
Image by Solen Feyissa, from Unsplash
Google Ads Used To Spread Fake DeepSeek Malware
Cybersecurity researchers have identified a dangerous new malware campaign, which targets s of the popular AI chatbot DeepSeek-R1.
In a rush? Here are the quick facts:
- Fake DeepSeek-R1 websites are spreading malware through Google Ads.
- Victims a malicious installer disguised as a chatbot.
- Malware installs “BrowserVenom,” which hijacks and monitors web traffic
Cybersecurity researchers at Google Ads to promote a fake version of the site, taking advantage of the model’s popularity to trick s into ing harmful software.
The malicious ad directs s to ‘‘deepseek-platform[.]com’’ – a fake website that mimics the official DeepSeek site. s who click the “Try now” button are presented with a fake CAPTCHA before being asked to what appears to be the DeepSeek installer. The file, named ‘‘AI_Launcher_1.21.exe’’, is actually a sophisticated malware chain.
The installer opens a second fake CAPTCHA, then offers to install known AI tools like Ollama and LM Studio. But in the background, it runs hidden code that begins the infection. First, it tries to by antivirus software by excluding the ’s folder from Windows Defender. Then, it attempts to more malware from another untrustworthy domain.
The final payload, known as BrowserVenom, modifies browser configurations to redirect all web traffic through proxy servers operated by the attackers. This allows them to monitor data and online activities. The malware adds a fake certificate to the system while modifying browser shortcuts and settings in Firefox and Tor.
The researchers note that he attack has already targeted s in Brazil, Cuba, Mexico, India, Nepal, South Africa, and Egypt.
“As we have been reporting, DeepSeek has been the perfect lure for attackers to attract new victims,” researchers said. They warn s to double-check website URLs and certificates before ing software, even from search results, to avoid falling into these traps.
Leave a Comment
Cancel