Thursday, February 13, 2025
Homecyber securityThreat Actors Exploiting DeepSeek’s Popularity to Deploy Malware

Threat Actors Exploiting DeepSeek’s Popularity to Deploy Malware

Published on

SIEM as a Service

Follow Us on Google News

The meteoric rise of DeepSeek, a Chinese AI startup, has not only disrupted the AI sector but also attracted the attention of cybercriminals.

Following the release of its open-source model, DeepSeek-R1, on January 20, 2025, the platform experienced exponential growth, reaching millions of users globally.

However, this popularity has been exploited by threat actors who have launched sophisticated phishing campaigns and malware attacks targeting unsuspecting users.

Cybersecurity researchers have identified numerous phishing websites mimicking DeepSeek’s official site.

These fraudulent platforms employ “site proxy” techniques to replicate the legitimate interface while embedding malicious links.

Instead of directing users to download the authentic app, these fake sites deliver malware-laden files.

One such phishing domain, deepsekk[.]sbs, was flagged as critically risky by cybersecurity tools, with antivirus programs detecting its payload as a malicious application targeting financial software.

Malware Impersonation on Developer Platforms

Threat actors have also leveraged Python Package Index (PyPI) to distribute malicious packages under names like “deepseeek” and “deepseekai.”

These packages impersonate developer tools for integrating DeepSeek into projects but are designed to steal sensitive data such as API keys and database credentials.

The stolen information is exfiltrated to command-and-control servers, enabling attackers to compromise cloud services and infrastructure resources.

In another campaign, cybercriminals used fake CAPTCHA verification schemes under domains like deepseekcaptcha[.]top to trick users into executing malicious PowerShell commands.

These attacks often result in the installation of infostealers like Vidar Stealer and Lumma Stealer, further compromising user data.

Security Concerns with DeepSeek’s AI Model

DeepSeek’s flagship model, DeepSeek-R1, has also faced scrutiny for its vulnerabilities.

Security tests revealed that the model is highly susceptible to adversarial prompts and jailbreaking techniques.

Researchers found that it could generate harmful content, including malware scripts and phishing templates, with a failure rate exceeding 90% in blocking such prompts.

This raises concerns about its safety mechanisms and potential misuse by malicious actors.

Additionally, DeepSeek’s mobile app has been criticized for weak encryption protocols and unencrypted data transmissions.

DeepSeek’s
Analysis of DeepSeek search volume based on Google Trends

Security assessments revealed that sensitive user data is transmitted over insecure channels and stored on servers in China, raising privacy and regulatory compliance concerns.

The exploitation of DeepSeek’s popularity underscores the risks associated with rapidly scaling technologies without robust security measures.

Users are advised to verify domains before downloading applications or interacting with online platforms claiming affiliation with DeepSeek.

Developers should exercise caution when integrating third-party tools by validating package authenticity through trusted sources.

Organizations can mitigate these risks by employing threat intelligence tools like Criminal IP Domain Search to identify high-risk domains and pre-blocking malicious links using browser extensions.

Furthermore, enterprises should consider restricting the use of AI platforms like DeepSeek in critical workflows until security vulnerabilities are adequately addressed.

The case of DeepSeek highlights the urgent need for enhanced cybersecurity measures in the AI ecosystem as threat actors continue to exploit emerging technologies for malicious purposes.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications

Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to...

Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S

Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications

Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to...