Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Smashing Animations Part 4: Optimising SVGs

      June 4, 2025

      I test AI tools for a living. Here are 3 image generators I actually use and how

      June 4, 2025

      The world’s smallest 65W USB-C charger is my latest travel essential

      June 4, 2025

      This Spotlight alternative for Mac is my secret weapon for AI-powered search

      June 4, 2025

      Tech prophet Mary Meeker just dropped a massive report on AI trends – here’s your TL;DR

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025
      Recent

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025

      Cast Model Properties to a Uri Instance in 12.17

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025
      Recent

      My Favorite Obsidian Plugins and Their Hidden Settings

      June 4, 2025

      Rilasciata /e/OS 3.0: Nuova Vita per Android Senza Google, Più Privacy e Controllo per l’Utente

      June 4, 2025

      Rilasciata Oracle Linux 9.6: Scopri le Novità e i Miglioramenti nella Sicurezza e nelle Prestazioni

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DeepSeek’s Popularity Sparks Surge in Crypto Phishing and Malware Campaigns

    DeepSeek’s Popularity Sparks Surge in Crypto Phishing and Malware Campaigns

    January 31, 2025

    DeepSeek

    The rapid rise of DeepSeek, a Chinese artificial intelligence company known for its open-source large language models (LLMs), has sparked not only excitement but also a significant increase in cyber threats. As of January 2025, the company launched its first free chatbot app, “DeepSeek – AI Assistant,” which quickly became the most downloaded free app on the iOS App Store in the United States, surpassing even OpenAI’s ChatGPT. 

    According to Cyble, DeepSeek’s success has made it a trailblazer in the AI space, but it has also drawn the attention of cybercriminals, who are now using its reputation to fuel a variety of fraudulent activities, including phishing attacks, malware campaigns, and investment scams. 

    DeepSeek’s Meteoric Rise and the Cybersecurity Risks That Follow 

    Following the DeepSeek’s rapid popularity, a concerning trend has emerged. Cybercriminals have begun to exploit its growing recognition to launch scams and malware campaigns. According to recent investigations by Cyble Research and Intelligence Labs (CRIL), several suspicious websites have surfaced, impersonating DeepSeek in an attempt to deceive unsuspecting users. These sites are often tied to cryptocurrency phishing schemes and fraudulent investment opportunities, capitalizing on the trust DeepSeek has earned in the tech community. 

    One of the key tactics used by threat actors (TAs) involves mimicking the legitimate DeepSeek platform to launch crypto phishing attacks. These schemes involve fraudulent websites that closely resemble DeepSeek’s official site, tricking users into scanning QR codes that ultimately compromise their crypto wallets. Such scams are becoming increasingly common, with cybercriminals taking advantage of popular platforms like DeepSeek to lure users into unsafe situations. 

    Cyble has identified multiple fraudulent domains tied to these phishing campaigns, including: 

    • abs-register[.]com 
    • deep-whitelist[.]com 
    • deepseek-ai[.]cloud 
    • deepseek[.]boats 
    • deepseek-shares[.]com 
    • deepseek-aiassistant[.]com 
    • usadeepseek[.]com 

    These domains were linked to malicious efforts designed to extract users’ personal data, steal cryptocurrency, or promote fraudulent investment schemes. 

    The Growing Threat of Crypto Phishing 

    DeepSeek campaign
    Crypto phishing website impersonating DeepSeek (Source: Cyble)

    One of the most common phishing tactics identified is the use of QR codes to trick users into compromising their crypto wallets. By creating websites that resemble DeepSeek’s official platform, cybercriminals encourage users to connect their wallets, often through deceptive “Connect Wallet” buttons. When a user selects a wallet option, such as MetaMask or WalletConnect, the website prompts them to scan a QR code. However, this action redirects users to a fraudulent address, which ultimately gives cybercriminals access to the wallet and its contents. 

    DeepSeek Scams
    Phishing site displaying QR code (Source: Cyble)

    Two specific websites, abs-register[.]com and deep-whitelist[.]com, were flagged as part of this scheme. These phishing sites presented themselves as legitimate portals, luring unsuspecting crypto enthusiasts into connecting their wallets through a misleading interface. 

