By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Has DeepSeek’s open source AI become a tool for cyber-scammers?  – UKTN
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Has DeepSeek’s open source AI become a tool for cyber-scammers?  – UKTN
News

Has DeepSeek’s open source AI become a tool for cyber-scammers?  – UKTN

News Room
Last updated: 2025/03/13 at 12:40 PM
News Room Published 13 March 2025
Share
SHARE

DeepSeek’s free-to-use open source AI models could be used by bad actors to generate dangerous malware whilst exhibiting lacklustre guardrails, new research has found. 

Governments and regulators have been warning of the possibility of LLMs like ChatGPT and Gemini being used to create dangerous code since the modern scale of generative AI was revealed to the public. 

There have been a handful of LLMs developed specifically for criminal use already, but while these models typically require payment to access, and the mainstream LLM providers have guardrails implemented, DeepSeek’s freely accessible open-source model presents an opportunity for scammers. 

The DeepSeek R1 model – a reasoning large language model (LLM) developed by the Chinese firm – was found to be able to generate the “basic structure for malware”, offering guardrails that are “trivial to work around” and “vulnerable to a variety of jailbreaking techniques”, according to research conducted by Nick Miles of Tenable Research. 

For the test, Miles attempted to use DeepSeek to create a keylogger that could record keystrokes from a device’s users whilst being concealed from the operating system’s defences. 

The LLM initially refused but convincing it to press on was as simple as telling it the excersise was for “educational purposes only”. 

DeepSeek provided instructions for creating a keylogger and, while there were several instances of the model’s code requiring manual rewriting, eventually, a working keylogger was created. 

Miles also attempted to generate a simple ransomware – a type of malware that restricts a user’s access to their own files that can be ransomed – sample. 

Again, the system’s restricting warned against the practice, but after some back and forth, Miles was able to generate a handful of working ransomware samples, though they also required manual editing to function. 

The researcher concluded that with simple manipulation, bad actors could bypass DeepSeek’s measures against malware creation. 

The findings do not spell complete disaster, as a considerable amount of pre-existing knowledge of coding is required for the model’s outputs to work properly. 

“Nonetheless, DeepSeek provides a useful compilation of techniques and search terms that can help someone with no prior experience in writing malicious code the ability to quickly familiarize themselves with the relevant concepts,” concluded Miles. 

“Based on this analysis, I believe that DeepSeek is likely to fuel further development of malicious AI-generated code by cybercriminals in the near future.” 

Register for Free


Get daily updates and enjoy an ad-reduced experience.





Already have an account? Log in

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What is Software? Definition, Types, Examples, and More – GeeksforGeeks
Next Article How to Set Up Your New iPhone
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

10 Best Draw.io Alternatives & Competitors 2025
Computing
Freddy’s customer gets bizarre note on receipt – some say I should ‘call cops’
News
Trump administration announces ‘illegal’ rollback of energy and water efficiency standards
News
Unstructured Data Is Trying to Tell You Something – Try Listening to It: The Human Side of Logs | HackerNoon
Computing

You Might also Like

News

Freddy’s customer gets bizarre note on receipt – some say I should ‘call cops’

4 Min Read
News

Trump administration announces ‘illegal’ rollback of energy and water efficiency standards

5 Min Read
News

Nokia looks to light up in-building enterprise connectivity with Aurelis | Computer Weekly

4 Min Read
News

Don’t Miss Out: AI Agents Are Becoming Tech’s Next Battleground

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?