Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 5, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 5, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 5, 2025

      In MCP era API discoverability is now more important than ever

      June 5, 2025

      Google’s DeepMind CEO lists 2 AGI existential risks to society keeping him up at night — but claims “today’s AI systems” don’t warrant a pause on development

      June 5, 2025

      Anthropic researchers say next-generation AI models will reduce humans to “meat robots” in a spectrum of crazy futures

      June 5, 2025

      Xbox just quietly added two of the best RPGs of all time to Game Pass

      June 5, 2025

      7 reasons The Division 2 is a game you should be playing in 2025

      June 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Mastering TypeScript: How Complex Should Your Types Be?

      June 5, 2025
      Recent

      Mastering TypeScript: How Complex Should Your Types Be?

      June 5, 2025

      IDMC – CDI Best Practices

      June 5, 2025

      PWC-IDMC Migration Gaps

      June 5, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Google’s DeepMind CEO lists 2 AGI existential risks to society keeping him up at night — but claims “today’s AI systems” don’t warrant a pause on development

      June 5, 2025
      Recent

      Google’s DeepMind CEO lists 2 AGI existential risks to society keeping him up at night — but claims “today’s AI systems” don’t warrant a pause on development

      June 5, 2025

      Anthropic researchers say next-generation AI models will reduce humans to “meat robots” in a spectrum of crazy futures

      June 5, 2025

      Xbox just quietly added two of the best RPGs of all time to Game Pass

      June 5, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DeepSeek’s Popularity Sparks Surge in Crypto Phishing and Malware Campaigns

    DeepSeek’s Popularity Sparks Surge in Crypto Phishing and Malware Campaigns

    January 31, 2025

    DeepSeek

    The rapid rise of DeepSeek, a Chinese artificial intelligence company known for its open-source large language models (LLMs), has sparked not only excitement but also a significant increase in cyber threats. As of January 2025, the company launched its first free chatbot app, “DeepSeek – AI Assistant,” which quickly became the most downloaded free app on the iOS App Store in the United States, surpassing even OpenAI’s ChatGPT. 

    According to Cyble, DeepSeek’s success has made it a trailblazer in the AI space, but it has also drawn the attention of cybercriminals, who are now using its reputation to fuel a variety of fraudulent activities, including phishing attacks, malware campaigns, and investment scams. 

    DeepSeek’s Meteoric Rise and the Cybersecurity Risks That Follow 

    Following the DeepSeek’s rapid popularity, a concerning trend has emerged. Cybercriminals have begun to exploit its growing recognition to launch scams and malware campaigns. According to recent investigations by Cyble Research and Intelligence Labs (CRIL), several suspicious websites have surfaced, impersonating DeepSeek in an attempt to deceive unsuspecting users. These sites are often tied to cryptocurrency phishing schemes and fraudulent investment opportunities, capitalizing on the trust DeepSeek has earned in the tech community. 

    One of the key tactics used by threat actors (TAs) involves mimicking the legitimate DeepSeek platform to launch crypto phishing attacks. These schemes involve fraudulent websites that closely resemble DeepSeek’s official site, tricking users into scanning QR codes that ultimately compromise their crypto wallets. Such scams are becoming increasingly common, with cybercriminals taking advantage of popular platforms like DeepSeek to lure users into unsafe situations. 

    Cyble has identified multiple fraudulent domains tied to these phishing campaigns, including: 

    • abs-register[.]com 
    • deep-whitelist[.]com 
    • deepseek-ai[.]cloud 
    • deepseek[.]boats 
    • deepseek-shares[.]com 
    • deepseek-aiassistant[.]com 
    • usadeepseek[.]com 

    These domains were linked to malicious efforts designed to extract users’ personal data, steal cryptocurrency, or promote fraudulent investment schemes. 

    The Growing Threat of Crypto Phishing 

    DeepSeek campaign
    Crypto phishing website impersonating DeepSeek (Source: Cyble)

    One of the most common phishing tactics identified is the use of QR codes to trick users into compromising their crypto wallets. By creating websites that resemble DeepSeek’s official platform, cybercriminals encourage users to connect their wallets, often through deceptive “Connect Wallet” buttons. When a user selects a wallet option, such as MetaMask or WalletConnect, the website prompts them to scan a QR code. However, this action redirects users to a fraudulent address, which ultimately gives cybercriminals access to the wallet and its contents. 

