ChipSoft ransomware attack disrupts Dutch hospital software, with spillover reported in Belgium


Dutch healthcare software provider ChipSoft has confirmed a serious cyber incident, and Z-CERT says it was a ransomware attack. The company’s outage forced precautionary shutdowns of several online healthcare services, including Zorgportaal, HiX Mobile, and Zorgplatform, which many hospitals use for patient access and communication.

The attack matters because ChipSoft is one of the biggest electronic health record software suppliers in the Netherlands. Reports say its HiX platform is widely used across Dutch hospitals, so even a limited outage can ripple through patient portals, support desks, and hospital-to-hospital coordination.

Right now, the clearest confirmed picture is this: Z-CERT says ChipSoft was hit on April 7, 2026, the company took key services offline as a precaution, and recovery is happening in stages with new login credentials for users. Z-CERT also says it has not seen critical care processes come to a halt so far, even though hospitals are dealing with operational disruption.

What happened and what went offline

Z-CERT’s April 9 update says ChipSoft was struck by ransomware on April 7. Since then, the Dutch healthcare cyber response team says it has stayed in constant contact with ChipSoft, healthcare institutions, and other partners to monitor the situation and support the response.

In the same update, Z-CERT says ChipSoft told customers that connections to Zorgportaal, HiX Mobile, and Zorgplatform were shut down as a precaution. The company then began restoring systems in phases and issuing new credentials to users.

This detail matters because those services sit close to the patient-facing side of hospital IT. When they go offline, the immediate impact often shows up in appointment access, portal logins, phone support, and staff workload rather than in direct interruption of frontline care. Z-CERT says that is what it is seeing so far.

Hospitals saw disruption, but not a full care shutdown

Z-CERT says the failure of parts of ChipSoft’s software has mainly created logistical challenges. It says healthcare institutions have added staff at service desks and phone lines, and have increased telephone coordination between organizations.

The agency also says no critical care processes are known to have stopped at this stage. That makes this a serious healthcare cyberattack, but not one that has yet been publicly tied to a broad shutdown of urgent medical services.

Reporting from The Record adds that ChipSoft disabled the affected connections while it restores systems in stages and reissues credentials. Separate reporting from The Register says hospitals use ChipSoft software in different ways, which helps explain why some saw more visible disruption than others.

Belgian hospitals now appear affected too

The attack no longer looks limited to the Netherlands. Belgian media and Anadolu Agency reported that several Belgian hospitals also saw patient portal disruptions tied to the ChipSoft incident. Those reports named hospitals in Antwerp, Limburg, and Roeselare among the affected organizations.

At this stage, the strongest official confirmation still comes from Z-CERT on the Dutch side. I did not find a matching Belgian national cyber advisory with the same level of detail in the sources I checked, so the Belgium impact should be treated as reported by media rather than fully detailed by an official sector-wide bulletin.

That distinction matters. The ransomware incident itself is confirmed by an official healthcare cybersecurity body, while the cross-border impact is supported by current reporting but remains less fully documented in official public notices.

ChipSoft ransomware attack at a glance

ItemConfirmed detail
VictimChipSoft, Dutch healthcare software vendor
Attack typeRansomware
Date reported to Z-CERTApril 7, 2026
Services taken offlineZorgportaal, HiX Mobile, Zorgplatform
Current effect described by Z-CERTLogistical disruption, extra service-desk load, more phone coordination
Critical care halted?Z-CERT says no critical care processes are known to be stopped so far
Recovery statusSystems being restored in phases, new credentials issued
Belgium impactReported by media, not yet matched by equally detailed public official notice in sources reviewed

Sources: Z-CERT update and follow-up reporting.

What healthcare organizations should do now

  • Follow ChipSoft’s containment and credential-reset guidance if you use its systems. Z-CERT says new access credentials are being issued as systems come back online.
  • Watch for unusual traffic and suspicious activity around connected hospital systems. Reporting on Z-CERT’s guidance says healthcare institutions were urged to disconnect VPN links and monitor traffic closely.
  • Prepare for operational strain even if core care systems stay up. Z-CERT says service desks and phone channels already face added pressure.
  • Treat this as a supply chain-style healthcare disruption, because one vendor issue can ripple across many hospitals at once. That point is an inference from ChipSoft’s role and the multi-hospital impact described in current reporting.

FAQ

Was ChipSoft really hit by ransomware?

Yes. Z-CERT explicitly says ChipSoft became the victim of a ransomware attack on April 7, 2026.

Which services did ChipSoft disable?

Z-CERT says connections to Zorgportaal, HiX Mobile, and Zorgplatform were disabled as a precaution.

Are Dutch hospitals still functioning?

Yes, based on the latest official update. Z-CERT says the incident has created logistical challenges, but it has not seen critical care processes come to a halt so far.

Did the incident spread to Belgium?

Several current reports say Belgian hospitals also saw outages or patient portal disruption linked to the ChipSoft incident. However, in the sources reviewed, the most detailed official confirmation remains the Dutch Z-CERT update.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages