Ransomware Attack Disrupts ChipSoft EHR Services Across Dutch and Belgian Hospitals
What Happened – A ransomware campaign targeted ChipSoft’s electronic health‑record (EHR) platform, encrypting critical databases and forcing hospitals in the Netherlands and Belgium to suspend patient‑care applications. Services were taken offline within hours of the initial intrusion.
Why It Matters for TPRM –
- Disruption of core clinical systems can jeopardize patient safety and trigger regulatory penalties.
- The incident highlights the risk of supply‑chain exposure when a single vendor supports multiple health‑care providers.
- Ransomware actors continue to prioritize high‑value healthcare infrastructure, demanding robust third‑party controls.
Who Is Affected – Healthcare providers (hospitals, clinics) using ChipSoft’s EHR suite in the Netherlands, Belgium, and any other regions where the platform is deployed.
Recommended Actions –
- Verify that ChipSoft has applied the latest ransomware‑mitigation patches and hardened its backup/recovery processes.
- Review contractual SLAs for incident response and service continuity with the vendor.
- Conduct a risk‑based assessment of your own reliance on ChipSoft, including data‑segmentation and contingency planning.
Technical Notes – The attackers leveraged a known ransomware payload delivered via a compromised privileged account, exploiting weak multi‑factor authentication (MFA) controls. No public CVE was cited, but the intrusion underscores the importance of credential hygiene and network segmentation. Source: Security Affairs Newsletter – Round 572