    The use of QR codes in phishing schemes is not new, but the rise of platforms like DeepSeek has amplified its effectiveness. By leveraging the credibility of a trending service, cybercriminals are increasingly able to deceive even the most cautious users into falling for these attacks. 

    Fake Investment Scams Exploit DeepSeek’s Popularity 

    In addition to phishing attacks, fraudsters have also used DeepSeek’s growing prominence to promote fake investment opportunities. One of the more interesting examples discovered by Cyble was the domain deepseek-shares[.]com, which was registered on January 29, 2025. This fraudulent website posed as an official DeepSeek investment platform, claiming to offer pre-IPO shares of the company. 

    Fake-investment-website
    Fake-investment-website (Source: Cyble)

    The problem with this claim is that DeepSeek is a privately held company, and no official initial public offering (IPO) announcements have been made. The website’s real purpose is to gather sensitive personal information from potential investors, which can later be exploited for phishing, identity theft, or financial fraud. 

    These types of investment scams are particularly dangerous because they prey on individuals eager to capitalize on the perceived success of a rapidly growing company. Fraudsters promise lucrative returns, but the goal is not to help investors profit—it’s to steal their personal data and funds. 

    Malware Campaigns Linked to DeepSeek 

    Beyond phishing and investment scams, there are also reports of malware campaigns taking advantage of DeepSeek’s rising influence. According to Cyble’s research, several malicious websites have been found claiming to offer legitimate DeepSeek app downloads for various platforms, including Windows, iOS, and Android. While some of these sites appear to be under development, others may serve as entry points for malware. 

    There have been reports of malware labeled AMOS Stealer, a type of credential-stealing software, being distributed through fraudulent DeepSeek-related downloads. This software can steal sensitive user data, including login credentials, and may even grant attackers full access to users’ online accounts. 

    To avoid falling victim to such attacks, users are advised to only download the DeepSeek app from official sources. Any websites offering third-party downloads should be approached with caution, as they may be attempting to deliver malicious software.

    Conclusion  

    As DeepSeek’s popularity continues to soar, so does the risk of cyber threats targeting its users, including phishing scams, fake investment schemes, and malware campaigns. To protect themselves, users must remain vigilant by verifying official sources, avoiding untrusted third-party websites and QR codes, and scrutinizing crypto projects before making any investments. They should also be cautious about unverified investment opportunities, as DeepSeek has not announced any official IPO or cryptocurrency launch. 

    Employing reputable security software, keeping systems up to date, and staying informed about phishing and malware tactics are also crucial steps. By following these best practices, individuals can protect their personal information and avoid falling victim to cybercriminals seeking to exploit DeepSeek’s success. 

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleItaly Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns
    Next Article Google Bans 158,000 Malicious Android App Developer Accounts in 2024

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    The Identities Behind AI Agents: A Deep Dive Into AI & NHI

    The Identities Behind AI Agents: A Deep Dive Into AI & NHI

    Development

    Design multi-agent orchestration with reasoning using Amazon Bedrock and open source frameworks

    Development

    Critical Langflow RCE flaw exploited to hack AI app servers

    Security

    Anthropic releases dataset that provides insight into how AI is influencing labor market

    Tech & Work

    Highlights

    Development

    Tosca vs Selenium: Making the Right Choice

    March 16, 2025

    Ensuring high-quality releases with minimal time and effort is more critical than ever. This is where automation testing steps in as a game-changer, significantly enhancing efficiency, accuracy, and speed. By automating repetitive and complex test scenarios, teams can accelerate development cycles, reduce human error, and achieve consistent outcomes. However, the effectiveness of automation largely depends
    The post Tosca vs Selenium: Making the Right Choice appeared first on Codoid.

    Boomi launches new API management solution to help companies deal with API sprawl

    February 19, 2025

    Laravel IDEA v10 is Here

    February 20, 2025

    CVE-2025-46520 – Alphasis Related Posts CSRF Stored XSS

    April 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.