• About
  • Advertise
  • Careers
  • Contact Us
Wednesday, June 18, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
ADVERTISEMENT
Home Business Security

DeepSneak: How Malware Posing as AI Assistant Steals User Data

by Destiny Eseaga
June 17, 2025
in Security
0
DeepSeek and AI malware
DeepSeek | AI malware

DeepSeek | AI malware

UBA
Advertisements

Kaspersky Global Research & Analysis Team researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

The previously unknown malware is delivered via a phishing site pretending to be the official DeepSeek homepage that is promoted via Google Ads.

The goal of the attacks is to install BrowserVenom, a malware that configures web browsers on the victim’s device to channel web traffic through the attackers servers, thus allowing to collect user data – credentials and other sensitive information.

Multiple infections have been detected in Brazil, Cuba, Mexico, India, Nepal, South Africa and Egypt.

DeepSeek-R1 is one of the most popular LLMs right now, and Kaspersky has previously reported attacks with malware mimicking it to attract victims.

DeepSeek can also be run offline on PCs using tools like Ollama or LM Studio, and attackers used this in their campaign.

Users were directed to a phishing site mimicking the address of the original DeepSeek platform via Google Ads, with the link showing up in the ad when a user searched for “deepseek r1”. Once the user reached the fake DeepSeek site, a check was performed to identify the victim’s operating system.

If it was Windows, the user was presented with a button to download the tools for working with the LLM offline. Other operating systems were not targeted at the time of research.

Malicious website mimicking DeepSeek.
Advertisements
MTN ADS
DeepSeek | AI malware

After clicking on the button and passing the CAPTCHA test, a malicious installer file was downloaded and the user was presented with options to download and install Ollama or LM Studio.

If either option was chosen, along with legitimate Ollama or LM Studio installers, malware got installed in the system bypassing Windows Defender’s protection with a special algorithm.

This procedure also required administrator privileges for the user profile on Windows; if the user profile on Windows did not have these privileges, the infection would not take place.

DeepSeek | AI malware
Two options to install abused LLM frameworks.

After the malware was installed, it configured all web browsers in the system to forcefully use a proxy controlled by the attackers, enabling them to spy on sensitive browsing data and monitor the victim’s browsing activity.

Because of its enforcing nature and malicious intent, Kaspersky researchers have dubbed this malware BrowserVenom.

“While running large language models offline offers privacy benefits and reduces reliance on cloud services, it can also come with substantial risks if proper precautions aren’t taken. Cybercriminals are increasingly exploiting the popularity of open-source AI tools by distributing malicious packages and fake installers that can covertly install keyloggers, cryptominers, or infostealers. These fake tools compromise a user’s sensitive data and pose a threat, particularly when users have downloaded them from unverified sources,” comments Lisandro Ubiedo, security researcher with Kaspersky’s Global Research & Analysis Team.

To avoid such threats, Kaspersky recommends:

  • Check the addresses of the websites to verify that they are genuine and to avoid a scam.
  • Download offline LLM tools only from official sources (e.g., ollama.com, lmstudio.ai).
  • Avoid using Windows on a profile with admin privileges.
  • Use trusted cyber security solutions to prevent malicious files from launching.

Loading

0Shares
Tags: cryptominersGoogle AdsinfostealersLLM
Destiny Eseaga

Destiny Eseaga

My name is Destiny Eseaga, a communication strategist, journalist, and researcher, deeply intrigued by the political economy of Nigeria and the broader world context. My passion lies in the world of finance, particularly, capital markets, investment banking, market intelligence, etc

Next Post
Lagos State Innovation Bill Stakeholders engagement

Lagos Deepens Stakeholder Engagement on Innovation Bill With Future Forward Framework

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

9mobile SERAS Award 2022

SERAS 2022: 9mobile Bags Africa Prize for Innovation Award Back-To-Back

2 years ago

FBNQuest Merchant Bank and USAID to Support Youth-Powered Ecosystem

3 years ago

Popular News

    Connect with us

    • About
    • Advertise
    • Careers
    • Contact Us

    © 2017 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Mobility
      • Environment
      • Travel
      • StartUPs
    • Economy
    • TECHECONOMY TV
    • TBS
    • About Us
    • Contact Us

    © 2017 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.