News: 1768395156

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Cyber-stricken Belgian hospitals refuse ambulances, transfer critical patients

(2026/01/14)


Two hospitals in Belgium have cancelled surgeries and transferred critical patients to other facilities after shutting down servers following a cyberattack.

AZ Monica, which operates hospitals in Antwerp and Deurne, confirmed the issues on Tuesday.

It said seven patients receiving critical care had to be transferred to different nearby hospitals with help from the [1]Red Cross so they could continue receiving the necessary treatement. All other patients continue to be treated at the affected sites.

[2]

Its emergency department was operating at reduced capacity as of Tuesday, the day of the organization's last official update. According to [3]De Tijd , 70 surgeries were cancelled on the day.

[4]

[5]

The local news outlet also reported that disruption was expected to continue into Wednesday, January 14, although nothing official has been publicly communicated by the hospital network.

The Register contacted AZ Monica for additional information.

[6]

In its Tuesday update, the organization stated that the Mobile Urgency Group (MUG) and Paraprofessional Intervention Team (PIT) services are temporarily unavailable.

[7]Ministry of Justice splurged £50M on security – still missed Legal Aid Agency cyberattack

[8]Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath

[9]Students bag extended Christmas break after cyber hit on school IT

[10]New Zealand orders review into ManageMyHealth cyberattack

MUGs are comprised of clinicians and nurses who travel to the scene of an incident to provide medical care, while PITs provide emergency care en route to a hospital.

"AZ Monica's focus remains on the safety and continuity of care for our patients," it [11]said .

"AZ Monica continues to closely monitor the situation and will communicate further updates as soon as more clarity becomes available."

In a separate advice sheet, the [12]healthcare organization told patients to expect longer-than-usual registration times when visiting the affected hospitals, although the visitation of patients already admitted is unaffected.

[13]

Those seeking urgent medical attention were instructed to first consult with their general practitioner, out-of-hours clinic, or other emergency service where available, since AZ Monica's emergency departments are operating at low capacity. No patients are currently being transported there by ambulance. ®

Get our [14]Tech Resources



[1] https://www.theregister.com/2023/10/04/red_cross_hacktivist_rules/

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[3] https://www.tijd.be/politiek-economie/belgie/algemeen/az-monica-in-antwerpen-na-cyberaanval-ook-woensdag-geen-operaties/10643930.html

[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[7] https://www.theregister.com/2026/01/07/legal_aid_agency_attack/

[8] https://www.theregister.com/2026/01/07/jlr_wholesale_volumes/

[9] https://www.theregister.com/2026/01/06/nuneaton_school_cyberattack/

[10] https://www.theregister.com/2026/01/05/nz_managemyhealth_breach_review/

[11] https://azmonica.be/updates/persstatement-az-monica-update-cyberincident/

[12] https://www.theregister.com/2024/03/26/aixcc_healthcare/

[13] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aWlxnn_y7R55PK-AJ0adHwAAAMM&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[14] https://whitepapers.theregister.com/



Too dependent on computers

VoiceOfTruth

The modern world in a nutshell.

The whole is less secure than the sum of its parts.

Taliesinawen

Modern systems are a volatile mix of browsers, mobile apps, microservices, serverless functions, CI/CD pipelines, third-party APIs, firmware, and complex supply chains. While each piece might be 'reasonably secure' in isolation, their interactions create emergent properties and unexpected trust paths. These paths are unpredictable and far too complex to fully model, let alone secure.

To 'secure' such a system, you must successfully model every possible interaction between the following components. For this list of 35 items alone, that means managing 595 undirected pairs, 1,190 directed one-way interactions, or a staggering 34,359,738,367 distinct combinations."

-------

Active Directory / Enterprise Directory Services

API Gateways (for internal and external services)

Application Load Balancers

CI/CD Pipelines (build servers, artifact repositories)

Cloud Storage (object stores, backups, archives)

Data Warehouses / Analytics Platforms

Database Servers (SQL, NoSQL)

Developer Workstations and Laptops

DNS Infrastructure (internal and external)

Email Systems (on-prem or cloud)

Endpoint Security Agents (EDR/XDR)

Enterprise Resource Planning (ERP) Systems

Firewalls (network and application)

Identity and Access Management (IAM) Platforms

Intrusion Detection/Prevention Systems (IDS/IPS)

Load Balancers (L4/L7, hardware or software)

Log Aggregation / SIEM Platforms

Mobile Device Management (MDM) Systems

Network Switches and Routers

Operational Technology (OT) Controllers and PLCs

Physical Access Control Systems (badges, controllers)

Proxy Servers / Secure Web Gateways

Remote Access VPN / Zero Trust Access Proxies

SCADA Systems (where used in production plants)

Secure Configuration Management / Secrets Managers

Security Orchestration and Automation (SOAR) Tools

Server Operating Systems (Windows, Linux, etc.)

Service Mesh / Internal Service Discovery

Single Sign-On (SSO) Portals

Source Code Repositories (Git servers, hosted Git)

Storage Area Networks / Network Attached Storage

Virtualization Platforms (hypervisors, VMs)

Web Application Servers / Microservices Platforms

Re: The whole is less secure than the sum of its parts.

Throatwarbler Mangrove

Looks like AI output, but it's probably close enough.

Re: The whole is less secure than the sum of its parts.

Taliesinawen

> Looks like AI output, but it's probably close enough.

The ideas are mine, I got ClippyAI to clean-up the text.

'reasonably secure'? Nope.

pc-fluesterer.info

Which part do you regard as 'reasonably secure'? Lets have a look.

Firewalls and other network gear from Cisco, Citrix, and the rest of the breed: NO.

Everything from Microsoft: NO.

Database from Oracle or the like: NO.

Cloud computing at Amazon, Google, Microsoft: NO.

TBC.

Let alone compliance with best practice (least privilege, brute force protection, MFA, you name it).

A witty saying proves nothing.
-- Voltaire