SMBs are hit by malignant productivity tools – Zoom and chatgpt flushed by hackers
- Advertisement -
- Advertisement -
- Zoom, Microsoft Office and Chatgpt are among the most imitated
- Attacks can vary, from phishing campaigns to malware
- Setting up clear software acceptance procedures is crucial
Cyber attacks that mimic chatgpt rose at the beginning of 2025 by 115%, according to new research by the Russian cyber security Kaspersky, who warns employees of fake productivity apps.
According to the analysis, 8,500 small and medium -sized companies were disguised by malignant files as Productivity -apps And AI Tools.
One of the most fake apps were hem, Microsoft Office, Chatgpt and Deepseek, where Kaspersky follows more than 4,000 unique malignant files with these types of attacks.
Zoom, office and chatgpt falsify in the latest cyber attacks
The CyberSecurity Company explained that cyber criminals exploit popular and hyped tools for victims of Lute during a sense of excitement and urgency. Phishing and spam campaigns are used to present fake offers that occur as brands to steal data or distribute malware.
“The more publicity and conversation there are about a tool, the greater the chance that a user will encounter a fake package on the internet,” said security expert Vasily Kolesnikov.
Because the warning from Kaspersky discusses productivity apps as a whole, and not one specific campaign, not one kind of warning is issued. Instead, employees are advised to be aware of downloaders, Trojan horses and adware, with phishing campaigns aimed at banking, delivery and account data.
The tracking of Kaspersky revealed an increase of 13% in zoom -related fake files in 2025, where Google Drive rises 12% and teams that rise no less than 100%. Other Microsoft apps, including Outlook and PowerPoint (each 16%), Excel (12%), Word (9%) and teams (5%) that are good for a large part of the attacks observed by Kaspersky.
The company advises companies to set up clear procedures for software acceptance and to define access rules for E -mails, cloud stocks and other documents. Regular back -ups can also offer a reliable FailSafe in the case of an attack.
“Always check the correct spelling of the website and links in suspicious e -mails. In many cases, these links can prove to be phishing or a link that downloads malignant or potentially unwanted software,” Kolesnikov added.
Maybe you like it too
- Advertisement -