Digital Security
Cybercriminals waste no time launching attacks that take advantage of the frenzy around DeepSeek’s AI model
31 Jan 2025
•
,
4 min. read

It’s almost a cliché to say that cybercriminals are quick to latch onto the latest trends and technologies, exploiting them for their own gains. The buzz around DeepSeek and its AI models is no exception. In fact, recent days have shown how scammers quickly adapt to new technologies, despite the tech world evolving rapidly.
Since the rise of DeepSeek’s R1 reasoning model, security researchers have identified fraudulent attempts to take advantage of its popularity. Alongside this, DeepSeek has faced scrutiny over its privacy and security practices, highlighting risks associated with AI models.
Here’s how fraudsters use DeepSeek’s popularity to lure victims into scams and malware, along with key privacy and security concerns surrounding the company:
Scams and Malware
One example involves a website mimicking DeepSeek’s official site, prompting visitors to download the model. However, instead of the AI model, users end up downloading malicious software detected as Win32/Packed.NSIS.A by ESET products.
Other instances include fake domains and bogus DeepSeek crypto tokens, all aimed at deceiving users and potentially causing harm.
Privacy and Security Concerns Surrounding DeepSeek
DeepSeek recently experienced a cyberattack, leading to a suspension of new user signups. Additionally, a database leak exposed sensitive information, prompting security concerns.
Security firms have discovered vulnerabilities in DeepSeek’s AI models, raising questions about data collection practices and potential regulatory implications.
How to Stay Safe
To protect yourself from DeepSeek-themed scams, remain vigilant for suspicious messages and links. Utilize two-factor authentication and robust security software to enhance your online safety.
When interacting with AI models like DeepSeek, be cautious about the data you share and verify information before taking any action. Maintaining awareness and implementing security measures are crucial in navigating the evolving digital landscape.
Image source: Unsplash