Kaspersky uncovers sophisticated deception campaign using DeepSeek AI as bait
Security researchers
at Kaspersky have revealed how cybercriminals used geofencing, compromised
business accounts and coordinated bot networks to distribute malware disguised
as DeepSeek AI software, generating over 1.2 million views on X.
Kaspersky's Threat
Research and AI Technology Research have jointly identified a sophisticated
deception campaign exploiting the rapid growth and public interest surrounding
DeepSeek AI — a popular generative AI chatbot — in order to distribute malware
through fraudulent websites.
In their investigation, Kaspersky
researchers revealed that cybercriminals established deceptive replicas of the
official DeepSeek website, using domain names like
"deepseek-pc-ai[.]com" and "deepseek-ai-soft[.]com." A
distinctive feature of this campaign was its use of geofencing technology,
where malicious websites examine each visitor's IP address and dynamically
alter content presentation based on geographic location, enabling attackers to
fine-tune their approach and reduce detection risks.
"This campaign demonstrates notable sophistication beyond
typical social engineering attacks," explained Vasily Kolesnikov, senior
malware analyst at Kaspersky Threat Research. "Attackers exploited the
current hype around generative AI technology, skillfully combining targeted
geofencing, compromised business accounts and orchestrated bot amplification to
reach a substantial audience while carefully evading cybersecurity
defenses."
In their investigation, Kaspersky
researchers revealed that cybercriminals established deceptive replicas of the
official DeepSeek website, using domain names like
"deepseek-pc-ai[.]com" and "deepseek-ai-soft[.]com." A
distinctive feature of this campaign was its use of geofencing technology,
where malicious websites examine each visitor's IP address and dynamically
alter content presentation based on geographic location, enabling attackers to
fine-tune their approach and reduce detection risks.
"This campaign demonstrates notable sophistication beyond
typical social engineering attacks," explained Vasily Kolesnikov, senior
malware analyst at Kaspersky Threat Research. "Attackers exploited the
current hype around generative AI technology, skillfully combining targeted
geofencing, compromised business accounts and orchestrated bot amplification to
reach a substantial audience while carefully evading cybersecurity
defenses."
According to Kaspersky's analysis, the campaign's primary
distribution channel was the social media platform X. Attackers strategically
compromised the social media account of a legitimate Australian company to
widely disseminate fraudulent links. This single malicious post drew
significant attention, reaching approximately 1.2 million impressions and
generating hundreds of reposts. Researchers determined that these reposts
largely originated from coordinated bot accounts — evident due to their similar
naming conventions and profile characteristics — indicating a deliberate
amplification of the malicious content.
Leave A Comment