New BrowserVenom malware being distributed via fake DeepSeek phishing website
June 11, 2025, 4:45 p.m.
Description
A new malicious campaign is distributing previously unknown malware through a fake DeepSeek-R1 LLM environment installer. The phishing site, promoted via Google Ads, mimics the official DeepSeek homepage. The attack installs BrowserVenom, an implant that forces all browsing traffic through a proxy controlled by threat actors, enabling network traffic manipulation and data collection. The infection process involves a fake CAPTCHA, exclusion of the user's folder from Windows Defender, and installation of a malicious certificate. BrowserVenom modifies browser settings across various platforms to route traffic through the attacker's proxy. Infections have been detected globally, with victims in Brazil, Cuba, Mexico, India, Nepal, South Africa, and Egypt.
Tags
Date
- Created: June 11, 2025, 3:14 p.m.
- Published: June 11, 2025, 3:14 p.m.
- Modified: June 11, 2025, 4:45 p.m.
Indicators
- 141.105.130.106
- https://r1deepseek-ai.com/gg/cc/AI_Launcher_1.21.exe
- app-updater2.app
- app-updater.app
- app-updater1.app
- r1deepseek-ai.com
- deepseek-platform.com
Additional Informations
- British Indian Ocean Territory
- Cuba
- Egypt
- South Africa
- Nepal
- India
- Mexico
- Brazil