{"id":53116,"date":"2025-03-06T05:02:05","date_gmt":"2025-03-06T10:02:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53116"},"modified":"2025-03-06T05:02:05","modified_gmt":"2025-03-06T10:02:05","slug":"trojans-disguised-as-deepseek-grok-clients","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/53116\/","title":{"rendered":"Trojans masquerading as DeepSeek and Grok clients"},"content":{"rendered":"<p>In early 2025, the Chinese chatbot, DeepSeek, burst onto the AI scene. It provoked much comment and controversy across the globe: we could hardly fail to spot the <a href=\"https:\/\/www.linkedin.com\/posts\/eugenekaspersky_hey-deepseek-ai-according-to-our-brand-guidelines-activity-7293275069768716288-gkWx\" target=\"_blank\" rel=\"nofollow noopener\">similarity of its logo to our own<\/a>, <a href=\"https:\/\/www.geeksforgeeks.org\/deepseek-vs-chatgpt\/\" target=\"_blank\" rel=\"nofollow noopener\">comparisons with ChatGPT were abundant<\/a>, and in Italy, South Korea, Australia, and other countries, <a href=\"https:\/\/www.aljazeera.com\/news\/2025\/2\/6\/which-countries-have-banned-deepseek-and-why#:~:text=DeepSeek%20is%20banned%20on%20government,South%20Korea%2C%20Australia%20and%20Taiwan.\" target=\"_blank\" rel=\"nofollow noopener\">DeepSeek was blocked altogether<\/a>. The hype was \u2014 and remains \u2014 intense, including among cybercriminals.<\/p>\n<p>We\u2019ve discovered several groups of sites mimicking the official chatbot website and distributing malicious code under the guise of what appears to be a legitimate client. To find out exactly how these cybervillains operate, and how to use AI safely, read on\u2026<\/p>\n<h2>Malicious scripts and geofencing<\/h2>\n<p>Several malware distribution schemes were detected, all of which had the use of fake DeepSeek websites as the common denominator. The difference lies in what was distributed through these sites and how. This post thoroughly explores one of these schemes; for details on the others, see <a href=\"https:\/\/securelist.com\/backdoors-and-stealers-prey-on-deepseek-and-grok\/115801\/\" target=\"_blank\" rel=\"noopener\">our full report on Securelist<\/a>.<\/p>\n<p>What would you think if you landed on a website with the domain <em>deepseek-pc-ai[.]com<\/em> or <em>deepseek-ai-soft[.]com<\/em>? You\u2019d probably assume you could find there some DeepSeek-related software. And what kind of software might that be? A DeepSeek client, of course! And indeed, you\u2019ll quickly see the bright <strong>Download<\/strong> and slightly duller <strong>Start Now<\/strong> buttons that greet visitors to the site.<\/p>\n<div id=\"attachment_53135\" style=\"width: 1214px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/03\/06044940\/trojans-disguised-as-deepseek-grok-clients-01.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53135\" class=\"size-full wp-image-53135\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/03\/06044940\/trojans-disguised-as-deepseek-grok-clients-01.jpg\" alt=\"Fake DeepSeek web page\" width=\"1204\" height=\"484\"><\/a><p id=\"caption-attachment-53135\" class=\"wp-caption-text\">Fake DeepSeek web page<\/p><\/div>\n<p>Whichever of these buttons you click, an installer starts downloading. But there\u2019s a catch: once initiated, instead of installing DeepSeek, the installer accesses malicious URLs, and manipulates scripts to activate the SSH service in Windows to configure it to work with the attackers\u2019 keys. This enables them to remotely connect to the victim\u2019s computer, who doesn\u2019t even get a DeepSeek Windows client as consolation\u2026 which, by the way, doesn\u2019t exist.<\/p>\n<p>Interestingly, the fake sites use <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/geofencing\/\" target=\"_blank\" rel=\"noopener\">geofencing<\/a> \u2014 restricting access based on the region of the IP address. For example, users from Russia on these domains saw a simple stub site with empty texts about DeepSeek \u2014 most likely generated by DeepSeek itself or a different <a href=\"https:\/\/securelist.com\/llm-phish-blunders\/114367\/\" target=\"_blank\" rel=\"noopener\">large language model<\/a>. Visitors from other countries, however, were taken to the malicious site distributing the fake client.<\/p>\n<h2>A million views on X<\/h2>\n<p>The main vector for distributing links to the malicious URLs was posts on the social network X (formerly Twitter). One of the most popular posts (now deleted) was published from the account of Australian startup Lumina Vista, which, <a href=\"https:\/\/www.linkedin.com\/company\/lumina-vista\" target=\"_blank\" rel=\"nofollow noopener\">open sources say<\/a>, has no more than 10 employees. The company\u2019s account itself is in its infancy: it only got the coveted blue check-mark in February 2025, and boasts just a dozen posts and fewer than 100 subscribers. Yet the post promoting the fake DeepSeek site garnered 1.2 million views and more than 100 reposts. Bit fishy? We investigated the accounts that reposted it and concluded that they could be bots, since all use the same naming convention and identifiers in the bio section. Incidentally, it\u2019s quite possible that Lumina Vista\u2019s account was simply hacked and used for paid promotion of the attackers\u2019 ad post.<\/p>\n<div id=\"attachment_53134\" style=\"width: 595px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/03\/06044810\/trojans-disguised-as-deepseek-grok-clients-02.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53134\" class=\"wp-image-53134 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/03\/06044810\/trojans-disguised-as-deepseek-grok-clients-02.jpg\" alt=\"1.2 million views in a near-empty account? Smells like paid promotion\" width=\"585\" height=\"699\"><\/a><p id=\"caption-attachment-53134\" class=\"wp-caption-text\">1.2 million views in a near-empty account? Smells like paid promotion<\/p><\/div>\n<p>In the comments, some users pointed out that the link leads to a malicious site, but they were in the minority \u2014 the rest were simply expressing views about DeepSeek, Grok, and ChatGPT. However, none of the commenters noted the obvious: DeepSeek has no native client for Windows, and you can only access it in a browser. You can also run DeepSeek <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-ai-locally-and-securely\/50576\/\" target=\"_blank\" rel=\"noopener nofollow\">locally<\/a> but that requires specialized software.