- Zoom, Microsoft Office and Chatgpt are among the most imitated
- Attacks may vary, from phishing -campaigns to malware
- Setting clear software recording procedures are essential
Cyberattacks, mimicking chatgpt, rose 115% by the beginning of 2025, according to new research from Russian Cyber Security Kaspersky, which warns workers about fake productivity apps.
According to the analysis, 8,500 small and medium-sized companies were targeted using malicious files disguised as productivity apps and AI tools.
Among the most common forgeries were Zoom, Microsoft Office, Chatgpt and Deepseek, with Kaspersky, which tracks more than 4,000 unique malicious files using this type of attack.
Zoom, office and chatgpt counterfeit in the latest cyberattacks
The cyber security company explained that cyber criminals are utilizing popular and hyped tools to lutofle during a sense of excitement and urgency. Phishing and SPAM campaigns are used to present false deals, mimic brands to steal data or distribute malware.
“The more advertising and conversation there is around a tool, the more likely a user will encounter a fake package on the Internet,” said security expert Vasily Kolesnikov.
Since Kaspersky’s warning discusses productivity apps as a whole, and not a specific campaign, there is not a type of warning. Instead, workers are advised to be aware of the downloader, Trojans and adware, with phishing campaigns aimed at banking, delivery and account clocking information.
Kaspersky’s tracking revealed a 13% increase in zoan -related fake files by 2025, with Google Drive rising 12% and holding rose a staggering 100%. Other Microsoft apps including Outlook and PowerPoint (16%each), Excel (12%), Word (9%) and Teams (5%), which accounts for a large part of the attacks observed by Kaspersky.
The company advises companies to set clear procedures for software recording and to define access rules for e emails, sky files and other documents. Regular backups can also cause a reliable mistake in the event of an attack.
“Always check the correct spelling of the site and links in suspicious E emails. In many cases, these links may prove to be phishing or a link that downloads malicious or potentially unwanted software,” Kolesnikov added.



