Monday, April 28, 2025
Homecyber securityThreat Actors Exploit DeepSeek Craze to Distribute Vidar Stealer Malware

Threat Actors Exploit DeepSeek Craze to Distribute Vidar Stealer Malware

Published on

SIEM as a Service

Follow Us on Google News

In a concerning new development, cybercriminals are exploiting the widespread popularity of the recently launched DeepSeek AI chatbot to distribute the Vidar Stealer malware.

According to research by Zscaler ThreatLabz, attackers are using brand impersonation tactics to lure unsuspecting users into executing malicious code, thereby compromising sensitive data.

Launched on January 20, 2025, DeepSeek quickly gained global attention, making it a prime target for malicious campaigns.

- Advertisement - Google News

Threat actors have created fraudulent websites mimicking DeepSeek’s official platform, employing fake CAPTCHA pages as part of their attack chain.

These pages trick users into executing harmful PowerShell commands that download and deploy the Vidar information stealer.

Technical Analysis of the Attack Chain

The attack begins with the creation of fake domains resembling DeepSeek’s official site.

One such domain, “deepseekcaptcha[.]top,” prompts visitors to complete a registration process before redirecting them to a deceptive CAPTCHA page.

Embedded JavaScript in this page copies a malicious PowerShell command to the user’s clipboard.

If executed, this command downloads a packed Vidar executable (1.exe) onto the victim’s system.

DeepSeek Craze
attack chain employed in this campaign

Once deployed, Vidar initiates its primary function: harvesting sensitive information such as login credentials, cryptocurrency wallet data, browser cookies, and personal files.

The malware also uses legitimate platforms like Telegram and Steam to conceal its command-and-control (C2) infrastructure.

Exploitation of Cryptocurrency Wallets and Browsers

Vidar is specifically configured to target cryptocurrency wallets and browser extensions.

It scans victims’ systems for wallet-related files and configurations, exfiltrating sensitive data from popular wallets like MetaMask, BinanceChainWallet, and Trust Wallet.

Additionally, it extracts browser-related assets such as saved credentials and autofill data from browsers including Google Chrome, Microsoft Edge, Opera GX, and Brave.

The malware also searches for specific filenames and extensions associated with cryptocurrency wallets or private keys.

By leveraging these methods, attackers can gain access to victims’ digital assets and accounts.

Vidar uses hardcoded endpoints for exfiltration of stolen data. In this campaign, attackers utilized a publicly accessible Steam community profile and a Telegram channel to locate C2 infrastructure.

Associated IP addresses include 77.239.117[.]222 and 95.216.178[.]57.

The rapid exploitation of DeepSeek underscores the risks associated with emerging AI technologies.

While generative AI tools offer significant benefits, they also create new opportunities for cybercriminals to launch sophisticated attacks.

Organizations must adopt robust security measures to mitigate these threats, including monitoring newly registered domains and educating users about phishing tactics.

Zscaler’s cloud security platform has detected indicators related to Vidar at multiple levels, providing protection against this campaign.

However, proactive measures such as implementing zero trust frameworks and restricting unsanctioned applications remain critical in combating such threats.

As AI adoption continues to grow across industries, vigilance will be essential in safeguarding users against evolving cyber risks.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...