Skip to main content
Logo GMV

Main navigation

  • Sectors
    • Icono espacio
      Space
    • Icono Aeronáutica
      Aeronautics
    • Icono Defensa y Seguridad
      Defense and Security
    • Icono Sistemas Inteligentes de Transporte
      Intelligent Transportation Systems
    • Icono Automoción
      Automotive
    • Icono Ciberseguridad
      Cybersecurity
    • Icono Servicios públicos Digitales
      Digital Public Services
    • Icono Sanidad
      Healthcare
    • Icono Industria
      Industry
    • Icono Financiero
      Financial
    • Icono Industria
      Services
    • All Sectors

    Highlight

    EMV Transit
    EMV Transit: technology that keeps on working
  • Talent
  • About GMV
    • Get to Know the Company
    • History
    • Management Team
    • Certifications
    • Corporate Social Responsibility
  • Communication
    • News
    • Events
    • Blog
    • Magazine GMV News
    • Press Room
    • Media library
    • Latest from GMV

Secondary navigation

  • Products A-Z
  • GMV Global
    • Global (en)
    • Spain and LATAM (es - ca - en)
    • Germany (de - en)
    • Portugal (pt - en)
    • Poland (pl - en)
    • All branches and all GMV sites
  • Home
  • Communication
  • Press Room
  • Press Releases
Back
New search
Date

Cyberthreats exploiting the COVID-19 epidemic at the expense of Spain’s health system

20/05/2020
  • Print
Share



Social engineering is the entry vector for between 60% and 70% of these threats

Phishing accounts for 57% of these attacks

Phishing is on the rise in Spain, especially attacks exploiting the COVID-19 pandemic. GMV’s cyberthreats intelligence team is on the constant lookout for any malicious activity and has passed on a warning to Spain’s health system. Juan Ramón Gutiérrez, Head of Threat Intelligence explains that “Between 60% and 70% of threats use social engineering as their entry vector, taking advantage of human weakness and curiosity, need of information and fear of COVID-19 or an altruistic urge to help or find out more”.

Spain’s health system is an attractive target for cybercriminals. Health-service providers, pharmaceutical and insurance companies and health centers all harbor between them a host of data on people’s health, plus information on the development of new drugs. If stolen, this data could impinge directly on patient care, the privacy of clinical test participants, industrial propriety or even the professional-association membership number of a medicament-prescribing doctor, argues Juan Ramón Gutiérrez.

He likewise points out that, according to the figures of Trend Micro for the current year, “Spain ranks ninth in the main countries hosting COVID-19-related malicious URLs, used for phishing campaigns or for the purposes of cybercrime. GMV Cyberthreat Intelligence team’s monitoring figures show, as can be seen in the graph below, that “phishing is the commonest form of attack, hosted in emails, SMSs or WhatsApp messages”. This responds to the main aim of “stealing the data of patients or healthcare staff”.

Active Attacks

GMV’s Cyberthreat Intelligence team, reacting to the current coronavirus environment (high social demand for information on the issue, overworked health service, emotional vulnerability …) has detected several active phishing campaigns. These include the following: a hospital scam with malicious emails falsely telling the receiver that a friend or relative has tested positive for COVID-19 and they are urged to print an attached file and take it to the nearest health center; a ministry of employment scam, pretending to be the State Social Security and Work Inspection Organization (Organismo Estatal de Inspección de Trabajo y Seguridad Social: ITSS), where the malicious email informs companies of a false work inspectorate investigation, claiming that the company is infringing the law and taking advantage of the current lockdown as bait to fool the receivers. Likewise, due to the sheer number of people now teleworking, various teleconference firm scams have also been detected, with the wrongdoers pretending to be a firm like WebEx to steal credentials.

Total Asepsis

After analyzing the map of the state of cybersecurity in Spain’s health system, GMV’s experts have drawn the following conclusions: 1) the obsolescence of their technological equipment leaves the door open to threats exploiting vulnerabilities stemming from lack of support; 2) the current design of healthcare networks does not fit in with the new ICT-intensive scenario, whereby critical activities (digital diagnosis- and monitoring-equipment, data and historical record storage systems, appointment management services, surgeon agendas, transplants, etc) are all open doors to cybercriminals; 3) The coexistence in certain public access network centers (Wi-Fi) of personal healthcare-personnel equipment sets up indirect nexuses through which cybercriminals can obtain data for their illicit ends; 4) hackers might be able to penetrate any healthcare network nodes with malware capable of totally or partially interrupting a center’s normal activity (e.g., balking access to medical records, altering the configuration or losing access to electro-medicine equipment or, simply, disrupting the appointments system of a hospital’s external consultation system).

Juan Ramón Gutiérrez goes on: “if the main aim of all healthcare personnel is patient-protecting asepsis, taking in both persons and healthcare material, then in any globalized and totally digitized society, there would also be an obvious concomitant need for “asepsis” too in the healthcare information systems”. This is especially the case, he argues, “in the current moments of healthcare crisis that increase the vulnerability to attacks of various types”. Various horror scenarios present themselves. What would happen if a hacking attack managed to alter a surgeon’s equipment in mid-operation? Or if cancer-treatment receiving patents’ medical records were lost or if ICU nursing databases dealing with patients’ daily medication needs were rendered inaccessible by an attack?

To head off such situations, GMV’s Cyberthreat Intelligence team insists, among other measures, on the importance of the company’s top-down “concentration on prevention rather than merely detection: Reinforcing teleworking cyber-protection measures, such as secure VPNs or web filtering; ensuring proper updating and patch-application management; monitoring own and third-party vulnerabilities and implementing multifactor authentication by means of SMS, Google Authenticator or any other method”.

On an individual level it is necessary “to show extreme caution when receiving emails, SMSs or WhatsApps from unknown senders. In particular, never click on links or phrases like “click here” even if the message in question seems completely normal. Install applications in the computer or handhelds only when they are official or come from a recognized source, such as Google Play or Apple App Store and keep the computer and handhelds updated”.

To deal with any cyberthreats GMV runs a Computer Emergency Response Team (CERT) to offer its clients monitoring services of infrastructure, auditing, code analysis for security validation in the application development lifecycle, cyber-intelligence services to identify threats before they can be used against targets, forensic services for post-mortem attack analysis and compliance- and consultancy-services.

 

  • Print
Share

Contact

Alameda dos Oceanos, 115
1990-392 Lisbon, Portugal

Tel. +351 308801495
Fax. +351 213866493

Contact menu

  • Contact
  • GMV around the world

Blog

  • Blog

Sectors

Sectors menu

  • Space
  • Aeronautics
  • Defense and Security
  • Intelligent Transportation Systems
  • Automotive
  • Cybersecurity
  • Digital Public Services
  • Healthcare
  • Industry
  • Financial
  • Services
  • Talent
  • About GMV
  • Shortcut to
    • Press Room
    • News
    • Events
    • Blog
    • Products A-Z
© 2025, GMV Innovating Solutions S.L.

Footer menu

  • Contact
  • Legal Notice
  • Privacy Policy
  • Cookie Policy

Footer Info

  • Commitment to the Environment
  • Financial Information