Cyber Security News

Threat Actors Exploiting DeepSeek’s Popularity to Deploy Malware

The meteoric rise of DeepSeek, a Chinese AI startup, has not only disrupted the AI sector but also attracted the attention of cybercriminals.

Following the release of its open-source model, DeepSeek-R1, on January 20, 2025, the platform experienced exponential growth, reaching millions of users globally.

However, this popularity has been exploited by threat actors who have launched sophisticated phishing campaigns and malware attacks targeting unsuspecting users.

Cybersecurity researchers have identified numerous phishing websites mimicking DeepSeek’s official site.

These fraudulent platforms employ “site proxy” techniques to replicate the legitimate interface while embedding malicious links.

Instead of directing users to download the authentic app, these fake sites deliver malware-laden files.

One such phishing domain, deepsekk[.]sbs, was flagged as critically risky by cybersecurity tools, with antivirus programs detecting its payload as a malicious application targeting financial software.

Malware Impersonation on Developer Platforms

Threat actors have also leveraged Python Package Index (PyPI) to distribute malicious packages under names like “deepseeek” and “deepseekai.”

These packages impersonate developer tools for integrating DeepSeek into projects but are designed to steal sensitive data such as API keys and database credentials.

The stolen information is exfiltrated to command-and-control servers, enabling attackers to compromise cloud services and infrastructure resources.

In another campaign, cybercriminals used fake CAPTCHA verification schemes under domains like deepseekcaptcha[.]top to trick users into executing malicious PowerShell commands.

These attacks often result in the installation of infostealers like Vidar Stealer and Lumma Stealer, further compromising user data.

Security Concerns with DeepSeek’s AI Model

DeepSeek’s flagship model, DeepSeek-R1, has also faced scrutiny for its vulnerabilities.

Security tests revealed that the model is highly susceptible to adversarial prompts and jailbreaking techniques.

Researchers found that it could generate harmful content, including malware scripts and phishing templates, with a failure rate exceeding 90% in blocking such prompts.

This raises concerns about its safety mechanisms and potential misuse by malicious actors.

Additionally, DeepSeek’s mobile app has been criticized for weak encryption protocols and unencrypted data transmissions.

Analysis of DeepSeek search volume based on Google Trends

Security assessments revealed that sensitive user data is transmitted over insecure channels and stored on servers in China, raising privacy and regulatory compliance concerns.

The exploitation of DeepSeek’s popularity underscores the risks associated with rapidly scaling technologies without robust security measures.

Users are advised to verify domains before downloading applications or interacting with online platforms claiming affiliation with DeepSeek.

Developers should exercise caution when integrating third-party tools by validating package authenticity through trusted sources.

Organizations can mitigate these risks by employing threat intelligence tools like Criminal IP Domain Search to identify high-risk domains and pre-blocking malicious links using browser extensions.

Furthermore, enterprises should consider restricting the use of AI platforms like DeepSeek in critical workflows until security vulnerabilities are adequately addressed.

The case of DeepSeek highlights the urgent need for enhanced cybersecurity measures in the AI ecosystem as threat actors continue to exploit emerging technologies for malicious purposes.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Threat Actors in Russia, China, and Iran Targeting Local communities in the U.S

Foreign adversaries, including Russia, China, and Iran, are intensifying their efforts to manipulate public opinion…

4 minutes ago

New Phishing Attacks Abuses Webflow CDN & CAPTCHAs to Steal Credit Card details

Netskope Threat Labs has uncovered a sophisticated phishing campaign targeting users across various industries, including…

10 minutes ago

30,000 WordPress Sites Exposed to Exploitation via File Upload Vulnerability

A critical security vulnerability in the "Security & Malware scan by CleanTalk" plugin has left…

16 minutes ago

Palo Alto Firewall Flaw Exploited in RA World Ransomware Attacks

A recent ransomware attack leveraging a vulnerability in Palo Alto Networks' PAN-OS firewall software (CVE-2024-0012)…

19 minutes ago

Widespread Exploitation of ThinkPHP and OwnCloud Flaws by Cybercriminals

 GreyNoise has detected a significant surge in exploitation activity targeting two vulnerabilities — CVE-2022-47945 and…

52 minutes ago

Windows 11 Compression Features Pose libarchive Security Threats

Microsoft's ongoing efforts to enhance user experience in Windows 11 have introduced native support for…

1 hour ago