AZ Monica hospital in Antwerp, Belgium, was forced to shut down all servers, cancel over 70 medical procedures, and transfer critical patients to other facilities following a cyberattack detected on January 13, 2026. The incident prompted the Flemish government to pledge €10 million for hospital cybersecurity improvements.

Incident overview

AttributeDetails
VictimAZ Monica hospital
LocationAntwerp and Deurne, Belgium
Attack typeRansomware (confirmed)
Detection time6:30 AM, January 13, 2026
Server shutdown6:32 AM
Operations cancelled70+ on day one
Critical patient transfers7
Appointments cancelled8,000+
Recovery statusReopened at half capacity

Timeline

Time/DateEvent
6:30 AM, Jan 13Staff notice serious IT failure
6:32 AM, Jan 13All servers disconnected
Morning, Jan 1370 planned operations cancelled
Morning, Jan 137 critical patients transferred with Red Cross support
Day 2Operations still cancelled; chemotherapy patients sent to Amsterdam
Jan 18Prime Minister De Croo convenes crisis meeting
Following weeksHospital reopens at half capacity
FebruaryWage recalculations expected

Patient care impact

Immediate disruptions

ImpactDetails
Operations cancelled70+ on day one; none on day two
Patients sent home~70 patients
Critical transfers7 patients moved to other hospitals
Chemotherapy150 oncology patients transferred to Gasthuiszusters Antwerpen
Urgent chemo casesTreated at University Hospital of Amsterdam
MUG/PIT servicesMobile emergency teams temporarily unavailable
Appointments cancelled8,000+ with rescheduling letters mailed

Affected services

ServiceStatus
Radiological examinationsPostponed
Medical imagingUnavailable
Chemotherapy treatmentsTransferred to other facilities
Scheduled surgeriesCancelled
Non-urgent appointmentsPostponed
Laboratory systemsOffline
Electronic medical recordsInaccessible

No deaths were linked to the disruptions, according to hospital logs.

Nature of the attack

Belgian authorities confirmed the attack used ransomware:

AttributeDetails
Attack typeRansomware
Ransom demandUnconfirmed reports; not officially acknowledged
Data exfiltrationUnder investigation
AttributionUnknown

The hospital operates two campuses in Antwerp and Deurne, both affected by the attack.

Medical impact statement

Chief physician Jean-Paul Sion described the operational impact:

“A wide range of examinations and treatments had been postponed due to the incident, including radiological exams, medical imaging and chemotherapy treatments.”

The shutdown of electronic patient files forced staff to revert to paper-based processes for essential care.

Staff and financial impact

The cyberattack created significant payroll challenges:

“Since the cyberattack, shifts, overtime, weekend shifts, and exchanges can’t be registered correctly. The reality is that the hospital is currently unable to calculate wages correctly.” — Tijl Denis, BBTK/ABVV trade union

Payroll solution

MeasureDetails
Interim payment90% of December wages
BasisDecember used as benchmark
RecalculationExpected February when systems restored
Affected staffAll hospital employees

Response

Hospital actions

ActionPurpose
Immediate server shutdownContain ransomware spread
Police notificationCriminal investigation
Prosecutor notificationLegal proceedings
Paper-based processesMaintain critical functions
Peer hospital coordinationPatient care continuity
Red Cross supportCritical patient transfers

Government response

ActionAuthority
Crisis meetingPrime Minister Alexander De Croo (Jan 18)
Task force establishedNational coordination
€10 million pledgeFlemish Minister for Health Hilde Crevits
Mandatory reporting proposal24-hour incident notification requirement

Belgian healthcare threat landscape

Belgium recorded 45 healthcare cyber incidents in 2025—a 30% increase from 2024, according to the Centre for Cybersecurity Belgium (CCB).

Attack frequency

MetricValue
Healthcare attacks per week (Q2 2025)2,620 attacks
Sector ranking in BelgiumHardest hit sector
Year-over-year increase30%

Healthcare organizations experienced an average of 2,620 attacks per week in the second quarter of 2025, making the sector the hardest hit in Belgium.

