- False Deepseek websites appear and distribute malware
- The sites are followed by a huge promotion campaign on X
- The campaign has generated more than a million views, warn the experts
Cybercriminals take advantage of the media threshing surrounding the depth of Hot-Shot AI to encourage people to download malicious software, while elected a careful examination of security analysts, the experts warned.
Kaspersky researchers recently observed a sophisticated campaign made up of X -compromised accounts, coordinated bot activity and geofencing.
The researchers said that cybercriminals have created several websites to imitate the original Deepseek page. They set the pages in such a way that they analyzed the IP address of each visitor and modified the content dynamically, depending on the location of the visitor. In this way, they were able to display malicious content for some people and benign content to others.
The targets have been shown to false Deepseek software which gave attackers unauthorized remote access to their computers.
The pirates were also able to publish – steal an X account belonging to a legitimate Australian company and published content that promoted false websites. They used a network of X bots to comment and share content, generating more than a million views on the microblogging platform.
“Notable sophistication”
“This campaign demonstrates a notable sophistication beyond the typical attacks of social engineering,” said Vasily Kolesnikov, principal analyst of malware at Kaspersky Threat Research.
“The attackers exploited the current media threshing around the generative technology of AI, skillfully combining targeted geofencing, compromised commercial accounts and the amplification of orchestrated bots to reach a substantial audience while carefully moving the cybersecurity defenses.”
This is yet another proof that Internet Buzz does not translate into legitimacy. Cybercriminals improve to simulate commitment, inflate download numbers and write fraudulent positive criticisms.
To stay safe on the internet, you have to be vigilant at any time. Do not trust – check, should be the mantra, because the scam campaigns become more sophisticated and more difficult to spot.
Software must always be downloaded from legitimate sources, the URL of which must be meticulously checked. Finally, you must configure a security program and should keep its software up to date at any time.