ChipSoft Claims Verified Deletion of Stolen Patient Data After Embargo Ransomware Attack
ChipSoft reports it verified deletion of patient data stolen by the Embargo ransomware group after an April 7 intrusion that disrupted over 70% of Dutch hospitals’ EHR systems.

Stolen ChipSoft patient data destroyed following cyberattack
TL;DR
ChipSoft detected anomalous activity on April 7, later confirmed as an Embargo ransomware intrusion that exfiltrated patient records from its HiX platform. The vendor asserts it verified deletion of the stolen data without revealing its method, while hospitals faced temporary system shutdowns.
Context
ChipSoft supplies electronic health‑record software to more than 70 % of Dutch hospitals, making its HiX suite a central part of the nation’s healthcare IT. On April 7, internal analysts spotted unusual login patterns and file‑access spikes, initially labeling the event a data‑quality issue. Over the following days, forensic review showed that attackers had copied medical records and other personal details before deploying ransomware.
Key Facts
- Attack vector: Likely credential abuse or phishing (MITRE ATT&CK T1078, T1566) leading to initial foothold. - Threat actor: Ransomware group Embargo, known for double‑extortion tactics (exfiltration + encryption). - Impact: Patient medical records, treatment histories, and identifiers were stolen; HiX, patient portals, and mobile apps were taken offline for several days, forcing manual work‑arounds. - Response: ChipSoft engaged external cyber‑security firms and Dutch data‑protection authorities; it states it verified destruction of the exfiltrated data but did not disclose the verification technique. - Cost: Financial losses have not been publicly disclosed.
What It Means
The incident highlights the risk of relying on a single vendor for critical health infrastructure. Even with a claimed data‑deletion verification, the lack of methodological transparency leaves uncertainty about whether copies persist elsewhere. Hospitals must assume the data could still be misused and monitor for fraud or identity theft. The disruption also underscores how ransomware can impair care delivery when core clinical systems are taken offline.
Mitigations – What Defenders Should Do
1. Enforce multi‑factor authentication and privileged‑access workstations to blunt credential‑theft (CISA AA23‑001A). 2. Segment clinical networks from corporate LANs and restrict lateral movement using zero‑trust principles. 3. Deploy endpoint detection and response (EDR) rules that flag Embargo‑specific indicators, such as the ransom note filename pattern and the use of AES‑256 encryption with RSA‑wrapped keys (MITRE T1486). 4. Maintain offline, immutable backups of EHR databases and test restore procedures quarterly. 5. Apply vendor‑provided patches for HiX components promptly; monitor ChipSoft security advisories for CVE‑related fixes (e.g., CVE‑2023‑XXXX if released). 6. Conduct regular tabletop exercises that simulate double‑extortion ransomware scenarios, including decision points on ransom negotiation and data‑destruction verification.
Watch for the outcome of ChipSoft’s ongoing forensic investigation, any public disclosure of the data‑destruction method, and potential regulatory actions from the Dutch Data Protection Authority.
Continue reading
More in this thread
Trellix Reports Unauthorized Source Code Access, Says No Evidence of Exploitation
Peter Olaleru
Claude AI Chatbot Users Hit by Gift Card Fraud, Losing Hundreds of Dollars
Peter Olaleru
Vimeo Data Breach Linked to Anodot; ShinyHunters Demands Ransom by April 30
Peter Olaleru
Conversation
Reader notes
Loading comments...