this post was submitted on 25 Mar 2025
10 points (100.0% liked)

Privacy

1667 readers
201 users here now

Protect your privacy in the digital world

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be nice, civil and no bigotry/prejudice.
  2. No tankies/alt-right fascists. The former can be tolerated but the latter are banned.
  3. Stay on topic.
  4. Don't promote big-tech software.
  5. No reposting of news that was already posted. Even from different sources.
  6. No crypto, blockchain, etc.
  7. No Xitter links. (only allowed when can't fact check any other way, use xcancel)

Related communities:

founded 4 months ago
MODERATORS
 

cross-posted from: https://lemmy.sdf.org/post/31583546

Archived

Security researcher Tenable successfully used DeepSeek to create a keylogger that could hide an encrypted log file on disk as well as develop a simple ransomware executable.

At its core, DeepSeek can create the basic structure for malware. However, it is not capable of doing so without additional prompt engineering as well as manual code editing for more advanced features. For instance, DeepSeek struggled with implementing process hiding. "We got the DLL injection code it had generated working, but it required lots of manual intervention," Tenable writes in its report.

"Nonetheless, DeepSeek provides a useful compilation of techniques and search terms that can help someone with no prior experience in writing malicious code the ability to quickly familiarize themselves with the relevant concepts."

"Based on this analysis, we believe that DeepSeek is likely to fuel further development of malicious AI-generated code by cybercriminals in the near future."

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 10 points 3 days ago* (last edited 3 days ago) (2 children)

OP's post history is illuminating.

On this particular article, "DeepSeek can be used to create malware" is unsurprising. Know what else can be used to create malware? Microsoft Visual Studio. Too complicated? Forums on the internet. Sam Altman's OpenAI, which they allege was used to train DeepSeek.

This isn't a breach. Nothing is getting breached here. A more honest title might be "I can use DeepSeek to help me code malware!" but this is not surprising, novel or unique to DeepSeek. See: OpenAI above. Also see: all the ways people have gotten OpenAI to simply tell them how to commit crimes with the right phrasing.

[–] [email protected] 1 points 3 days ago (1 children)

@[email protected]

“Nonetheless, DeepSeek provides a useful compilation of techniques and search terms that can help someone with no prior experience in writing malicious code the ability to quickly familiarize themselves with the relevant concepts.”

[–] [email protected] 6 points 3 days ago

I have many negative things to say about AI (and China) but like I stated earlier, this is in no way unique to DeepSeek.