    DeepSeek Scams
    Phishing site displaying QR code (Source: Cyble)

    Two specific websites, abs-register[.]com and deep-whitelist[.]com, were flagged as part of this scheme. These phishing sites presented themselves as legitimate portals, luring unsuspecting crypto enthusiasts into connecting their wallets through a misleading interface. 

    The use of QR codes in phishing schemes is not new, but the rise of platforms like DeepSeek has amplified its effectiveness. By leveraging the credibility of a trending service, cybercriminals are increasingly able to deceive even the most cautious users into falling for these attacks. 

    Fake Investment Scams Exploit DeepSeek’s Popularity 

    In addition to phishing attacks, fraudsters have also used DeepSeek’s growing prominence to promote fake investment opportunities. One of the more interesting examples discovered by Cyble was the domain deepseek-shares[.]com, which was registered on January 29, 2025. This fraudulent website posed as an official DeepSeek investment platform, claiming to offer pre-IPO shares of the company. 

    Fake-investment-website
    Fake-investment-website (Source: Cyble)

    The problem with this claim is that DeepSeek is a privately held company, and no official initial public offering (IPO) announcements have been made. The website’s real purpose is to gather sensitive personal information from potential investors, which can later be exploited for phishing, identity theft, or financial fraud. 

    These types of investment scams are particularly dangerous because they prey on individuals eager to capitalize on the perceived success of a rapidly growing company. Fraudsters promise lucrative returns, but the goal is not to help investors profit—it’s to steal their personal data and funds. 

    Malware Campaigns Linked to DeepSeek 

    Beyond phishing and investment scams, there are also reports of malware campaigns taking advantage of DeepSeek’s rising influence. According to Cyble’s research, several malicious websites have been found claiming to offer legitimate DeepSeek app downloads for various platforms, including Windows, iOS, and Android. While some of these sites appear to be under development, others may serve as entry points for malware. 

    There have been reports of malware labeled AMOS Stealer, a type of credential-stealing software, being distributed through fraudulent DeepSeek-related downloads. This software can steal sensitive user data, including login credentials, and may even grant attackers full access to users’ online accounts. 

    To avoid falling victim to such attacks, users are advised to only download the DeepSeek app from official sources. Any websites offering third-party downloads should be approached with caution, as they may be attempting to deliver malicious software.

    Conclusion  

    As DeepSeek’s popularity continues to soar, so does the risk of cyber threats targeting its users, including phishing scams, fake investment schemes, and malware campaigns. To protect themselves, users must remain vigilant by verifying official sources, avoiding untrusted third-party websites and QR codes, and scrutinizing crypto projects before making any investments. They should also be cautious about unverified investment opportunities, as DeepSeek has not announced any official IPO or cryptocurrency launch. 

    Employing reputable security software, keeping systems up to date, and staying informed about phishing and malware tactics are also crucial steps. By following these best practices, individuals can protect their personal information and avoid falling victim to cybercriminals seeking to exploit DeepSeek’s success. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleItaly Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns
    Next Article Google Bans 158,000 Malicious Android App Developer Accounts in 2024

    Related Posts

    Security

    High-Severity Flaw in MIM Medical Imaging Software Allows Code Execution!

    June 5, 2025
    Security

    Amazon Alerts: High-Severity FreeRTOS-Plus-TCP Flaw Needs Immediate Patch!

    June 5, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-30663 – Zoom Workplace Apps TOCTOU Race Condition Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    How to automate Accounts Payable using LLM-Powered Multi Agent Systems

    Artificial Intelligence

    Share Vuex mutations between tabs and windows

    Development

    Hospital Management System using Python Django and MySQL

    Development

    Highlights

    Armbian – Linux for ARM development boards

    January 30, 2025

    Armbian is a highly optimized base operating system specialized for single board computers. The post…

    Satyrn: A Modern Jupyter Client for Mac with AI-Enabled Inline Code Generation

    July 11, 2024

    CVE-2025-3885 – Harman Becker MGU21 Bluetooth Denial-of-Service Vulnerability

    May 22, 2025

    Outlook’s classic yellow icon is back… at least unofficially

    May 20, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.