Stay safe while using AI assistants

Issue 1 2025 Information Security, News & Events, AI & Data Analytics

The new DeepSeek AI assistant has attracted a lot of attention, but Kaspersky experts have also detected scam activity related to it.

Due to high numbers of new users and an alleged cyberattack on DeepSeek, there are glitches in the registration process on its app and website – many registrations cannot come through. Cybercriminals can use this situation to steal the credentials of users through fake DeepSeek web pages.

Attackers can collect users’ emails and passwords through such fake registration pages. These can be exploited to access users’ accounts – on DeepSeek or in other services (if the password is the same for multiple accounts).

There were also several new crypto tokens based on the DeepSeek hype available for sale. They are not officially tied to the DeepSeek brand; hence, their capitalisation is speculative.

Such scam schemes, like creating phishing emails, are quite widespread with popular AI models, and it’s important to recognise that cybercriminals will inevitably seek to exploit such tools for malicious purposes.

“What stands out in the case of DeepSeek is its open-source nature. While open-source frameworks foster transparency, collaboration, and innovation, they also introduce significant security and ethical risks. When using an open-source tool, you can’t always be sure how your data is being handled, especially if someone else has deployed it,” comments Leonid Bezvershenko, Security Researcher, Kaspersky GReAT.

“Exploitation of open-source software was a major trend in the threat landscape last year, with cybercriminals running complex campaigns to embed malware. In 2024, Kaspersky’s open-source scanner detected over 12 000 malicious packages in open repositories. Without centralised oversight, threat actors can start creating compromised versions of software or introduce backdoors under the guise of tools for using the API of DeepSeek, presenting serious risks to users and organisations.”

Kaspersky recommends the following tips to stay protected:

• Carefully check the addresses of pages asking for account credentials. Do not enter your password if there’s even the slightest suspicion that a website is fake.

• Make sure all your passwords are both strong and unique. It’s best to use a password manager to generate and store them.

• Always use two-factor authentication wherever possible.

• Use reliable protection for all your devices, desktop and mobile, to be protected from credential loss and malware.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...
Firexpo 2025 ignites interest in fire safety
Fire & Safety News & Events
Firexpo 2025 showcased fire detection, suppression, and safety tech, drawing professionals eager to explore innovations, gain insights, and connect with suppliers.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.