The OpenText 2025 Cybersecurity Threat Report, released today, reveals a massive shift in attacker tactics. Over 35% of consumer and enterprise malware now originates from the user’s “Downloads” folder, disguising itself as legitimate productivity tools, invoices, or installers. Attackers are using AI to SEO-poison search results, ensuring their malicious files appear at the top of Google searches for common business software.
Business Impact
This creates a blind spot for traditional perimeter defenses. If a user voluntarily downloads a file they *believe* is legitimate (e.g., a PDF editor or driver update), they bypass email filters. The malware often uses valid digital signatures to evade basic endpoint detection, leading to ransomware deployment or credential theft.
Why It Happened
The “Industrialization of Cybercrime” has led to highly professionalized malware distribution networks that mimic legitimate software vendors. Generative AI helps these groups create flawless, localized phishing pages that trick even tech-savvy users.
Recommended Executive Action
Update Endpoint Detection and Response (EDR) policies to strictly inspect execution from the `%USERPROFILE%\Downloads` directory. Implement “Application Whitelisting” to prevent the execution of unapproved binaries, even if they are signed.
Hashtags: #OpenText #Malware #EndpointSecurity #AI #CyberCrime #CISO #InfoSec #Report
