logo
New malware posing as an AI assistant steals user data

New malware posing as an AI assistant steals user data

Biz Bahrain2 days ago

Kaspersky Global Research & Analysis Team researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs. The previously unknown malware is delivered via a phishing site pretending to be the official DeepSeek homepage that is promoted via Google Ads. The goal of the attacks is to install BrowserVenom, a malware that configures web browsers on the victim's device to channel web traffic through the attackers servers, thus allowing to collect user data – credentials and other sensitive information. Multiple infections have been detected in Brazil, Cuba, Mexico, India, Nepal, South Africa and Egypt. DeepSeek-R1 is one of the most popular LLMs right now, and Kaspersky has previously reported attacks with malware mimicking it to attract victims. DeepSeek can also be run offline on PCs using tools like Ollama or LM Studio, and attackers used this in their campaign.
Users were directed to a phishing site mimicking the address of the original DeepSeek platform via Google Ads, with the link showing up in the ad when a user searched for 'deepseek r1'. Once the user reached the fake DeepSeek site, a check was performed to identify the victim's operating system. If it was Windows, the user was presented with a button to download the tools for working with the LLM offline. Other operating systems were not targeted at the time of research.
After clicking on the button and passing the CAPTCHA test, a malicious installer file was downloaded and the user was presented with options to download and install Ollama or LM Studio. If either option was chosen, along with legitimate Ollama or LM Studio installers, malware got installed in the system bypassing Windows Defender's protection with a special algorithm. This procedure also required administrator privileges for the user profile on Windows; if the user profile on Windows did not have these privileges, the infection would not take place.
After the malware was installed, it configured all web browsers in the system to forcefully use a proxy controlled by the attackers, enabling them to spy on sensitive browsing data and monitor the victim's browsing activity. Because of its enforcing nature and malicious intent, Kaspersky researchers have dubbed this malware BrowserVenom. 'While running large language models offline offers privacy benefits and reduces reliance on cloud services, it can also come with substantial risks if proper precautions aren't taken. Cybercriminals are increasingly exploiting the popularity of open-source AI tools by distributing malicious packages and fake installers that can covertly install keyloggers, cryptominers, or infostealers. These fake tools compromise a user's sensitive data and pose a threat, particularly when users have downloaded them from unverified sources,' comments Lisandro Ubiedo, Security Researcher with Kaspersky's Global Research & Analysis Team. To avoid such threats, Kaspersky recommends: • Check the addresses of the websites to verify that they are genuine and avoid scam. • Download offline LLM tools only from official sources (e.g., ollama.com, lmstudio.ai). • Avoid using Windows on a profile with admin privileges.
• Use trusted cyber security solutions to prevent malicious files from launching.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

New malware posing as an AI assistant steals user data
New malware posing as an AI assistant steals user data

Biz Bahrain

time2 days ago

  • Biz Bahrain

New malware posing as an AI assistant steals user data

Kaspersky Global Research & Analysis Team researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs. The previously unknown malware is delivered via a phishing site pretending to be the official DeepSeek homepage that is promoted via Google Ads. The goal of the attacks is to install BrowserVenom, a malware that configures web browsers on the victim's device to channel web traffic through the attackers servers, thus allowing to collect user data – credentials and other sensitive information. Multiple infections have been detected in Brazil, Cuba, Mexico, India, Nepal, South Africa and Egypt. DeepSeek-R1 is one of the most popular LLMs right now, and Kaspersky has previously reported attacks with malware mimicking it to attract victims. DeepSeek can also be run offline on PCs using tools like Ollama or LM Studio, and attackers used this in their campaign. Users were directed to a phishing site mimicking the address of the original DeepSeek platform via Google Ads, with the link showing up in the ad when a user searched for 'deepseek r1'. Once the user reached the fake DeepSeek site, a check was performed to identify the victim's operating system. If it was Windows, the user was presented with a button to download the tools for working with the LLM offline. Other operating systems were not targeted at the time of research. After clicking on the button and passing the CAPTCHA test, a malicious installer file was downloaded and the user was presented with options to download and install Ollama or LM Studio. If either option was chosen, along with legitimate Ollama or LM Studio installers, malware got installed in the system bypassing Windows Defender's protection with a special algorithm. This procedure also required administrator privileges for the user profile on Windows; if the user profile on Windows did not have these privileges, the infection would not take place. After the malware was installed, it configured all web browsers in the system to forcefully use a proxy controlled by the attackers, enabling them to spy on sensitive browsing data and monitor the victim's browsing activity. Because of its enforcing nature and malicious intent, Kaspersky researchers have dubbed this malware BrowserVenom. 'While running large language models offline offers privacy benefits and reduces reliance on cloud services, it can also come with substantial risks if proper precautions aren't taken. Cybercriminals are increasingly exploiting the popularity of open-source AI tools by distributing malicious packages and fake installers that can covertly install keyloggers, cryptominers, or infostealers. These fake tools compromise a user's sensitive data and pose a threat, particularly when users have downloaded them from unverified sources,' comments Lisandro Ubiedo, Security Researcher with Kaspersky's Global Research & Analysis Team. To avoid such threats, Kaspersky recommends: • Check the addresses of the websites to verify that they are genuine and avoid scam. • Download offline LLM tools only from official sources (e.g., • Avoid using Windows on a profile with admin privileges. • Use trusted cyber security solutions to prevent malicious files from launching.

