Why Online Criminals Target Business Tools And Productivity Apps

Security researchers recorded a 67 percent year-on-year increase in malware targeting Android devices between June 2024 and May 2025, and identified 239 malicious applications, which evaded Google Play's security filters and were downloaded 42 million times.

Many of these were productivity and workflow tools in the "Tools" category, taking advantage of users' trust in functional apps and their desire to support remote work.

The manufacturing and energy sectors experienced the highest volume of mobile-focused attacks, with the energy sector seeing a 387 percent annual jump in mobile threats. India, the United States, and Canada generated most malicious mobile traffic, accounting for 26 percent, 15 percent, and 14 percent of observed traffic respectively. India's mobile threat volume rose 38 percent year on year.

For internet of things (IoT) threats, 40 percent of blocked requests were associated with the Mirai malware family and 35 percent with the Gafgyt variant.

Manufacturing and transportation were the most frequently targeted industries for IoT attacks, each responsible for about one-fifth of observed incidents, a change from the prior year when manufacturing alone accounted for 36 percent and transportation 14 percent.

The United States was the top geographic target for IoT attacks with 54 percent of all observed activity, followed by Hong Kong at 15 percent, Germany at six percent, India at five percent, and China at four percent.

Google stated that its Google Play Protect safeguards were already blocking the identified malware variants before the report period ended and that, based on its current detections, no apps containing those malware versions remain available on Google Play. Improvements to user protections continue.

Source: https://www.infosecurity-magazine.com/news/apps-download-41-million-times/

Commentary

In the above matter, online criminals were targeting business applications.

Online criminals increasingly target business applications, especially tools and productivity apps, because they combine high user trust, extensive permissions, and direct access to valuable data and systems.

Employees rely on these apps to keep hybrid and remote work moving, so they routinely grant them network access, file access, and notification privileges with minimal scrutiny. This creates an ideal delivery mechanism for malware and credential theft.

Threat actors also know that organizations often fast-track tool adoption to support workflows, which can outpace security review and patching. Fast-tracking can also leave configuration gaps and unmonitored integrations that criminals can quietly exploit.

Once a malicious or compromised tool is installed, attackers can harvest login credentials, session cookies, and multi-factor tokens. This gives them the ability to move laterally into cloud services, advertising platforms, and financial applications while appearing as legitimate users.

Campaigns impersonating popular productivity, VPN, editing, and messaging tools further increase the odds of success. This is because victims believe they are downloading familiar brands that will improve efficiency or connectivity.

For criminal groups, these factors translate into an attractive return on investment. A single widely used tool can deliver millions of installs, as seen in recent incidents where hundreds of malicious Android apps in the Tools category were downloaded more than 40 million times globally.

The final takeaway is that the combination of scale, embedded trust, and common business access explains why productivity and workflow tools remain a preferred vector for infiltrating enterprise environments. Criminals monetize attacks through data theft, extortion, and unauthorized use of business accounts.

Finally, your opinion is important to us. Please complete the opinion survey:

Product

Articles

When The Boss Is The Harasser: Sexual Harassment By Healthcare Owners

A co-owner of a home healthcare agency is sued for sexual harassment. We comment on the unique reporting, investigation, and retaliation risks that arise when the alleged harasser is a healthcare organization's owner.

Recognizing The Red Flags Of Fake Or Inflated Employee Expenses

A former employee is convicted of embezzlement, including filing fake reimbursement requests. We comment on recurrent clues in receipts, behavior, and spending patterns that suggest an employee may be submitting fake requests.

For Younger Workers, Is Working For "Meaningful Work" More Important Than Pay? You Make The Call

A survey claims that younger employees want "meaningful work" more than they do pay. Do you agree with that? You make the call and join the conversation.

Why Online Criminals Target Business Tools And Productivity Apps

We comment on why online criminals increasingly concentrate their efforts on business tools and productivity applications.

Locking Down Biologicals: Inventory Best Practices That Deter Insider Theft

A healthcare employee is ordered to pay $2.4M in restitution for selling bone grafts. We comment on practical steps for securing storage, tightening documentation, and using technology to track every graft from receipt to patient.