Recent Belgian hospital attacks

HospitalDateImpact
UZ Gent2025Operations disrupted
CHU Saint-Pierre2025Systems offline
AZ MonicaJanuary 2026Full shutdown, patient transfers

European healthcare targeting

CountryRecent incidentsPattern
Belgium45 in 2025 (+30%)Increasing
GermanyMultiple hospital attacksSignificant
FranceHealthcare ransomware surgeGrowing
UKNHS repeated targetingPersistent

Why hospitals are targets

FactorAttacker benefit
Pressure to restore operationsPatient care can’t wait; creates ransom payment pressure
Valuable dataMedical records command premium prices on dark web
Complex IT environmentsLegacy systems, medical devices, interconnected departments
UnderstaffingHealthcare IT often resource-constrained
24/7 operationsNo maintenance windows for security updates
Life-safety systemsMaximum leverage for extortion
Insurance coverageOften have cyber insurance with ransomware coverage

Healthcare data value

Data typeDark web value
Medical records$250-$1,000+ per record
Insurance informationHigh fraud potential
Prescription dataDrug diversion
Identity documentsIdentity theft

Regulatory requirements

European healthcare providers face strict requirements:

RegulationRequirement
GDPRBreach notification within 72 hours
NIS2 DirectiveCritical infrastructure security obligations
Belgian lawHealth-specific regulations
New proposal24-hour mandatory incident reporting

Recovery challenges

Healthcare incident response requires balancing competing priorities:

TensionChallenge
Patient safety vs. data protectionRestore care functions vs. secure investigation
Maintaining critical care vs. preventing exfiltrationKeep systems running vs. contain threat
Communication with patients vs. technical recoveryTransparency vs. operational focus
Regulatory compliance vs. operational restorationNotification requirements vs. recovery speed

AZ Monica reopened at half capacity in the weeks following the attack, indicating prolonged recovery timelines.

Recommendations for healthcare organizations

Preparation

ControlPurpose
Offline backup systemsEnable critical functions during IT outage
Tested incident response plansKnow what to do before an attack
Network segmentationContain ransomware spread
EDR on all endpointsDetect ransomware before encryption
Staff security trainingReduce phishing success
Medical device isolationProtect life-safety systems

Resilience measures

MeasureBenefit
Peer institution relationshipsMutual aid for patient transfers
Critical system identificationKnow what must stay running
Paper-based fallback plansOperations during extended outages
Pre-negotiated IR retainersRapid expert response
Regular tabletop exercisesPractice response procedures

Detection and response

PriorityAction
CriticalDeploy EDR with ransomware-specific detection
HighImplement network monitoring for lateral movement
HighMaintain offline backups tested monthly
MediumSegment clinical from administrative systems
OngoingTrain staff on phishing identification

Context

The AZ Monica attack illustrates healthcare’s vulnerability to ransomware. The sector combines high-value data, operational pressure to pay ransoms, and often inadequate security investment.

Belgium’s €10 million pledge and proposed 24-hour reporting requirement indicate government recognition that healthcare cybersecurity requires systemic investment, not just individual hospital efforts.

For healthcare organizations elsewhere: the threat is real, the attacks are increasing, and winter timing (when bed capacity is already strained) maximizes attacker leverage. The 8,000+ cancelled appointments and 150 transferred chemotherapy patients demonstrate the human cost of healthcare cyber incidents.

Incident significance

The attack’s severity warranted its own Wikipedia entry (“2026 Belgian hospital cyberattack”), indicating the incident’s significance in the broader context of healthcare cybersecurity.

Key lessons

LessonApplication
Rapid containment2-minute response limited spread
Peer relationshipsPre-established transfer agreements enabled patient care
Paper fallbacksManual processes maintained critical functions
Government engagementHigh-level attention accelerated support
Financial flexibility90% wage interim payment maintained staff morale

The incident demonstrates both the vulnerability of healthcare IT and the importance of prepared response procedures.