Kaspersky discovers multiple IoT devices targeted with a new Mirai botnet version
Kaspersky discovers multiple IoT devices targeted with a new Mirai botnet version

Biz Bahrain

time5 days ago

  • Biz Bahrain

Kaspersky discovers multiple IoT devices targeted with a new Mirai botnet version

Kaspersky Global Research & Analysis Team (GReAT) researchers have found multiple IoT devices targeted with a new version of the Mirai botnet. The majority of attacked devices were located in China, Egypt, India, Brazil, Turkiye and Russia. Mirai remains one of the top threats to IoT in 2025 due to widespread exploitation of weak login credentials and unpatched vulnerabilities, enabling large-scale botnets for DDoS attacks, data theft and other malicious activities. According to Kaspersky research, there were 1.7 billion attacks on IoT devices (including those made with Mirai) coming from 858,520 devices globally in 2024. 45,708 attacks on IoT devices (including those made with Mirai) were launched from UAE in 2024, which is 54% more than in 2023. To explore IoT attacks, how such attacks are carried out and how to prevent them, Kaspersky set up so called honeypots – decoy devices used to attract the attention of the attackers and analyze their activities. In the honeypots Kaspersky detected the exploitation of the CVE-2024-3721 vulnerability to deploy a bot – it turned out to be a Mirai botnet modification. A botnet is a network of compromised devices infected by malware to perform coordinated malicious activities under the control of an attacker. This time, the focus of the attacks were digital video recorders (DVRs) – these devices are integral to security and surveillance across multiple sectors. They record footage from cameras to monitor homes, retail stores, offices and warehouses, as well as factories, airports, train stations and educational institutions, to enhance public safety and secure critical infrastructure. Attacks on DVR devices can compromise privacy, but beyond that, they can serve as entry points for attackers to infiltrate broader networks, spreading malware and creating botnets to launch DDoS attacks, as seen with Mirai. The discovered DVR bot includes mechanisms to detect and evade virtual machine (VM) environments or emulators commonly used by security researchers to analyze malware. These techniques help the bot avoid detection and analysis, allowing it to operate more stealthily and remain active on infected devices. 'The source code of the Mirai botnet was shared on the internet nearly a decade ago, and since then, it has been adapted and modified by various cybercriminal groups to create large-scale botnets mostly focused on DDoS and resource hijacking. Exploiting known security flaws in IoT devices and servers that haven't been patched, along with the widespread use of malware targeting Linux-based systems, leads to a significant number of bots constantly searching the internet for devices to infect. By analyzing public sources we identified over 50,000 exposed DVR devices online, indicating that attackers have numerous opportunities to target unpatched, vulnerable devices,' comments Anderson Leite, Security Researcher with Kaspersky's GReAT. To reduce the risk of IoT device infection, users should: • Change default credentials and use strong, unique passwords. • Regularly update DVR firmware to patch known vulnerabilities. • Disable remote access if unnecessary or use secure VPNs for management. • Segment DVRs on isolated networks. • Monitor for unusual network traffic to detect potential compromises. Read more about the latest Mirai wave at

Doug Burgum Warns AI Race Winner Will 'Control the World'
Doug Burgum Warns AI Race Winner Will 'Control the World'

