SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers

SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers

Skip to main content

Tech Radar Pro

Tech Radar Gaming

Tech Radar Pro

TechRadar the business technology experts

Search TechRadar

View Profile

België (Nederlands)

Deutschland

North America

US (English)

Australasia

New Zealand

Expert Insights

Website builders

Web hosting

Best website builder
Best web hosting
Best office chairs
Best antivirus
Expert Insights

Recommended reading

Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks

Zoom remote control feature abused for crypto stealing cyberattacks

Popular AI program spoofed in phishing campaign spawning fake Microsoft Sharepoint logins

Google Apps Script abused to launch dangerous phishing attacks

Cybercriminals are using SEO to get popular fake AI tools loaded with malware to rank high on Google

Fake IT support voice calls lead to cyber extortion and stolen company data

Watch out – that DeepSeek installer could be damaging malware

SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers

Craig Hale

27 June 2025

Watch out if you’re downloading these apps

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

(Image credit: Shutterstock)

Zoom, Microsoft Office and ChatGPT are among the most impersonated
Attacks can vary, from phishing campaigns to malware
Setting clear software adoption procedures is crucial

Cyberattacks mimicking ChatGPT rose 115% in early 2025, according to new research from Russian cybersecurity Kaspersky, which is warning workers of fake productivity apps.

According to the analysis, 8,500 small and medium-sized businesses were targeted using malicious files disguised as productivity apps and AI tools.
Among the most commonly fakes apps were Zoom, Microsoft Office, ChatGPT and DeepSeek, with Kaspersky tracking more than 4,000 unique malicious files using this type of attack.

You may like

Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks

Zoom remote control feature abused for crypto stealing cyberattacks

Popular AI program spoofed in phishing campaign spawning fake Microsoft Sharepoint logins

Zoom, Office and ChatGPT spoofed in latest cyberattacks
The cybersecurity company explained that cybercriminals exploit popular and hyped tools to lute victims during a sense of excitement and urgency. Phishing and spam campaigns are used to present fake offers, impersonating brands to steal data or distribute malware.

“The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the internet,” security expert Vasily Kolesnikov said.
Being that Kaspersky’s warning discusses productivity apps as a whole, and not one specific campaign, there isn’t one type of warning being issued. Instead, workers are being advised to be aware of downloaders, trojans and adware, with phishing campaigns targeting banking, delivery and account credentials.
Kaspersky’s tracking revealed a 13% increase in Zoom-related fake files in 2025, with Google Drive rising 12% and Teams rising a staggering 100%. Other Microsoft apps, including Outlook and PowerPoint (16% each), Excel (12%), Word (9%) and Teams (5%) accounting for a large proportion of the attacks observed by Kaspersky.

Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
The company is advising businesses to set clear procedures for software adoption and to define access rules for emails, cloud files and other documents. Regular backups can also provide a reliable failsafe in the event of an attack.
“Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software,” Kolesnikov added.
You might also like

Hackers are using fake Zoom apps to steal your data and your cryptowallet – here’s how to stay safe
Downloaded something dodgy? Here’s the best malware removal
We’ve listed the best endpoint protection software

With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks

Zoom remote control feature abused for crypto stealing cyberattacks

Popular AI program spoofed in phishing campaign spawning fake Microsoft Sharepoint logins

Google Apps Script abused to launch dangerous phishing attacks

Cybercriminals are using SEO to get popular fake AI tools loaded with malware to rank high on Google

Fake IT support voice calls lead to cyber extortion and stolen company data

Latest in Security

British man behind ‘IntelBroker’ hacker group charged with stealing millions

Millions of Brother printers threatened by multiple serious vulnerabilities – enterprise and home printers at risk

New bill could see DeepSeek and Chinese AI models banned in government departments

Asking ChatGPT to help with your security qualms could be putting your data at serious risk

Ransomware disruptions contributed to a patient death, NHS finds

Nearly half of companies say they pay up ransomware demands – but here’s why that could be a bad idea

Latest in News

The Nothing Phone 3 design just leaked in full – and it’s like Lego designed a smartphone

The #1 most-streamed show is a Netflix dark comedy that’s ideal summer escapism – here’s why you have to catch up with this new smash hit

British man behind ‘IntelBroker’ hacker group charged with stealing millions

The second free Monster Hunter Wilds title update is coming next week, bringing back a surprise monster from the 3DS era

Finally! These AI smart glasses are giving me a feature I’ve been desperate for the Meta Ray-Bans to get since launch

Full Galaxy Buds Core specs revealed, and Samsung’s finally fixed our main issue with the Buds FE

LATEST ARTICLES

The Nothing Phone 3 design just leaked in full – and it’s like Lego designed a smartphone

A one-man army, a much-hyped Fate collab, and the revival of some beloved older characters – all the highlights coming in Honkai: Star Rail Version 3.4

ChatGPT can solve an issue that has plagued 30 years of my life, and now I might finally start eating my 5 a day

The #1 most-streamed show is a Netflix dark comedy that’s ideal summer escapism – here’s why you have to catch up with this new smash hit

Death Stranding 2 tips and tricks: what I recommend you do to avoid failure after my nearly 50 hours in the game

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Contact Future’s experts

Terms and conditions

Privacy policy

Cookies policy

Advertise with us

Web notifications

Accessibility Statement

Future US, Inc. Full 7th Floor, 130 West 42nd Street,

Please login or signup to comment

Please wait…

Read More…