SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers

Credit: The original article is published here.

  • Zoom, Microsoft Office and ChatGPT are among the most impersonated
  • Attacks can vary, from phishing campaigns to malware
  • Setting clear software adoption procedures is crucial

Cyberattacks mimicking ChatGPT rose 115% in early 2025, according to new research from Russian cybersecurity Kaspersky, which is warning workers of fake productivity apps.

According to the analysis, 8,500 small and medium-sized businesses were targeted using malicious files disguised as productivity apps and AI tools.

Among the most commonly fakes apps were Zoom, Microsoft Office, ChatGPT and DeepSeek, with Kaspersky tracking more than 4,000 unique malicious files using this type of attack.

Zoom, Office and ChatGPT spoofed in latest cyberattacks

The cybersecurity company explained that cybercriminals exploit popular and hyped tools to lute victims during a sense of excitement and urgency. Phishing and spam campaigns are used to present fake offers, impersonating brands to steal data or distribute malware.

“The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the internet,” security expert Vasily Kolesnikov said.

Being that Kaspersky’s warning discusses productivity apps as a whole, and not one specific campaign, there isn’t one type of warning being issued. Instead, workers are being advised to be aware of downloaders, trojans and adware, with phishing campaigns targeting banking, delivery and account credentials.

Kaspersky’s tracking revealed a 13% increase in Zoom-related fake files in 2025, with Google Drive rising 12% and Teams rising a staggering 100%. Other Microsoft apps, including Outlook and PowerPoint (16% each), Excel (12%), Word (9%) and Teams (5%) accounting for a large proportion of the attacks observed by Kaspersky.

The company is advising businesses to set clear procedures for software adoption and to define access rules for emails, cloud files and other documents. Regular backups can also provide a reliable failsafe in the event of an attack.

“Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software,” Kolesnikov added.

You might also like