{"id":11437,"date":"2025-02-05T12:12:28","date_gmt":"2025-02-05T12:12:28","guid":{"rendered":"\/cybersecurity-blog\/?p=11437"},"modified":"2025-02-05T12:12:29","modified_gmt":"2025-02-05T12:12:29","slug":"deepseek-cyber-attacks","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/","title":{"rendered":"Cyber Attacks on DeepSeek AI: What Really Happened? Full Timeline and Analysis"},"content":{"rendered":"\n<p>Less than a month after its launch, DeepSeek has already shaken up the industry, caused NVidia&#8217;s stock to shed $600 billion, and sparked political controversy.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Now, the AI company is dealing with the consequences of major cyber attacks. As of February 5, DeepSeek is still having trouble letting new users join.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s review the entire timeline of the attacks and take a closer look at the two botnets, HailBot and RapperBot, responsible for the latest disruptions, using <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=deepseek_cyber_attack&amp;utm_term=050225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is DeepSeek&nbsp;<\/h2>\n\n\n\n<p>DeepSeek is an Artificial Intelligence company based in China and founded in late 2023. On January 20, 2025, it launched its first DeepSeek-R1 model, which instantly gained millions of app downloads worldwide.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The success of the release came down to several factors:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-1 wp-block-group-is-layout-flex\">\n<ul class=\"wp-block-list\">\n<li>DeepSeek achieved AI model performance comparable to OpenAI\u2019s (the company behind ChatGPT) for under $6 million.&nbsp;<\/li>\n\n\n\n<li>DeepSeek uses less-advanced chips, making its AI operations <a href=\"https:\/\/www.usatoday.com\/story\/tech\/news\/2025\/01\/31\/deepseek-ai-trump-wakeup-call\/78097990007\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">up to 50 times<\/a> cheaper than competitors.&nbsp;<\/li>\n\n\n\n<li>DeepSeek&#8217;s AI is open source.&nbsp;<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber Attacks on DeepSeek: Timeline&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">January 27&nbsp;<\/h3>\n\n\n\n<p>DeepSeek paused new user registrations, citing &#8220;large-scale malicious attacks&#8221; on its infrastructure.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">January 28&nbsp;<\/h3>\n\n\n\n<p>Wiz.io <a href=\"https:\/\/www.wiz.io\/blog\/wiz-research-uncovers-exposed-deepseek-database-leak\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reported<\/a> discovering a leaked ClickHouse database linked to DeepSeek, which contained users&#8217; chat histories and API keys. This leak was likely unrelated to the cyber attacks mentioned by DeepSeek.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">January 29&nbsp;<\/h3>\n\n\n\n<p>Global Times <a href=\"https:\/\/www.globaltimes.cn\/page\/202501\/1327676.shtml\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">revealed<\/a> that DeepSeek had been facing regular distributed denial-of-service (DDoS) attacks since early January, involving reflection amplification techniques.&nbsp;<\/p>\n\n\n\n<p>Starting January 22, HTTP proxy attacks began, gradually increasing in frequency and peaking on January 28. These were further accompanied by brute-force attack attempts, which allegedly originated from IP addresses in the United States.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">January 30&nbsp;<\/h3>\n\n\n\n<p>Based on a report by XLab, Global Times <a href=\"https:\/\/www.globaltimes.cn\/page\/202501\/1327697.shtml\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">disclosed<\/a> that the latest wave of attacks on DeepSeek involved two botnets, HailBot and RapperBot, both variants of the infamous Mirai botnet.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The attacks launched early on January 30 used 16 command-and-control (C2) servers and over 100 C2 ports.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Businesses Must Pay Attention&nbsp;<\/h2>\n\n\n\n<p>The cyber attacks on DeepSeek highlight that businesses of all sizes and industries, especially those dependent on extensive digital infrastructure, can be vulnerable to such threats. With botnets like HailBot and RapperBot available as a service, attackers can launch cyber assaults without needing advanced technical skills.&nbsp;<\/p>\n\n\n\n<p>For companies that rely on AI services, the consequences can be even more severe, including service disruptions, data breaches, and loss of customer trust. As AI becomes more integral to business operations, it is crucial for companies to invest in robust cybersecurity measures.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How HailBot and RapperBot Botnets Work&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>HailBot<\/strong>&nbsp;<\/h3>\n\n\n\n<p>HailBot, named after the string &#8220;hail china mainland,&#8221; is known for its DDoS attack capabilities. This variant of Mirai exploits vulnerabilities such as CVE-2017-17215, which affects certain Huawei devices.&nbsp;&nbsp;<\/p>\n\n\n\n<p>HailBot can compromise a wide range of devices and use them to launch distributed denial-of-service attacks.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-1024x579.png\" alt=\"\" class=\"wp-image-11445\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-1024x579.