Cyber-stricken Belgian hospitals refuse ambulances, transfer critical patients
- Reference: 1768395156
- News link: https://www.theregister.co.uk/2026/01/14/belgium_hospital_cyberattack/
- Source link:
AZ Monica, which operates hospitals in Antwerp and Deurne, confirmed the issues on Tuesday.
It said seven patients receiving critical care had to be transferred to different nearby hospitals with help from the [1]Red Cross so they could continue receiving the necessary treatement. All other patients continue to be treated at the affected sites.
[2]
Its emergency department was operating at reduced capacity as of Tuesday, the day of the organization's last official update. According to [3]De Tijd , 70 surgeries were cancelled on the day.
[4]
[5]
The local news outlet also reported that disruption was expected to continue into Wednesday, January 14, although nothing official has been publicly communicated by the hospital network.
The Register contacted AZ Monica for additional information.
[6]
In its Tuesday update, the organization stated that the Mobile Urgency Group (MUG) and Paraprofessional Intervention Team (PIT) services are temporarily unavailable.
[7]Ministry of Justice splurged £50M on security – still missed Legal Aid Agency cyberattack
[8]Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath
[9]Students bag extended Christmas break after cyber hit on school IT
[10]New Zealand orders review into ManageMyHealth cyberattack
MUGs are comprised of clinicians and nurses who travel to the scene of an incident to provide medical care, while PITs provide emergency care en route to a hospital.
"AZ Monica's focus remains on the safety and continuity of care for our patients," it [11]said .
"AZ Monica continues to closely monitor the situation and will communicate further updates as soon as more clarity becomes available."
In a separate advice sheet, the [12]healthcare organization told patients to expect longer-than-usual registration times when visiting the affected hospitals, although the visitation of patients already admitted is unaffected.
[13]
Those seeking urgent medical attention were instructed to first consult with their general practitioner, out-of-hours clinic, or other emergency service where available, since AZ Monica's emergency departments are operating at low capacity. No patients are currently being transported there by ambulance. ®
Get our [14]Tech Resources
[1] https://www.theregister.com/2023/10/04/red_cross_hacktivist_rules/
[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[3] https://www.tijd.be/politiek-economie/belgie/algemeen/az-monica-in-antwerpen-na-cyberaanval-ook-woensdag-geen-operaties/10643930.html
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[7] https://www.theregister.com/2026/01/07/legal_aid_agency_attack/
[8] https://www.theregister.com/2026/01/07/jlr_wholesale_volumes/
[9] https://www.theregister.com/2026/01/06/nuneaton_school_cyberattack/
[10] https://www.theregister.com/2026/01/05/nz_managemyhealth_breach_review/
[11] https://azmonica.be/updates/persstatement-az-monica-update-cyberincident/
[12] https://www.theregister.com/2024/03/26/aixcc_healthcare/
[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[14] https://whitepapers.theregister.com/
The whole is less secure than the sum of its parts.
Modern systems are a volatile mix of browsers, mobile apps, microservices, serverless functions, CI/CD pipelines, third-party APIs, firmware, and complex supply chains. While each piece might be 'reasonably secure' in isolation, their interactions create emergent properties and unexpected trust paths. These paths are unpredictable and far too complex to fully model, let alone secure.
To 'secure' such a system, you must successfully model every possible interaction between the following components. For this list of 35 items alone, that means managing 595 undirected pairs, 1,190 directed one-way interactions, or a staggering 34,359,738,367 distinct combinations."
-------
Active Directory / Enterprise Directory Services
API Gateways (for internal and external services)
Application Load Balancers
CI/CD Pipelines (build servers, artifact repositories)
Cloud Storage (object stores, backups, archives)
Data Warehouses / Analytics Platforms
Database Servers (SQL, NoSQL)
Developer Workstations and Laptops
DNS Infrastructure (internal and external)
Email Systems (on-prem or cloud)
Endpoint Security Agents (EDR/XDR)
Enterprise Resource Planning (ERP) Systems
Firewalls (network and application)
Identity and Access Management (IAM) Platforms
Intrusion Detection/Prevention Systems (IDS/IPS)
Load Balancers (L4/L7, hardware or software)
Log Aggregation / SIEM Platforms
Mobile Device Management (MDM) Systems
Network Switches and Routers
Operational Technology (OT) Controllers and PLCs
Physical Access Control Systems (badges, controllers)
Proxy Servers / Secure Web Gateways
Remote Access VPN / Zero Trust Access Proxies
SCADA Systems (where used in production plants)
Secure Configuration Management / Secrets Managers
Security Orchestration and Automation (SOAR) Tools
Server Operating Systems (Windows, Linux, etc.)
Service Mesh / Internal Service Discovery
Single Sign-On (SSO) Portals
Source Code Repositories (Git servers, hosted Git)
Storage Area Networks / Network Attached Storage
Virtualization Platforms (hypervisors, VMs)
Web Application Servers / Microservices Platforms
Re: The whole is less secure than the sum of its parts.
Looks like AI output, but it's probably close enough.
Re: The whole is less secure than the sum of its parts.
> Looks like AI output, but it's probably close enough.
The ideas are mine, I got ClippyAI to clean-up the text.
'reasonably secure'? Nope.
Which part do you regard as 'reasonably secure'? Lets have a look.
Firewalls and other network gear from Cisco, Citrix, and the rest of the breed: NO.
Everything from Microsoft: NO.
Database from Oracle or the like: NO.
Cloud computing at Amazon, Google, Microsoft: NO.
TBC.
Let alone compliance with best practice (least privilege, brute force protection, MFA, you name it).
Too dependent on computers
The modern world in a nutshell.