Cyber Security News

Android Malware Mimic As DeepSeek To Steal Users Login Credentials

A sophisticated Android banking trojan known as OctoV2 has been discovered masquerading as the legitimate DeepSeek AI application.

The malware campaign uses a deceptive phishing website that closely mimics the official DeepSeek platform, tricking users into downloading a malicious application that steals login credentials and sensitive information.

DeepSeek, an advanced artificial intelligence chatbot developed by a Chinese startup based in Hangzhou, released its first application for iOS and Android platforms in January 2025.

The popularity of this AI platform has made it an attractive target for cybercriminals looking to exploit user trust.

K7 Security Labs researchers detected this threat after observing a suspicious Twitter post about a fake DeepSeek Android application.

Their analysis revealed that the malware is being distributed through a phishing link: hxxps://deepsekk[.]sbs, which downloads a malicious APK file to the victim’s device.

Once installed, the malicious application displays an icon identical to the legitimate DeepSeek app, making it difficult for users to identify the threat.

Deeepseek client app installation (Source – K7 Security Labs)

When launched, the malware presents an update screen prompting users to enable the “Allow from this source” option and install an additional component.

The infection process results in two instances of the DeepSeek malware being installed on the device, each with a different package name.

Technical analysis shows the primary package “com.hello.world” acting as a parent app, which then installs a secondary “com.vgsupervision_kit29” package as the child app.

Malware Analysis

The malware employs sophisticated methods to evade detection. Both the parent and child applications are password-protected, making them difficult to analyze with standard reversing tools like APKTool and Jadx.

The parent app extracts a hidden “.cat” file from its assets folder and copies it to the device as “Verify.apk” before installing it as the child package.

After installation, the child application persistently requests Accessibility Service permissions, giving the malware extensive control over the device.

Domain Generation Algorithm (DGA) (Source – K7 Security Labs)

It utilizes a Domain Generation Algorithm (DGA) to establish communication with command and control (C2) servers.

The trojan then scans and retrieves a list of all installed applications on the victim’s device and transmits this information to the C2 server.

The bot commands and C2 details are stored in the “/data/data/com.vgsupervision_kit29/shared_prefs/main.xml” file.

Users are advised to download applications only from official sources like Google Play, keep their devices updated with the latest security patches, and use reputable security solutions to detect and prevent such threats.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Assessing Third-Party Vendor Risks – CISO Best Practices

Third-party vendors are indispensable to modern enterprises, offering specialized services, cost efficiencies, and scalability. However,…

57 minutes ago

FastCGI Library Vulnerability Exposes Embedded Devices to Code Execution Attacks

A critical vulnerability in the FastCGI library could allow attackers to execute arbitrary code on…

58 minutes ago

React Router Vulnerabilities Let Attackers Spoof Contents & Modify Values

Significant security flaws have been discovered in React Router, a widely-used routing library for React…

1 hour ago

Selecting Cybersecurity Vendors – CISO’s Decision Framework

In an era where cyber threats are growing in sophistication and frequency, Chief Information Security…

1 hour ago

CISA Warns Planet Technology Network Products Let Attackers Manipulate Devices

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory warning of multiple…

2 hours ago

Hackers Selling Advanced Stealthy HiddenMiner Malware on Dark Web Forums

A new threat actor is offering an enhanced version of HiddenMiner, a sophisticated cryptomining malware…

2 hours ago