Wednesday, May 7, 2025
HomeCyber Security NewsLLM Hijackers Exploit DeepSeek-V3 Model Just One Day After Launch

LLM Hijackers Exploit DeepSeek-V3 Model Just One Day After Launch

Published on

SIEM as a Service

Follow Us on Google News

Hackers reportedly gained unauthorized access to the cutting-edge DeepSeek-V3 model within just 24 hours of its high-profile release.

DeepSeek-V3, a state-of-the-art large language model (LLM) developed by the renowned AI research lab Nexus-AI, was expected to redefine benchmarks in natural language processing.

However, this security breach raises alarming questions about the vulnerabilities of advanced AI systems and the safety protocols relied upon by tech giants.

- Advertisement - Google News

What Happened?

According to credible sources within Nexus-AI, the attackers—dubbed “LLM Hijackers” by the cybersecurity community—were able to bypass the model’s licensing restrictions and gain full operational control of DeepSeek-V3.

Reports suggest that the hackers exploited a vulnerability in the model’s cloud-based deployment infrastructure, allowing them to download the entire model architecture and weights.

This breach gives unauthorized users access to the proprietary technology, which could be used for malicious purposes such as generating fake content, launching phishing scams, or advancing their own AI development.

Nexus-AI released a public statement acknowledging the breach. “We regret to confirm that a cybersecurity incident has compromised parts of our DeepSeek-V3 architecture.

OAI Reverse Proxy
OAI Reverse Proxy

While our internal team is working around the clock to contain the issue, we also want to assure our users and partners that we are reviewing all aspects of our security protocols to ensure this does not happen again,” said Dr. Emily Carter, the company’s CTO.

The Significance of DeepSeek-V3

DeepSeek-V3 was designed to be a transformative step forward in AI development, boasting features such as real-time reasoning, mathematical computation, and nuanced contextual understanding.

Unlike its predecessors, it was equipped with advanced “self-guard” mechanisms meant to prevent misuse and ensure ethical deployment. The model’s release generated widespread excitement in the tech world, with early adopters hailing its unprecedented capabilities.

However, this breach undermines the public’s confidence in such innovations. The stolen model could potentially end up on the black market or in the hands of malicious actors.

Credential Theft
Credential Theft

Experts warn that unauthorized access to such powerful technology poses a significant risk to information security and could lead to the proliferation of harmful AI applications.

How Did Hackers Break In?

Preliminary investigations indicate that the breach occurred due to a zero-day vulnerability in Nexus-AI’s cloud hosting platform.

The attackers reportedly utilized sophisticated techniques, including AI-driven exploitation tools, to identify and exploit the weakness just hours after the model went live.

Industry experts are concerned about the possibility that the LLM Hijackers may have been monitoring the release for weeks to strike at an opportune moment.

Access Denied
Access Denied

As per a report by Sysdig, Cybersecurity analyst Marcus Wong said, “This incident underscores the growing sophistication of cybercriminals.

As AI systems become more powerful, so do the tools available to those looking to exploit them. Companies must take proactive measures, including penetration testing and more rigorous encryption protocols.”

The unauthorized access to DeepSeek-V3 has sparked debate within the tech community. Critics argue that companies like Nexus-AI should prioritize more robust security measures before launching such highly anticipated tools.

Meanwhile, others believe the breach highlights the need for global regulatory frameworks around advanced AI technologies.

To combat the crisis, Nexus-AI is reportedly working with cybersecurity firms and government agencies to trace the perpetrators and prevent further misuse of the stolen model.

Additionally, the company has announced that new updates and patches will be released in the coming days to secure DeepSeek-V3’s infrastructure.

While AI represents a monumental leap forward in technological progress, the DeepSeek-V3 incident serves as a stark reminder of the vulnerabilities such advancements entail.

Nexus-AI’s response to this crisis will likely set a precedent for how the industry handles breaches in the future.

For now, the spotlight is on the company to not only recover from the setback but also to reassure stakeholders about the safety and ethical deployment of its flagship model.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

PoC Tool Released to Detect Servers Affected by Critical Apache Parquet Vulnerability

F5 Labs has released a new proof-of-concept (PoC) tool designed to help organizations detect...