Gulf Insider

time27-05-2025

  • Gulf Insider

Doug Burgum Warns AI Race Winner Will 'Control the World'

Doug Burgum, the soft-spoken Interior secretary responsible for managing the more than 507 million acres of federally owned land, is haunted by a fear that seems, at first glance, outside his mandate. He worries the free world will lose dominance in the field of artificial intelligence, and with it, the future. So does the president. 'When President Trump declared a national emergency on his first day in office it was, in large part, because of what we're facing with our electrical grid and making sure that we've got enough power to be able to win the AI arms race with China,' Burgum said Wednesday in remarks first reported by RealClearPolitics. 'That is absolutely critical.' Thus the stated policy of this White House: 'It's called drill, baby, drill,' Trump said earlier this spring. The immediate goal, the one touted at every campaign, is to bring down the average price of a gallon of gas. The concurrent and long-term mission that Burgum obsesses over: AI dominance. The former governor from fracking-friendly North Dakota and tech entrepreneur who sold his software to Microsoft, Burgum laid out an abbreviated formula on stage at the America First Policy Institute. Electricity generation via fossil fuels, like natural gas and coal, powers data centers 'filled with these amazing chips,' the secretary said, 'and you know what comes out the other side? Intelligence. A data center is literally manufacturing intelligence.' He envisioned a new world that follows, where the best computer programmer, or the most brilliant lawyers, could 'clone themselves' again and again to train AI models to do the work of thousands in a process 'that can be repeated indefinitely.' No longer science fiction, the process has been headline news for some time. AI models like ChatGPT and X's Grok are already available in every home with an internet connection. And the U.S. was the undisputed leader. That is, until recently. American tech companies enjoyed a clear edge with not just the most powerful AI models, the most funding, and top engineering talent, but also the easiest access to those 'amazing chips' that Burgum referenced. Former President Biden banned the export of the most advanced semiconductors to China. And yet DeepSeek, an unknown Chinese startup with less money and allegedly less sophisticated chips, still managed to one-up Silicon Valley earlier this year with a more powerful AI model. The latest development in the battle for tech supremacy, in what some likened to 'a Sputnik moment,' the DeepSeek launch rattled both markets and geopolitics. A new kind of AI nationalism now consumes heads of state convinced that their nations must develop their own technology or fall behind in the future. Said Russian President Vladimir Putin in 2017 of AI, 'The one who becomes the leader in this sphere will be the ruler of the world.' Burgum does not disagree. He would just prefer the West take on that role. 'Trust me, you do not want to be getting your data from a Chinese data center,' he told the crowd, adding that 'Whoever controls the manufacture of intelligence is going to control the world. The next five years is going to determine the next 50.' This is the goal of the White House, including Vice President JD Vance, who once warned that falling behind on this front could mean that the U.S. meets China 'on the battlefield of the future' with the equivalent of digital 'muskets.' Democrats on Capitol Hill are not thrilled. The day before, Maine Rep. Marie Pingree complained in the House Appropriations Committee that Burgum had gutted the department he leads and sought to slash Biden-era clean energy tax credits. 'In just four months, the department has been destabilized, and there's been a stunning decline in its ability to meet its mission,' she told Burgum. 'This disregards the climate change concerns that we have.' The secretary replied that he was concerned with a more pressing order of operations. 'The existential threats that this administration is focusing on are Iran cannot get a nuclear weapon, and we can't lose the AI arms race to China,' Burgum said in committee. 'That's the number one and two. If we solve those two things, then we will have plenty of time to solve any issues related to potential temperature change.' His immediate focus, then, is on how the U.S. can boost energy production. Burgum reported that industry leaders tell him electricity demand will soon outpace supply with astronomical numbers measured not in megawatts, but gigawatts. The power needed to run one data center, he said, would be equivalent to the electricity needs of Denver times 10. Because AI has the potential to supercharge nearly every business, he said, 'the demand for this product is like nothing we've ever seen in our lives.' Concluded the Interior secretary, 'The fundamental principles here again, as they say, we're going to sell energy to our friends and allies, and we're going to have enough energy here at home to be able to win the AI arms race. And this requires electricity.' On this Burgum and Trump are simpatico. During the campaign, the president likened artificial intelligence to 'the oil of the future.' Also read: Iran Issues Surprisingly Optimistic Statement After Latest US Nuclear Talks

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store