In 2025, nearly 8 500 users from small and medium-sized businesses (SMBs) around the world faced cyberattacks where malicious or unwanted software was disguised as popular online productivity tools, according to Kaspersky.
Based on the unique malicious and unwanted files observed, the most common lures included Zoom and Microsoft Office – with newer AI-based services like ChatGPT and DeepSeek being increasingly exploited by attackers.
Kaspersky analysts explored how frequently malicious and unwanted software are disguised as legitimate applications commonly used by SMBs using a sample of 12 online productivity apps. In total, Kaspersky observed more than 4 000 unique malicious and unwanted files disguised as popular apps in 2025.
With the growing popularity of AI services, cybercriminals are increasingly disguising malware as AI tools. The number of cyberthreats mimicking ChatGPT increased by 115% in the first four months of 2025 compared to the same period last year, reaching 177 unique malicious and unwanted files. Another popular AI tool, DeepSeek, accounted for 83 files. This large language model, launched in 2025, immediately appeared on the list of impersonated tools.
“Interestingly, threat actors are rather picky in choosing an AI tool as bait,” says Vasily Kolesnikov, security expert at Kaspersky. “For example, no malicious files mimicking Perplexity were observed. The likelihood that an attacker will use a tool as a disguise for malware or other types of unwanted software directly depends on the service’s popularity and hype around it. The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the Internet.
“To be on the safe side, SMB employees – as well as regular users – should exercise caution when looking for software on the Internet or coming across too-good-to-be-true subscription deals,” Kolesnikov adds. “Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software.”
Another cybercriminal tactic to look for in 2025 is the growing use of collaboration platform brands to trick users into downloading or launching malware.
The number of malicious and unwanted software files disguised as Zoom increased by nearly 13% in 2025 reaching 1 652, while such names as “Microsoft Teams” and “Google Drive” saw increases of 100% and 12% respectively with 206 and 132 cases. This pattern likely reflects the normalisation of remote work and geographically distributed teams which has made these platforms integral to business operations across industries.
Among the analysed sample, the highest number of files mimicked Zoom, accounting for nearly 41% of all unique files detected. Microsoft Office applications remained frequent targets for impersonation: Outlook and PowerPoint each accounted for 16%, Excel for nearly 12%, while Word and Teams made up 9% and 5% respectively.
The top threats targeting small and medium businesses in 2025 included downloaders, trojans, and adware.
Phishing and spam
Apart from malware threats, Kaspersky continues to observe a wide range of phishing and scam schemes targeting SMBs. Attackers aim to steal login credentials for various services – from delivery platforms to banking systems – or manipulate victims into sending them money through deceptive tactics. One example is a phishing attempt targeting Google Accounts. Attackers promise potential victims to increase sales by advertising their company on X, with the ultimate goal being to steal their credentials.
Beyond phishing, SMBs are flooded with spam emails. Not surprisingly, AI has also made its way into the spam folder – for example, with offers for automating various business processes.
In general, Kaspersky observes phishing and spam offers crafted to reflect the typical needs of small businesses promising attractive deals on email marketing or loans, offering services such as reputation management, content creation, or lead generation, and more.