Skip to main content
Tech Radar Pro
Tech Radar Gaming
Tech Radar Pro
TechRadar the business technology experts
Search TechRadar
View Profile
België (Nederlands)
Deutschland
North America
US (English)
Australasia
New Zealand
Expert Insights
Website builders
Web hosting
Best website builder
Best web hosting
Best office chairs
Best antivirus
Expert Insights
Recommended reading
Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks
Zoom remote control feature abused for crypto stealing cyberattacks
Popular AI program spoofed in phishing campaign spawning fake Microsoft Sharepoint logins
Google Apps Script abused to launch dangerous phishing attacks
Cybercriminals are using SEO to get popular fake AI tools loaded with malware to rank high on Google
Fake IT support voice calls lead to cyber extortion and stolen company data
Watch out – that DeepSeek installer could be damaging malware
SMBs are being hit by malicious productivity tools – Zoom and ChatGPT spoofed by hackers
Craig Hale
27 June 2025
Watch out if you’re downloading these apps
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
(Image credit: Shutterstock)
Zoom, Microsoft Office and ChatGPT are among the most impersonated
Attacks can vary, from phishing campaigns to malware
Setting clear software adoption procedures is crucial
Cyberattacks mimicking ChatGPT rose 115% in early 2025, according to new research from Russian cybersecurity Kaspersky, which is warning workers of fake productivity apps.
According to the analysis, 8,500 small and medium-sized businesses were targeted using malicious files disguised as productivity apps and AI tools.
Among the most commonly fakes apps were Zoom, Microsoft Office, ChatGPT and DeepSeek, with Kaspersky tracking more than 4,000 unique malicious files using this type of attack.
You may like
Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks
Zoom remote control feature abused for crypto stealing cyberattacks
Popular AI program spoofed in phishing campaign spawning fake Microsoft Sharepoint logins
Zoom, Office and ChatGPT spoofed in latest cyberattacks
The cybersecurity company explained that cybercriminals exploit popular and hyped tools to lute victims during a sense of excitement and urgency. Phishing and spam campaigns are used to present fake offers, impersonating brands to steal data or distribute malware.
“The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the internet,” security expert Vasily Kolesnikov said.
Being that Kaspersky’s warning discusses productivity apps as a whole, and not one specific campaign, there isn’t one type of warning being issued. Instead, workers are being advised to be aware of downloaders, trojans and adware, with phishing campaigns targeting banking, delivery and account credentials.
Kaspersky’s tracking revealed a 13% increase in Zoom-related fake files in 2025, with Google Drive rising 12% and Teams rising a staggering 100%. Other Microsoft apps, including Outlook and PowerPoint (16% each), Excel (12%), Word (9%) and Teams (5%) accounting for a large proportion of the attacks observed by Kaspersky.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
The company is advising businesses to set clear procedures for software adoption and to define access rules for emails, cloud files and other documents. Regular backups can also provide a reliable failsafe in the event of an attack.
“Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software,” Kolesnikov added.
You might also like
Hackers are using fake Zoom apps to steal your data and your cryptowallet – here’s how to stay safe
Downloaded something dodgy? Here’s the best malware removal
We’ve listed the best endpoint protection software
With several years’ experience freelancing in tech and automotive circles, Craig’s specific interests lie in technology that is designed to better our lives, including AI and ML, productivity aids, and smart fitness. He is also passionate about cars and the decarbonisation of personal transportation. As an avid bargain-hunter, you can be sure that any deal Craig finds is top value!
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.
Criminals are pretending to be Microsoft, Google, and Apple in phishing attacks
Zoom remote control feature abused for crypto stealing cyberattacks
Popular AI program spoofed in phishing campaign spawning fake Microsoft Sharepoint logins
Google Apps Script abused to launch dangerous phishing attacks
Cybercriminals are using SEO to get popular fake AI tools loaded with malware to rank high on Google
Fake IT support voice calls lead to cyber extortion and stolen company data
Latest in Security
British man behind ‘IntelBroker’ hacker group charged with stealing millions
Millions of Brother printers threatened by multiple serious vulnerabilities – enterprise and home printers at risk
New bill could see DeepSeek and Chinese AI models banned in government departments
Asking ChatGPT to help with your security qualms could be putting your data at serious risk
Ransomware disruptions contributed to a patient death, NHS finds
Nearly half of companies say they pay up ransomware demands – but here’s why that could be a bad idea
Latest in News
The Nothing Phone 3 design just leaked in full – and it’s like Lego designed a smartphone
The #1 most-streamed show is a Netflix dark comedy that’s ideal summer escapism – here’s why you have to catch up with this new smash hit
British man behind ‘IntelBroker’ hacker group charged with stealing millions
The second free Monster Hunter Wilds title update is coming next week, bringing back a surprise monster from the 3DS era
Finally! These AI smart glasses are giving me a feature I’ve been desperate for the Meta Ray-Bans to get since launch
Full Galaxy Buds Core specs revealed, and Samsung’s finally fixed our main issue with the Buds FE
LATEST ARTICLES
The Nothing Phone 3 design just leaked in full – and it’s like Lego designed a smartphone
A one-man army, a much-hyped Fate collab, and the revival of some beloved older characters – all the highlights coming in Honkai: Star Rail Version 3.4
ChatGPT can solve an issue that has plagued 30 years of my life, and now I might finally start eating my 5 a day
The #1 most-streamed show is a Netflix dark comedy that’s ideal summer escapism – here’s why you have to catch up with this new smash hit
Death Stranding 2 tips and tricks: what I recommend you do to avoid failure after my nearly 50 hours in the game
TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.
Contact Future’s experts
Terms and conditions
Privacy policy
Cookies policy
Advertise with us
Web notifications
Accessibility Statement
Future US, Inc. Full 7th Floor, 130 West 42nd Street,
Please login or signup to comment
Please wait…