FR - File Restoration. Network segmentation aligns with D3-NI - Network Isolation.
Maintain regular, tested, and isolated backups to ensure data can be restored after a ransomware attack without paying a ransom.
Segmenting networks can prevent ransomware from spreading from a compromised vendor or IT system to critical healthcare systems.
Train users to recognize and report phishing attempts, a common initial access vector for ransomware.
The ultimate defense against a destructive ransomware attack like the one on ChipSoft is the ability to restore systems and data from clean backups. This D3FEND technique, often called the 3-2-1 backup rule, is crucial. Organizations must maintain at least three copies of their data, on two different media types, with at least one copy stored off-site and offline (or immutable). In the context of the ChipSoft attack, affected hospitals with their own robust backup and restoration capabilities for patient data would be better positioned to recover operations, even while disconnected from the primary EHR vendor. It is essential to regularly test these backups to ensure they are viable and that the restoration process meets the organization's Recovery Time Objective (RTO). This mitigates the 'Impact' tactic (T1486) by rendering the attacker's encryption leverage moot.
This incident highlights the systemic risk of interconnected systems. Network Isolation is a key countermeasure. Hospitals should architect their networks so that critical internal systems are segmented from the connections to third-party vendors like ChipSoft. This 'zero trust' approach means that even if the vendor is compromised, the ransomware cannot automatically spread into the hospital's network. The connection to ChipSoft should be in its own isolated network zone, with strict firewall rules controlling what data can pass between it and the main hospital network. The quick action of the 11 Dutch hospitals to disconnect demonstrates a manual application of this principle. An automated or semi-automated system to 'trip a circuit breaker' and isolate a compromised vendor connection can significantly reduce the blast radius of a supply chain attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats