- Zoom, Microsoft Office and Chatgpt are among the most personified
- The attacks can vary, from phishing campaigns to malware
- Establish Claro software adoption procedures is crucial
Cyber attacks that imitated ChatGPT increased 115% to early 2025, according to a new investigation of Russian Kaspersky cybersecurity, which warns workers of false productivity applications.
According to the analysis, 8,500 small and medium enterprises were attacked using malicious files disguised as productivity applications and AI tools.
Among Fakes applications were Zoom, Microsoft Office, Chatgpt and Deepseek, with Kaspersky tracking more than 4,000 unique malicious files using this type of attack.
Zoom, Office and Chatgpt falsified in the latest cyber attacks
The cybersecurity company explained that cybercriminals exploit popular and advertised tools to victims of life during a sense of emotion and urgency. Phishing and Spam campaigns are used to present false offers, impersonate data to steal data or distribute malware.
“The more advertising and conversation there are about a tool, the more likely a user will meet a false package on the Internet,” said Vasily Kolesnikov.
Being that Kaspersky’s warning analyzes productivity applications as a whole, and not a specific campaign, a warning type is not issued. On the other hand, workers are advised to take into account the downloaders, the Trojans and the ADWARE, with phishing campaigns aimed at banking, delivery and accounts of accounts.
Kaspersky’s tracking revealed a 13% increase in false archives related to zoom in 2025, with Google Drive increasing 12% and teams increase a amazing 100%. Other Microsoft applications, including Outlook and PowerPoint (16%each), Excel (12%), Word (9%) and equipment (5%) that represent a great proportion of the attacks observed by Kaspersky.
The company is advising companies that establish clear procedures for the adoption of software and define access rules for emails, cloud files and other documents. Regular backup copies can also provide reliable failures in case of attack.
“Always verify the correct spelling of the website and links in suspicious emails. In many cases, these links can be phishing or a link that discharges malicious or potentially unwanted software,” Kolesnikov added.