The Attack and Its Scale
ChipSoft, the Amsterdam-based healthcare IT company behind the HiX electronic patient record (EPR) system, suffered a ransomware attack detected on 7 April 2026. HiX is used by roughly 80% of hospitals in the Netherlands, making this one of the most systemically significant healthcare IT incidents Europe has seen.
By 8 April, eleven hospitals had taken ChipSoft’s systems offline and activated manual downtime procedures. Nine of those eleven were using HiX for core clinical workflows — including patient records, medication management, ward scheduling, and clinical communications. ChipSoft’s public-facing website and patient portal infrastructure became unreachable shortly after the attack was detected and remained down through the day.
Z-CERT, the Dutch national cybersecurity centre for healthcare and education, issued an advisory to all connected healthcare institutions directing them to:
- Immediately disconnect VPN tunnels to ChipSoft infrastructure
- Monitor internal network traffic for signs of lateral movement
- Activate downtime procedures and revert to paper-based clinical processes
- Report any anomalous activity in their own environments
Patient Data at Risk
ChipSoft confirmed to Dutch broadcaster NOS that the incident constitutes a “data incident” involving “possible unauthorised access,” and explicitly stated it cannot rule out that patient data has been accessed or stolen. HiX stores comprehensive clinical records including diagnoses, treatment histories, medication regimens, imaging reports, and patient demographics — data categories that command high prices on criminal markets and enable targeted fraud, extortion, and identity theft affecting patients.
Dutch data protection law requires notification to the Autoriteit Persoonsgegevens (Dutch Data Protection Authority) within 72 hours of identifying a breach involving personal data. Healthcare records are classified as special category data under the GDPR, carrying the strictest protections and the most serious consequences for unlawful disclosure.
Supply Chain and Concentration Risk
The ChipSoft incident illustrates a structural vulnerability in healthcare IT markets: the consolidation of clinical infrastructure around a small number of dominant vendors creates nation-level single points of failure. A successful attack on one vendor can simultaneously degrade clinical capability across dozens of hospitals.
This concentration problem is not unique to the Netherlands. Similar dynamics exist in the UK (where TPP and EMIS together serve most GP surgeries), the US (Epic and Oracle Health dominate hospital EPR markets), and across Europe. Regulators are increasingly aware of the risk, but few healthcare organisations have implemented the kind of vendor diversity or offline fallback capability that would meaningfully limit blast radius.
The ChipSoft attack follows a pattern that has become distressingly familiar: ransomware groups identify healthcare IT vendors as high-leverage targets precisely because the cascading operational impact creates maximum pressure for rapid payment, and because healthcare budgets for security are historically constrained relative to the sector’s data sensitivity.
What Affected Organisations Should Do
If your organisation uses ChipSoft/HiX:
- Follow Z-CERT guidance: disconnect VPN connections to ChipSoft infrastructure immediately
- Activate your downtime procedures and brief clinical staff on paper-based workflows
- Audit authentication logs for your own environment for signs of lateral movement from the ChipSoft network
- Prepare for a prolonged outage — recovery timelines for ransomware incidents affecting complex healthcare IT environments routinely extend to weeks
- Engage your DPO to assess notification obligations under GDPR Article 33 based on your own data sharing with ChipSoft
Broader supply chain risk management:
- Map all third-party vendor connections to your clinical environment and identify which vendors have VPN or direct system access
- Ensure that vendor access is auditable — you should be able to enumerate active sessions and revoke access within minutes
- Include healthcare IT vendors in your business continuity planning; downtime procedures for EPR outages must be practised, not theoretical
- Consider the ENISA Healthcare Cybersecurity Procurement Guidelines when evaluating future vendor contracts for security baseline requirements
Attribution
No ransomware group had publicly claimed responsibility for the ChipSoft attack as of 8 April. The absence of an immediate claim does not rule out data exfiltration — many groups conduct exfiltration silently before posting on data leak sites to allow negotiation time.