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-1536x869.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-2048x1159.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_sandbox-740x419.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Analysis of HailBot in ANY.RUN\u2019s sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>By uploading a sample of HailBot to ANY.RUN\u2019s <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=deepseek_cyber_attack&amp;utm_term=050225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, we can get a detailed view of how it operates.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/50ea9d8e-0b49-494d-8d14-5caedd5376e2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=deepseek_cyber_attack&amp;utm_term=050225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"283\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-1024x283.png\" alt=\"\" class=\"wp-image-11447\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-1024x283.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-300x83.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-768x213.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-1536x425.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-370x102.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-270x75.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc-740x205.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_cnc.png 1958w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>HailBot\u2019s network connections detected by ANY.RUN<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The network traffic shows how the malware connects to its C2 server.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-1024x683.png\" alt=\"\" class=\"wp-image-11449\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-1024x683.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-300x200.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-768x513.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-1536x1025.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-370x247.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-270x180.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata-740x494.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/hailbot_suricata.png 1942w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Suricata rule used for detecting HailBot\u2019s C2 activity<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Suricata IDS instantly identifies HailBot\u2019s connection and notifies the user about its activities.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nSubmit suspicious files and URLs to <span class=\"highlight\">ANY.RUN<\/span> <br>for proactive analysis of threats targeting your company&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=deepseek_cyber_attack&#038;utm_term=050225&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nCreate free account\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h3 class=\"wp-block-heading\"><strong>RapperBot<\/strong>&nbsp;&nbsp;<\/h3>\n\n\n\n<p>RapperBot primarily spreads through SSH brute-force attacks. It is identified by the string &#8220;SSH-2.0-HELLOWORLD&#8221; and reports valid credentials back to its command and control (C2) server. Once RapperBot compromises a device, it performs several malicious actions:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-2 wp-block-group-is-layout-flex\">\n<ul class=\"wp-block-list\">\n<li>Replaces the ~\/.ssh\/authorized_keys file with its own public key, ensuring persistent access to the compromised device.&nbsp;<\/li>\n\n\n\n<li>Creates a superuser account called &#8220;suhelper&#8221; by editing the \/etc\/passwd and \/etc\/shadow files.&nbsp;<\/li>\n\n\n\n<li>Continually scans for more targets using updated credential lists provided by its C2 server.&nbsp;<\/li>\n<\/ul>\n<\/div>\n\n\n\n<p>RapperBot also includes cryptojacking capabilities through the XMRig Monero miner, allowing it to mine cryptocurrency on compromised devices.&nbsp;<\/p>\n\n\n\n<p>After we upload RapperBot\u2019s sample to the sandbox, we can see how it generates significant network traffic.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/3d9ee5c4-ef6d-4317-b11d-8421e295aeef\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=deepseek_cyber_attack&amp;utm_term=050225&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"263\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-1024x263.png\" alt=\"\" class=\"wp-image-11450\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-1024x263.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-300x77.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-768x197.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-1536x394.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-370x95.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-270x69.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections-740x190.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbot_connections.png 1992w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The number of connections attempted by RapperBot reached 139,405 in three minutes<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>In less than three minutes, nearly 140,000 attempts to establish network connections were recorded.