On March 14, 2026, the municipality of Epe (Gemeente Epe) in the Netherlands publicly disclosed a significant data breach impacting its information systems. According to an official update from the municipality, approximately 800 gigabytes of data—comprising around 600,000 files—were stolen by professional cybercriminals. The attack was initiated through a sophisticated phishing technique known as ClickFix phishing, which enabled unauthorized access to internal work drives containing sensitive citizen information.
The breach affected a broad range of files stored on internal network drives, including documents with personal data such as names and addresses. Mayor Tom Horn expressed regret over the incident, emphasizing that both the municipality and its residents had become victims of cybercrime. He confirmed that the municipality promptly reported the breach to the Autoriteit Persoonsgegevens (Dutch Data Protection Authority) and is conducting an ongoing investigation to determine the full scope and specific nature of the compromised data. Due to the volume and variety of files involved, officials have not yet identified all affected individuals but have committed to informing them directly via postal mail once more precise information becomes available.
The impact of this breach extends beyond data loss; residents are at increased risk of identity misuse or fraud, including potential phishing or other scams leveraging the leaked personal information. The municipality has advised citizens to remain vigilant and referred them to the Autoriteit Persoonsgegevens website for guidance on protecting themselves against misuse of their data.
From an operational standpoint, the municipality acted swiftly upon discovery of the intrusion on March 12, 2026, collaborating with cybersecurity experts to secure and restore systems. By March 13, normal municipal services—including digital platforms such as MijnEpe and physical offices—were fully operational. The municipality also reassured the public that upcoming municipal elections scheduled for March 18 could proceed safely without disruption from this incident.
It is important to note that this incident appears to be a data theft and leak rather than a ransomware attack, as there has been no public indication of ransom demands or system encryption. The threat actors behind the attack remain unidentified in official communications, and no specific ransomware group has claimed responsibility. The initial access vector was the ClickFix phishing method, a social engineering tactic designed to deceive employees into providing credentials or executing malicious actions that compromise internal networks.
For organizations seeking to protect themselves against similar attacks, several recommendations emerge from this incident:
- Employee Awareness and Training: Since phishing was the initial attack vector, regular and comprehensive cybersecurity training is essential to help employees recognize and avoid phishing attempts, including newer variants like ClickFix phishing.
- Network Segmentation and Access Controls: Limiting access to sensitive data on internal drives based on role and necessity can reduce the potential impact of compromised credentials.
- Incident Response Preparedness: Establishing clear protocols to quickly detect, isolate, and remediate breaches minimizes downtime and data exposure.
- Regular Security Assessments: Conducting penetration tests and vulnerability assessments helps identify and address weaknesses before attackers can exploit them.
- Collaboration with Authorities: Promptly reporting breaches to relevant data protection authorities ensures compliance with legal requirements and supports coordinated responses.
The Gemeente Epe breach underscores the persistent threat posed by targeted phishing campaigns and the critical importance of robust cybersecurity measures within public sector organizations. As investigations continue, affected residents and organizations alike should remain alert to potential follow-up risks arising from the leaked personal data.
Sources: Gemeente Epe Official Update, Ransomware.live summary, Perplexity Research analysis
Source: Update datalek gemeente Epe | Data from Ransomware.live | Generated with AI assistance

Leave a Reply