Positive Technologies Halts Malicious PyPI Attack on DeepSeek Users

News Desk -

Share

The Supply Chain Security team at Positive Technologies’ Expert Security Center (PT ESC) has uncovered and neutralized a malicious campaign targeting developers, ML engineers, and those integrating DeepSeek into their projects. The attack was orchestrated through the Python Package Index (PyPI) repository.

The attacker’s account, created in June 2023, remained inactive until January 29, 2024, when two malicious packages—deepseeek and deepseekai—were registered. Once installed, these packages deployed console commands that, when executed, stole sensitive user data, including system details and environment variables containing database credentials and access keys. The stolen information was transmitted to the attackers via Pipedream, a widely used developer integration platform acting as their command-and-control (C2) server.

Stanislav Rakovsky, Head of Supply Chain Security at PT ESC, highlighted the growing cyber threats targeting trending technologies: “Cybercriminals are always looking for the next big thing to exploit, and DeepSeek’s popularity made it a prime target. What’s particularly interesting is that the malicious code appears to have been generated using an AI assistant, as indicated by comments within the code itself.”

The malicious packages were uploaded to PyPI on the evening of January 29. Thanks to PT PyAnalysis, Positive Technologies’ automated detection service, the threat was identified and neutralized within minutes. However, the packages had already been downloaded over 200 times before removal.

Given the rising interest in DeepSeek, this attack could have led to widespread data breaches if left undetected. Positive Technologies urges developers to exercise caution when installing new or unfamiliar packages and to leverage PT PyAnalysis for real-time monitoring of PyPI releases, ensuring robust protection against supply chain attacks.