Cybersecurity2 hrs ago

ChipSoft Claims Verified Deletion of Stolen Patient Data After Embargo Ransomware Attack

ChipSoft reports it verified deletion of patient data stolen by the Embargo ransomware group after an April 7 intrusion that disrupted over 70% of Dutch hospitals’ EHR systems.

Peter Olaleru/3 min/NG

Cybersecurity Editor

TweetLinkedIn
Stolen ChipSoft patient data destroyed following cyberattack

Stolen ChipSoft patient data destroyed following cyberattack

Source: EscudodigitalOriginal source

ChipSoft detected anomalous activity on April 7, later confirmed as an Embargo ransomware intrusion that exfiltrated patient records from its HiX platform. The vendor asserts it verified deletion of the stolen data without revealing its method, while hospitals faced temporary system shutdowns.

Context

ChipSoft supplies electronic health‑record software to more than 70 % of Dutch hospitals, making its HiX suite a central part of the nation’s healthcare IT. On April 7, internal analysts spotted unusual login patterns and file‑access spikes, initially labeling the event a data‑quality issue. Over the following days, forensic review showed that attackers had copied medical records and other personal details before deploying ransomware.

Key Facts

- Attack vector: Likely credential abuse or phishing (MITRE ATT&CK T1078, T1566) leading to initial foothold. - Threat actor: Ransomware group Embargo, known for double‑extortion tactics (exfiltration + encryption). - Impact: Patient medical records, treatment histories, and identifiers were stolen; HiX, patient portals, and mobile apps were taken offline for several days, forcing manual work‑arounds. - Response: ChipSoft engaged external cyber‑security firms and Dutch data‑protection authorities; it states it verified destruction of the exfiltrated data but did not disclose the verification technique. - Cost: Financial losses have not been publicly disclosed.

What It Means

The incident highlights the risk of relying on a single vendor for critical health infrastructure. Even with a claimed data‑deletion verification, the lack of methodological transparency leaves uncertainty about whether copies persist elsewhere. Hospitals must assume the data could still be misused and monitor for fraud or identity theft. The disruption also underscores how ransomware can impair care delivery when core clinical systems are taken offline.

Mitigations – What Defenders Should Do

1. Enforce multi‑factor authentication and privileged‑access workstations to blunt credential‑theft (CISA AA23‑001A). 2. Segment clinical networks from corporate LANs and restrict lateral movement using zero‑trust principles. 3. Deploy endpoint detection and response (EDR) rules that flag Embargo‑specific indicators, such as the ransom note filename pattern and the use of AES‑256 encryption with RSA‑wrapped keys (MITRE T1486). 4. Maintain offline, immutable backups of EHR databases and test restore procedures quarterly. 5. Apply vendor‑provided patches for HiX components promptly; monitor ChipSoft security advisories for CVE‑related fixes (e.g., CVE‑2023‑XXXX if released). 6. Conduct regular tabletop exercises that simulate double‑extortion ransomware scenarios, including decision points on ransom negotiation and data‑destruction verification.

Watch for the outcome of ChipSoft’s ongoing forensic investigation, any public disclosure of the data‑destruction method, and potential regulatory actions from the Dutch Data Protection Authority.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...