<\/p>\n<h2>How to use AI safely<\/h2>\n<p>At present, it\u2019s not easy to assess the scale of this and other malicious schemes involving fake DeepSeek pages. But one thing is for certain: these campaigns are massive and not targeted at specific users. Yet they\u2019re developing very quickly: soon after the announcement of Grok-3, attackers began offering to download its client both from the domain <em>v3-grok[.]com<\/em>, and from\u2026 <em>v3-deepseek[.]com<\/em>! Indeed, Grok, DeepSeek \u2013 what\u2019s the difference?\u2026<\/p>\n<p>Without <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">reliable protection<\/a>, any AI enthusiast is at risk. That\u2019s why it\u2019s vital to follow the safety rules and recommendations when using AI.<\/p>\n<ul>\n<li><strong>Check the <\/strong><a href=\"https:\/\/www.kaspersky.com\/blog\/lookalike-domains-in-bec\/48686\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>URLs of websites you visit<\/strong><\/a><strong>.<\/strong> Especially when it\u2019s something new, popular, and easy to spoof.<\/li>\n<li><strong>Filter sensitive data. <\/strong>Remember that what you write to a chatbot could be used against you: as with other cloud services, data can leak due to <a href=\"https:\/\/www.wiz.io\/blog\/wiz-research-uncovers-exposed-deepseek-database-leak\" target=\"_blank\" rel=\"nofollow noopener\">security flaws<\/a> or <a href=\"https:\/\/dfi.kaspersky.com\/blog\/ai-in-darknet\" target=\"_blank\" rel=\"noopener nofollow\">account hacking<\/a>.<\/li>\n<li><strong>Protect your devices. <\/strong>Check out the <a href=\"https:\/\/www.kaspersky.com\/top3\" target=\"_blank\" rel=\"noopener nofollow\">reviews<\/a> and choose the <a href=\"https:\/\/www.kaspersky.com\/home-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">best solution for you<\/a>\u00a0that will spot <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-protect-yourself-from-phishing\/42317\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing sites<\/a> and guard against downloading malware.<\/li>\n<li><strong>Limit the use of third-party plugins. <\/strong>Every add-on app creates new threats. Special monitoring is required for execution plug-ins that can, for example, run <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-chatgpt-ai-assistants-securely-2024\/50562\/\" target=\"_blank\" rel=\"noopener nofollow\">malicious code<\/a> to buy a plane ticket at your expense.<\/li>\n<\/ul>\n<blockquote><p>If you\u2019re seriously interested in neural networks and want to learn how to use them safely, check out these posts:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-chatgpt-ai-assistants-securely-2024\/50562\/\" target=\"_blank\" rel=\"noopener nofollow\">How to use ChatGPT, Gemini, DeepSeek and other AI securely<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-use-ai-locally-and-securely\/50576\/\" target=\"_blank\" rel=\"noopener nofollow\">How to install and use an AI assistant on your computer<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ai-chatbot-side-channel-attack\/51064\/\" target=\"_blank\" rel=\"noopener nofollow\">How hackers can read your chats with ChatGPT or Microsoft Copilot<\/a><\/li>\n<li>\u2026 and <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/ai\/\" target=\"_blank\" rel=\"noopener nofollow\">many others<\/a>.<\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>We found several groups of sites mimicking official websites of the DeepSeek and Grok chatbots. Fake sites distribute malware under the guise of non-existent chatbot clients for Windows.<\/p>\n","protected":false},"author":2706,"featured_media":53131,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[1140,960,1779,3212,97],"class_list":{"0":"post-53116","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-ai","10":"tag-artificial-intelligence","11":"tag-chatbots","12":"tag-neural-networks","13":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/53116\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/trojans-disguised-as-deepseek-grok-clients\/28646\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/23886\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/12314\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/trojans-disguised-as-deepseek-grok-clients\/28764\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/27985\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/trojans-disguised-as-deepseek-grok-clients\/30809\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/trojans-disguised-as-deepseek-grok-clients\/29500\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/trojans-disguised-as-deepseek-grok-clients\/39163\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/trojans-disguised-as-deepseek-grok-clients\/13205\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/trojans-disguised-as-deepseek-grok-clients\/22630\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/trojans-disguised-as-deepseek-grok-clients\/23635\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/trojans-disguised-as-deepseek-grok-clients\/31999\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/trojans-disguised-as-deepseek-grok-clients\/37479\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/trojans-disguised-as-deepseek-grok-clients\/28900\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/trojans-disguised-as-deepseek-grok-clients\/34714\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/trojans-disguised-as-deepseek-grok-clients\/34342\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ai\/","name":"AI"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53116"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53116\/revisions"}],"predecessor-version":[{"id":53133,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53116\/revisions\/53133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53131"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}