Dutch medical software vendor Chipsoft has confirmed that patient data, including sensitive treatment information, was exfiltrated during a ransomware attack on its cloud-hosted HiX 365 platform last week. The incident has triggered 66 separate data breach notifications to the Dutch data protection authority (Autoriteit Persoonsgegevens) and impacts family doctors, rehabilitation clinics, and the Rotterdam Eye Hospital. CEO Hans Mulder publicly acknowledged that the theft cannot be undone, reversing the company's earlier assurance that personal data was "probably" safe.
What Happened
Chipsoft initially downplayed the impact of the intrusion, telling clients in the immediate aftermath that personal data was likely unaffected. That assessment has now been formally retracted. According to reporting from Volkskrant, the threat actors specifically targeted medical treatment records housed within the HiX 365 cloud-hosted environment. Hospitals running Chipsoft technology on their own on-premises infrastructure were spared, isolating the blast radius to the multi-tenant cloud customer base. The company has not disclosed whether ransom negotiations are underway, and the stolen dataset has not yet surfaced on dark web leak sites, suggesting either an active negotiation window or a delayed extortion timeline.
What Was Taken
The stolen data consists of patient medical records, with attackers showing deliberate interest in treatment information rather than purely administrative or financial data. Affected populations include patients of dozens of family doctor practices (with the largest cluster in North Limburg per the LHV family doctors' association), rehabilitation clinic patients, and patients of the Rotterdam Eye Hospital. The 66 breach notifications filed with the Dutch data protection authority indicate the dataset spans a broad downstream customer base. Exact record counts have not been published, but the spread of notifications signals a six-figure or greater patient impact is plausible.
Why It Matters
This incident underscores the cascading risk profile of healthcare SaaS providers: a single compromise at the platform layer translates directly into dozens of independent breach obligations downstream. Medical treatment data is among the highest-value categories for extortion-driven actors, both because of regulatory exposure under GDPR and because patients have limited recourse to "rotate" the compromised information. The Dutch Patients' Federation has publicly criticized the slow flow of information to affected individuals, a reputational dynamic that often pressures victims toward ransom payment. The pattern of an initial "probably safe" statement followed by confirmed exfiltration is also a recurring failure mode worth flagging for incident response leaders.
The Attack Technique
Specific initial access vectors, ransomware family attribution, and dwell time have not been disclosed by Chipsoft or Dutch authorities at the time of writing. The compromise was confined to the HiX 365 cloud-hosted tenancy, while customer-managed on-premises deployments remained untouched, indicating the breach occurred within Chipsoft's own cloud infrastructure rather than a flaw in the HiX product distributed to self-hosting customers. The targeted exfiltration of treatment records ahead of (or alongside) encryption is consistent with modern double-extortion ransomware tradecraft, where data theft is leveraged as the primary extortion lever.
What Organizations Should Do
- Audit healthcare SaaS dependencies. Inventory every clinical or administrative SaaS provider holding PHI and confirm contractual breach-notification SLAs and data segregation guarantees.
- Pressure-test multi-tenant isolation. For cloud-hosted EHR and practice management platforms, request third-party assurance on tenant separation and demand evidence of recent penetration tests.
- Prepare downstream breach playbooks. If you are a customer of a SaaS provider, pre-stage patient and regulator notification templates so you can act within GDPR's 72-hour window without waiting on the vendor.
- Scrutinize early "probably safe" vendor statements. Treat initial vendor communications as preliminary; require written confirmation of exfiltration assessment based on log review, not assumption.
- Enforce egress monitoring on PHI stores. Anomalous outbound transfers from medical record databases should trigger immediate isolation, even before encryption activity is observed.
- Rehearse extortion decision-making. Ensure executive leadership, legal, and DPO functions have a pre-agreed framework for ransom negotiation posture before an incident, not during one.
Sources: Patient medical data stolen in Chipsoft ransomware attack