Close Menu
Beginners AI Tools

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    The Challenges of Buying Low Cap Meme Coins on Coinbase

    May 31, 2025

    How to Buy Small Cap Meme Coins on the Solana Chain

    May 31, 2025

    What is Project 2025 – Deepseek says…

    May 8, 2025
    Facebook X (Twitter) Instagram
    Beginners AI ToolsBeginners AI Tools
    Facebook X (Twitter) Instagram YouTube
    • Home
    • AI Tools News
      • AI Tools for Content Creation
      • AI Tools for Productivity
      • AI Tools for Small Business
      • AI Tools for Health & Wellness
    • AI for Budgeting & Finance
      • AI for Marketing Automation
    • AI in E-commerce
    • AI Tools for Education
    Beginners AI Tools
    Home»AI Tools News»DeepSeek AI tools impersonated by infostealer malware on PyPI
    AI Tools News

    DeepSeek AI tools impersonated by infostealer malware on PyPI

    paulsmoneymakersBy paulsmoneymakersFebruary 3, 2025No Comments2 Mins Read
    DeepSeek AI tools impersonated by infostealer malware on PyPI
    Share
    Facebook Twitter LinkedIn Pinterest Email

    DeepSeek AI tools impersonated by infostealer malware on PyPI

    Threat actors are taking advantage of the rise in popularity of the DeepSeek to promote two malicious infostealer packages on the Python Package Index (PyPI), where they impersonated developer tools for the AI platform.

    The packages were named “deepseeek” and “deepseekai” after the Chinese artificial intelligence startup, developer of the R1 large-language model that recently saw a meteoric surge in popularity.

    Interestingly, the packages were uploaded by an “aged” account created in June 2023 with no prior activity. 

    According to Positive Technologies researchers who discovered the campaign and reported it to PyPI, the packages posing as Python clients for DeepSeek AI were infostealers that stole data from developers who utilized them.

    Once executed on the developer’s machine, the malicious payload stole user and system data as well as environment variables such as API keys, database credentials, and infrastructure access tokens.

    Next, the stolen information was exfiltrated to a command and control (C2) server at eoyyiyqubj7mquj.m.pipedream[.]net using Pipedream, a legitimate automation platform.

    Malicious payload
    Malicious payload contained in both packages
    Source: Positive Technologies

    Threat actors could use this stolen information to access cloud services, databases, and other protected resources utilized by the developer.

    “Functions used in these packages are designed to collect user and computer data and steal environment variables,” reads the Positive Technologies report.

    “The payload is executed when the user runs the commands deepseeek or deepseekai (depending on the package) in the command-line interface.”

    “Environment variables often contain sensitive data required for applications to run, for example, API keys for the S3 storage service, database credentials, and permissions to access other infrastructure resources.”

    Multiple victims

    The malicious packages, deepseeek 0.0.8 and deepseekai 0.0.8 were uploaded to PyPI on January 29, 2025, with only twenty minutes between them.

    deepseeek 0.0.8 ​​​​​​​PyPi listing
    deepseeek 0.0.8 PyPI listing
    Source: Positive Technologies

    Positive Technologies quickly discovered and reported them to PyPI, which quarantined and blocked downloads of the packages, followed by their complete deletion from the platform.

    Despite the quick detection and response, 222 developers downloaded the two packages, most from the United States (117), followed by China (36), Russia, Germany, Hong Kong, and Canada.

    Those developers who utilized these packages should immediately rotate their API keys, authentication tokens, and passwords, as they may now be compromised.

    Any cloud services whose credentials were stolen should also be checked to confirm they were not compromised as well.

    DeepSeek impersonated infostealer malware PyPI tools
    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    paulsmoneymakers

    Related Posts

    Creating TikTok and YouTube shorts using AI Tools: It almost feels like cheating :)

    March 9, 2025

    The future of AI in healthcare is dynamic—and demanding

    February 12, 2025

    Future AGI secures USD $1.6m to boost AI accuracy tools

    February 12, 2025

    Comments are closed.

    Latest Post
    Uncategorized

    The Challenges of Buying Low Cap Meme Coins on Coinbase

    By paulsmoneymakersMay 31, 20250

    Coinbase is a household name in crypto, known for its user-friendly interface and regulatory compliance.…

    How to Buy Small Cap Meme Coins on the Solana Chain

    May 31, 2025

    What is Project 2025 – Deepseek says…

    May 8, 2025

    Is Fiverr Worth It? My Honest Experience (And When to Use It)

    May 2, 2025

    Stress Relief Tips That Actually Work (From Someone Who’s Been There)

    May 2, 2025

    3 Essential Tips to Safeguard Your Online Purchases

    May 1, 2025

    Digital Products Stores Review – Is It Worth It? (Honest Breakdown)

    April 29, 2025

    💰📅 The Ultimate Roundup: 4 Must-Have Editable Planners

    April 9, 2025

    5 Best Printable Planners for Personal Growth, Moving, & Business (2025)

    April 7, 2025

    Editable & Printable Law of Attraction Planner Review: Manifest Your Dream Life with Ease

    April 7, 2025
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Terms and Conditions
    • Privacy Policy
    © 2025 beginnersaitools. Designed by Webworker.

    Type above and press Enter to search. Press Esc to cancel.