DeepSeek Exposes Sensitive Data

An audit of DeepSeek's mobile app for the Apple iOS operating system has found serious security issues, the most important being that that it sends sensitive data over the Internet without any encryption, exposing it to interception and manipulative attacks.

The research carried out by NowSecure, also found that the app fails to adhere to best security practices and that it collects extensive user and device data.  "The DeepSeek iOS app sends some mobile app registration and device data over the Internet without encryption," the company has said. 

"This exposes any data in the Internet traffic to both passive and active attacks." the report observes.

NowSecure researchers also found several implementation weaknesses when it comes to applying encryption on user data. This includes the use of an insecure symmetric encryption algorithm (3DES), a hard-coded encryption key, and the reuse of initialisation vectors. What's more, the data is sent to servers that are managed by a cloud compute and storage platform named Volcano Engine, which is owned by ByteDance, the Chinese company that also operates TikTok. "The DeepSeek iOS app globally disables App Transport Security (ATS) which is an iOS platform level protection that prevents sensitive data from being sent over unencrypted channels,"

NowSecure said. "Since this protection is disabled, the app can (and does) send unencrypted data over the internet."

The findings add to an increasing list of concerns that have been raised around the DeepSeek AI) chatbot service, since it jumped to the top of the app store charts on both Android and iOS in several national markets.

  • The leading cyber security company, Check Point, has observed instances of threat actors leveraging AI engines from DeepSeek, alongside Alibaba Qwen and OpenAI ChatGPT, to develop information stealers, generate uncensored or unrestricted content, and optimise scripts for mass spam distribution. 

"As threat actors utilise advanced techniques like jailbreaking to bypass protective measures and develop info stealers, financial theft, and spam distribution, the urgency for organisations to implement proactive defenses against these evolving threats ensures robust defenses against potential misuse of AI technologies," Check Point said. 

  • The Associated Press has published  a report  that DeepSeek's website is configured to send user login information to China Mobile, a state-owned telecommunications company that has been banned from operating in the United States.T

The app's Chinese ownership, in the same way as TikTok, have prompted US lawmakers to ask for a US ban on DeepSeek from government devices over risks that it could provide user information to the Chinese government. 

DeepSeek's popularity has also made it a target for attacks and Chinese cyber security firm XLab has reported that DeepSeek has been subjected to sustained distributed denial-of-service (DDoS) attacks deployed using a Mirai botnet network. 

Given these substantial vulnerabilities, it seem s likely that cyber criminals will take advantage of DeepSeek to set up lookalike pages that propagate malware, fake investment scams, and fraudulent crypto schemes.

NowSecure   |   CheckPoint   |   Hacker News   |   Wikipedia   |   VolcenEngine  |   APNews   |   Global Times   |  

Josh Gottheimer   

Image: Ideogram

You Might Also Read: 

Australia Bans DeepSeek In Government Networks:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Apple Ordered To Give Access To Users' Encrypted Data
AI-Based Phishing Attacks Demand A Multi-Pronged Response »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Guardtime

Guardtime

Guardtime's Black Lantern platform provides real-time cybersecurity and data-centric asset protection.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

FutureCon Events

FutureCon Events

FutureCon produces cutting edge events aimed for Senior Level Professionals working in the security community, bringing together the best minds in the industry for a unique cybersecurity event.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Oligo Security

Oligo Security

Oligo aims to streamline the usage of open source by making it secure and easy to protect. Through focusing developers on the relevant vulnerabilities we make the fixing process significantly shorter.

Rezonate

Rezonate

Rezonate discovers, profiles, and protects Identities and their entire access journey to cloud infrastructure and critical SaaS applications. Preventing and stopping cyberattacks.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.