Quantcast
Channel: www.rivitmedia.com
Viewing all articles
Browse latest Browse all 1275

Fake DeepSeek Stealer

$
0
0

Cybercriminals have found a new way to exploit the rising popularity of AI technologies by distributing malware through a fake version of the DeepSeek website. DeepSeek AI, a Chinese company specializing in advanced language models, has gained recognition in the AI industry. However, threat actors are leveraging its name to spread a malicious information-stealing malware that targets unsuspecting users.

Understanding Fake DeepSeek Malware

Fake DeepSeek malware is an advanced information-stealer and Remote Access Trojan (RAT). The malicious campaign uses a counterfeit DeepSeek AI website to trick users into downloading a compromised installer. Once executed, the installer launches a Node.js script that carries out a series of stealthy commands, including decryption via AES-128-CBC encryption and persistent system infiltration.

One of the most concerning aspects of this malware is its use of Google Calendar as a communication channel. Dubbed the Google Calendar RAT, it utilizes shared calendar events to send and receive commands through event descriptions. This allows the malware to execute tasks while remaining under the radar of traditional security measures.

The primary goal of the malware is to steal cryptocurrency wallet data, particularly from platforms like MetaMask. However, it is suspected that the fake DeepSeek website could also distribute additional types of malware, such as ransomware, spyware, or other forms of data-stealing trojans.

Threat Summary Table

AttributeDetails
Threat NameMalicious DeepSeek Website
Threat TypeInformation Stealer, Remote Access Trojan (RAT)
Detection NamesAvast (Script:SNH-gen [Trj]), Combo Cleaner (Trojan.Generic.37420157), ESET-NOD32 (JS/Agent.SLB), Kingsoft (Win32.Troj.Undef.a), Sophos (Mal/Generic-S)
PayloadRAT (Remote Access Trojan), Cryptocurrency Stealer, Possible Ransomware or Keylogger
Symptoms of InfectionNo obvious symptoms; stealthy malware designed to avoid detection
Damage PotentialStolen passwords, banking credentials, identity theft, cryptocurrency theft, botnet enlistment
Distribution MethodsFake DeepSeek website, malicious email attachments, fake software downloads, social engineering, malicious advertisements
Danger LevelHigh

Comprehensive Removal Guide

Remove

Fake DeepSeek Stealer

With SpyHunter

To remove Fake DeepSeek malware effectively, follow these steps:

Step 1: Boot Your Computer in Safe Mode with Networking

  1. Restart your computer.
  2. Press F8 (or Shift + F8 on some systems) before Windows loads.
  3. Select Safe Mode with Networking and press Enter.

Step 2: Download and Install SpyHunter

  1. Download the latest version of SpyHunter.
  2. Run the installer and follow the on-screen instructions.

Step 3: Perform a Full System Scan

  1. Open SpyHunter after installation.
  2. Click on Start Scan to search for malicious files.
  3. Wait for the scan to complete, then review the detected threats.
  4. Click Fix Threats to remove the malware.

Step 4: Clear Browser and System Caches

  1. Open Google Chrome > Click Settings > Go to Privacy & Security > Click Clear Browsing Data.
  2. Open Windows Run (Win + R) > Type %temp% > Press Enter > Delete all files.

Step 5: Remove Suspicious Programs Manually

  1. Open Control Panel > Click Programs & Features.
  2. Look for unknown or recently installed suspicious applications.
  3. Click Uninstall and follow the prompts.

Step 6: Check and Remove Malicious Scheduled Tasks

  1. Open Task Scheduler (Win + R, then type taskschd.msc and press Enter).
  2. Look for unfamiliar scheduled tasks.
  3. Right-click and delete suspicious entries.

Step 7: Reset Your Browser Settings

  1. Open Chrome > Click Settings > Scroll to Reset Settings.
  2. Click Restore settings to their original defaults.

Step 8: Update Security Software and Change Passwords

  1. Ensure Windows Defender and SpyHunter are updated.
  2. Change all your online passwords, especially for cryptocurrency wallets and banking accounts.

Preventive Measures to Avoid Future Infections

  • Verify Websites Before Downloading Software – Always check the official source before downloading applications. Fake sites often have slight domain differences.
  • Enable Two-Factor Authentication (2FA) – Use 2FA on all sensitive accounts, including cryptocurrency wallets.
  • Keep Software and Operating System Updated – Update your OS and security software regularly.
  • Avoid Clicking on Suspicious Links – Be cautious with email attachments, unknown links, and online ads.
  • Use a Strong Antivirus Program – Having an active, updated security tool like SpyHunter can help prevent infections.
  • Monitor System Activity – Use tools like Task Manager or Process Explorer to detect unusual processes.
  • Check Google Calendar Access – Ensure no unknown apps or users have access to your Google Calendar.

By staying vigilant and using proactive security measures, users can defend against threats like the Fake DeepSeek malware and protect their sensitive data from cybercriminals. If you suspect your system is infected, take immediate action using the removal guide above.

Remove

Fake DeepSeek Stealer

With SpyHunter

The post Fake DeepSeek Stealer appeared first on www.rivitmedia.com.


Viewing all articles
Browse latest Browse all 1275

Trending Articles