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"387\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag.png\" alt=\"\" class=\"wp-image-11452\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag-300x113.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag-768x290.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag-370x140.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag-270x102.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/02\/rapperbottag-740x280.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The sandbox provides a conclusive verdict on the threat along with relevant tags<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>This high volume of traffic makes these botnets easily detectable in ANY.RUN\u2019s sandbox environment.&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"Learn to analyze malware in a sandbox\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to analyze cyber threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nSee a detailed guide to using ANY.RUN&#8217;s <span class=\"highlight\">Interactive Sandbox<\/span> for malware and phishing analysis\n<br \/>\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-analysis-in-a-sandbox\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>The cyberattack on DeepSeek underscores the ongoing threat posed by sophisticated botnets like HailBot and RapperBot. As cybersecurity experts continue to analyze the incident, it is crucial for organizations to remain vigilant and proactive in their defense strategies.&nbsp;&nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s detection capabilities have proven effective in identifying these threats, and we will continue to monitor and report on such incidents.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=deepseek_cyber_attack&amp;utm_term=050225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=deepseek_cyber_attack&amp;utm_term=050225&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial of ANY.RUN&#8217;s services \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Less than a month after its launch, DeepSeek has already shaken up the industry, caused NVidia&#8217;s stock to shed $600 billion, and sparked political controversy.&nbsp;&nbsp; Now, the AI company is dealing with the consequences of major cyber attacks. As of February 5, DeepSeek is still having trouble letting new users join.&nbsp;&nbsp; Let&#8217;s review the entire [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11456,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34,40],"class_list":["post-11437","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Attacks on DeepSeek AI: What Really Happened? Analysis<\/title>\n<meta name=\"description\" content=\"Discover the timeline of cyber attacks on DeepSeek and see analysis of the Botnets, HailBot and RapperBot, used to disrupt the AI service.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Cyber Attacks on DeepSeek AI: What Really Happened? Full Timeline and Analysis\",\"datePublished\":\"2025-02-05T12:12:28+00:00\",\"dateModified\":\"2025-02-05T12:12:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/\"},\"wordCount\":941,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/\",\"name\":\"Cyber Attacks on DeepSeek AI: What Really Happened? Analysis\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-02-05T12:12:28+00:00\",\"dateModified\":\"2025-02-05T12:12:29+00:00\",\"description\":\"Discover the timeline of cyber attacks on DeepSeek and see analysis of the Botnets, HailBot and RapperBot, used to disrupt the AI service.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Attacks on DeepSeek AI: What Really Happened? Full Timeline and Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Attacks on DeepSeek AI: What Really Happened? Analysis","description":"Discover the timeline of cyber attacks on DeepSeek and see analysis of the Botnets, HailBot and RapperBot, used to disrupt the AI service.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Cyber Attacks on DeepSeek AI: What Really Happened? Full Timeline and Analysis","datePublished":"2025-02-05T12:12:28+00:00","dateModified":"2025-02-05T12:12:29+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/"},"wordCount":941,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/","url":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/","name":"Cyber Attacks on DeepSeek AI: What Really Happened? Analysis","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-02-05T12:12:28+00:00","dateModified":"2025-02-05T12:12:29+00:00","description":"Discover the timeline of cyber attacks on DeepSeek and see analysis of the Botnets, HailBot and RapperBot, used to disrupt the AI service.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/deepseek-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Cyber Attacks on DeepSeek AI: What Really Happened? Full Timeline and Analysis"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11437"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=11437"}],"version-history":[{"count":9,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11437\/revisions"}],"predecessor-version":[{"id":11457,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/11437\/revisions\/11457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/11456"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=11437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=11437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=11437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}