Deepseek: How do cybercriminals take advantage of the rise of Chinese artificial intelligence to send malware?

The rise of the tool artificial intelligence DeepSeek Not only has it caused high interest in the world of technology and world markets, it has also done so with cybercriminals, who do not miss such a chance to continue with their chaotic end. A massive malware distribution campaign has been detected, malicious software designed to damage or exploit any programmable device, service or network

It should be remembered that the generative AI of Chinese origin surprises with its efficiency and low cost. A few days since its launch, DeepSeek It has managed to be the most downloaded app in App Store, the Apple apps store.

The Chinese start-up, with its R1 conversational robot, marked a brilliant entry into the world-year-old world scene and caused the fall of stock assessments of several US giants, including the Nvidia chip manufacturer.

This AI tool can perform functions such as answering questions, helping with academic tasks, writing assistance, language translation, programming help, information search and more.

Cybercriminals usually use these waves of digital content to facilitate deception to their prey. “The topics tendency are used to make the most convincing attacks. The victims, for example, will receive information that is discussed daily in any field with which it will not be suspicious ”explains Fabiana Ramírez, security researcher at ESET Latin America.

Once it falls into this type of deception, the risks can be different. From the infection with malicious software, filtration of personal information, theft, impersonation of identity and even financial losses in case of providing banking data or making erogations because of a hoax, ”adds the specialist.

According to Adrianus Warmenhoven, an expert in cybersecurity in Nordvpn, as IA platforms become more sophisticated, they also become main objectives for computer pirates who seek to exploit user data or AI themselves.

Ramírez explains that AI has strengths and weaknesses such as all technology and, like any system, it will never be completely safe. “Security is composed of several factors, technical, design, policies and even the way in which users implement the technology in question,” he concludes.

Next, eight ESET recommendations to protect us from these new threats from false sites:

  • – Verify the URL to check the legitimate and not a similar one.
  • – Avoid downloading suspicious files and running them.
  • – Use robust passwords and double authentication factor to add an extra safety layer and protect against undue access.
  • – Always keep applications, software and operating systems updated to the latest version to have security patches and protect against known vulnerabilities.
  • – Stay informed about technology trends and good cybersecurity practices.
  • – Have a reliable security solution on devices to minimize the chances of being a victim of these deceptions.
  • – Be prudent when sharing private or sensitive information.

By Editor

Leave a Reply