ChipSoft Confirms Destruction of Stolen Patient Data Following Ransomware Attack
In a significant development for cybersecurity in European healthcare, Dutch software provider ChipSoft has announced that all data stolen during a recent ransomware attack has been successfully destroyed. The company, which supplies critical electronic health record (EHR) systems to general practitioners and healthcare institutions across the Netherlands and Belgium, confirmed on Tuesday that cybersecurity experts have verified the technical destruction of the compromised files. However, the statement has left lingering questions about the incident’s full scope and whether the hackers retained copies of the sensitive information.
The breach, first disclosed on April 7, 2026, involved the theft of approximately 100 gigabytes of data, including patient records, according to claims made by the hackers. ChipSoft’s systems, particularly its HiX platform, are widely used in Dutch primary care, making the incident a matter of national concern. The company’s latest update, published on its official news page, states that the stolen data has been “destroyed in a technically correct manner,” though it did not disclose whether a ransom was paid to achieve this outcome.
The ransomware attack, attributed to a group known as Embargo, had raised alarms across the Dutch healthcare sector. The hackers had initially threatened to publish the stolen data on the dark web, setting two countdown timers to escalate pressure on ChipSoft. While the company later confirmed it was negotiating with the group, the timers were eventually removed, and no data appears to have been leaked publicly. Despite this, cybersecurity experts caution that the absence of public disclosure does not guarantee the data’s complete eradication from the hackers’ possession.
The Attack and Its Immediate Fallout
The ransomware attack on ChipSoft began on April 7, 2026, when the company detected unauthorized access to its systems. Ransomware attacks typically involve encrypting a victim’s data and demanding payment for its release, but in this case, the hackers also exfiltrated sensitive information, adding an extra layer of risk. ChipSoft’s HiX platform, which manages patient records for thousands of healthcare providers, became the primary target, though the company has emphasized that hospitals using its systems were not directly affected.

In the days following the attack, Embargo claimed responsibility and asserted that it had obtained 100 GB of data, including medical records, personal identifiers, and administrative documents. The group’s dark web post included a chilling ultimatum: publish the data or face further consequences. While the countdown timers were later removed, the incident underscored the growing threat of “double extortion” ransomware attacks, where hackers not only encrypt data but also threaten to leak it unless their demands are met.
ChipSoft’s response has been measured but opaque. In its latest statement, the company confirmed that the stolen data had been destroyed but did not explain how it verified this outcome. “Our cybersecurity experts have confirmed that this destruction has taken place in a technically correct manner,” the statement read. However, the company declined to elaborate on whether it had received proof from the hackers that no copies of the data remained in their possession. This lack of transparency has drawn criticism from cybersecurity analysts, who argue that such assurances are difficult to verify without independent oversight.
Impact on Dutch Healthcare Providers
The breach has had significant repercussions for healthcare providers reliant on ChipSoft’s systems. General practitioners (GPs) across the Netherlands were among the hardest hit, with many reporting disruptions to their ability to access patient records. While ChipSoft has stated that the recovery process is progressing smoothly, it has asked for “understanding and time” as it works to restore full functionality to its platforms, including Zorgplatform, Zorgportaal, and HiX Mobile.
The Dutch Data Protection Authority (Autoriteit Persoonsgegevens, or AP) has been monitoring the situation closely. Under the European Union’s General Data Protection Regulation (GDPR), organizations that experience data breaches involving personal information must report the incident to the relevant authorities within 72 hours. ChipSoft’s compliance with this requirement has not been publicly confirmed, but the AP has the authority to impose fines of up to 4% of a company’s global revenue for violations. As of this writing, no enforcement action has been announced.
The incident has also reignited debates about the vulnerability of healthcare data in the Netherlands. A 2023 report by the Dutch National Cyber Security Centre (NCSC) highlighted that the healthcare sector is a prime target for cybercriminals due to the high value of medical data on the black market. The report noted that ransomware attacks on healthcare providers had increased by 30% year-over-year, with attackers often exploiting outdated software and weak security protocols.
Broader Implications for Cybersecurity in Healthcare
The ChipSoft breach is part of a troubling global trend of ransomware attacks targeting healthcare institutions. In 2025 alone, similar incidents have disrupted operations at hospitals in the United States, Germany, and the United Kingdom, leading to delayed treatments, canceled surgeries, and compromised patient safety. The healthcare sector’s reliance on interconnected digital systems makes it particularly vulnerable to such attacks, as even a single breach can have cascading effects across multiple providers.

One of the key challenges in responding to ransomware attacks is the dilemma of whether to pay the ransom. While law enforcement agencies, including Europol and the FBI, advise against paying, many organizations opt to do so to prevent the public release of sensitive data. In this case, ChipSoft has not disclosed whether it paid the hackers, leaving unanswered questions about the financial and ethical implications of its response.
Cybersecurity experts emphasize that prevention is the best defense against ransomware. Key recommendations for healthcare providers include:
- Regularly updating and patching software to address known vulnerabilities.
- Implementing multi-factor authentication (MFA) for all system access points.
- Conducting frequent cybersecurity training for staff to recognize phishing attempts and other common attack vectors.
- Maintaining offline backups of critical data to ensure recovery in the event of an attack.
- Engaging third-party cybersecurity firms to conduct penetration testing and vulnerability assessments.
What Happens Next?
ChipSoft has indicated that its recovery efforts are ongoing, though it has not provided a specific timeline for the full restoration of its services. The company has urged affected healthcare providers to remain patient as it works to ensure the integrity and security of its systems. Meanwhile, the Dutch Data Protection Authority continues to investigate the incident, and its findings could have significant implications for ChipSoft and other organizations handling sensitive health data.
For patients and healthcare providers, the incident serves as a stark reminder of the importance of cybersecurity in an increasingly digital world. While ChipSoft’s confirmation that the stolen data has been destroyed is a positive development, the lack of transparency around the incident leaves room for skepticism. As ransomware attacks grow in sophistication and frequency, the need for robust cybersecurity measures—and clear communication in the event of a breach—has never been more critical.
Key Takeaways
- Data Destruction Confirmed: ChipSoft has stated that all data stolen during the ransomware attack has been destroyed, though it has not provided independent verification of this claim.
- No Public Leak: The hackers, identified as the Embargo group, did not publish the stolen data, despite initial threats to do so.
- Impact on Healthcare: General practitioners and other healthcare providers using ChipSoft’s systems experienced disruptions, though hospitals were reportedly unaffected.
- Regulatory Scrutiny: The Dutch Data Protection Authority is investigating the incident, which could result in fines or other enforcement actions under GDPR.
- Global Trend: The attack is part of a broader increase in ransomware incidents targeting healthcare providers worldwide, highlighting the sector’s vulnerability.
- Prevention is Key: Experts recommend proactive cybersecurity measures, including regular software updates, multi-factor authentication, and staff training, to mitigate the risk of future attacks.
As the situation continues to develop, stakeholders will be watching closely to see whether ChipSoft provides further details about the incident and its response. For now, the company’s confirmation that the stolen data has been destroyed offers some reassurance—but the broader questions about cybersecurity in healthcare remain unanswered.
Have you or your organization been affected by the ChipSoft breach? Share your thoughts and experiences in the comments below, and aid spread awareness about the importance of cybersecurity in healthcare.