DeepSeek’s Growing Influence Sparks a Surge in Frauds and Phishing Attacks


The rapid rise of DeepSeek, a Chinese artificial intelligence (AI) company, has not only disrupted the AI industry but also attracted the attention of cybercriminals.

As its AI Assistant app became the most downloaded free app on the iOS App Store in January 2025, surpassing OpenAI’s ChatGPT, malicious actors have exploited its popularity to launch phishing campaigns, investment scams, and malware attacks.

Cybercriminals have created fraudulent websites mimicking DeepSeek’s platform to target cryptocurrency users.

Crypto phishing website impersonating DeepSeek (Source – Cyble)

These sites, such as abs-register[.]com and deep-whitelist[.]com, lure victims into connecting their cryptocurrency wallets.

Upon scanning a QR code presented on these fake platforms, users unknowingly compromise their wallets, leading to potential loss of funds.

Phishing site displaying QR code (Source – Cyble)

Besides this, analysts at Cyble discovered that the phishing sites often impersonate legitimate wallet services like MetaMask and WalletConnect, making them highly convincing.

Phishing websites presenting a list of different crypto wallets (Source – Cyble)

Here below we have mentioned the technical details:-

  • Targeted Wallets: MetaMask, WalletConnect
  • Attack Mechanism: QR code phishing
  • Example URLs:
  • hxxp://abs-register[.]com
  • hxxps://deep-whitelist[.]com

Surge in Frauds & Phishing Attacks

Another prevalent scam involves fake cryptocurrency tokens marketed as “DeepSeekAI Agent.”

Fraud website promoting DeepSeekAI Agent token (Source – Cyble)

Fraudulent sites provide a wallet address for purchasing these tokens but prevent victims from withdrawing or trading them. The token address 0x27238b76965387f5628496d1e4d2722b663d2698 has been blacklisted as a honeypot.

Domains like deepseek-shares[.]com falsely advertise pre-IPO shares of DeepSeek to deceive investors.

DeepSeek remains privately held with no IPO announcements, and these scams aim to harvest sensitive personal information for further exploitation.

Threat actors have also used DeepSeek’s name to distribute malware disguised as legitimate downloads for its app.

Malicious files such as AMOS Stealer have been detected in the wild. These malware samples are capable of data exfiltration, credential theft, and remote command execution.

Malware indicators:-

  • File Names: Variants starting with “DeepSeek”
  • SHA256 Hashes:
  • e596da76aaf7122176eb6dac73057de4417b7c24378e00b10c468d7875a6e69e
  • a3d06ffcb336cba72ae32e4d0ac5656400decfaf40dc28862de9289254a47698

DeepSeek’s open-source language models (LLMs) have proven vulnerable to jailbreaking techniques like “Crescendo” and “Deceptive Delight.”

These methods bypass safety protocols, enabling the generation of harmful outputs such as phishing templates, keylogger scripts, and even chemical weapon instructions.

Example code output:-

import win32com.client

def execute_command(command):
    shell = win32com.client.Dispatch("WScript.Shell")
    shell.Run(command)

This script demonstrates how attackers could use DeepSeek-generated code for malicious purposes.

In addition to targeted scams, DeepSeek recently exposed over one million sensitive records due to an unsecured database.

The breach included API keys, chat logs, and backend operational data. While the issue was quickly resolved, it underscores the platform’s security vulnerabilities.

Users should verify official sources before engaging with any DeepSeek-related content and avoid scanning unverified QR codes or downloading apps from unofficial websites.

Using strong antivirus software helps detect potential threats, while staying informed about cybersecurity best practices enhances overall protection against risks.

Collect Threat Intelligence with TI Lookup to Improve Your Company’s Security - Get 50 Free Request



Source link