1. LINE

      Text:AAAPrint
      Sci-tech

      Cyberattacks against DeepSeek escalate with botnets joining, command surging over 100 times: lab

      2025-01-31 11:03:14Global Times Editor : Li Yan ECNS App Download

      Cyberattacks targeting Chinese AI start-up DeepSeek suddenly escalated on early Thursday with attack commands surging by more than 100 times compared to a previous wave of attacks on Tuesday, the Global Times learned from Chinese cybersecurity firm XLab on Thursday. 

      The lab said that it observed at least two botnets participating in the attacks on Thursday, launching two waves of assaults. 

      DeepSeek has been subjected to large-scale and sustained DDoS attacks since January 3 or 4, according to XLab.

      "At first, the attacks were SSDP and NTP reflection amplification attacks. On Tuesday, a large number of HTTP proxy attacks were added. Then in early this morning, botnets were observed to have joined the fray. This means that the attacks on DeepSeek have been escalating, with an increasing variety of methods, making defense increasingly difficult and the security challenges faced by DeepSeek more severe," a security expert from XLab told the Global Times on condition of anonymity. 

      Through nearly a month of continuous monitoring of DeepSeek, XLab told the Global Times that they had discovered that the attacks on DeepSeek have been gradually evolving: from easy-to-mitigate amplification attacks at beginning, to HTTP proxy attacks (application-layer attacks, which are harder to defend against) on Tuesday and now to primarily botnet-based attacks. Attackers are using multiple techniques and methods to target DeepSeek, XLab said. 

      According to a report XLab sent to the Global Times, in the early hours of Thursday, the lab observed two Mirai variant botnets, HailBot and RapperBot, participating in the attacks. These attacks, divided into two waves separately at 1 am and 2 am, involved 118 C2 ports across 16 C2 servers.

      "The involvement of botnets indicates that professional attackers have entered," the XLab expert said.

      According to XLab, botnets are networks of devices infected and controlled by attackers through malicious software, known as "zombies" or "bots." Attackers use Command and Control (C&C) servers to send commands to these devices, executing various tasks such as launching DDoS attacks on target servers simultaneously. The scale and intensity of the attacks will continue to increase, exhausting the target servers' network bandwidth and system resources, rendering them unable to respond to normal business operations, ultimately leading to paralysis or service disruption.

      The two botnets used in this attack, HailBot and RapperBot, are two long-active botnets that provide professional DDoS services to attack global targets. RapperBot attacks an average of more than 100 targets daily, with peak command volumes in the thousands. Its targets are distributed across Brazil, Belarus, Russia, China, Sweden, and other regions. HailBot's attacks are more stable than RapperBot's, with an average of thousands of attack commands daily targeting more than 100 targets distributed in the Chinese mainland, the US, the UK, China's Hong Kong region, Germany, and other regions, according to XLab. 

      XLab found that these two botnets frequently "take orders," fitting the profile of typical "professional hitmen." The lab believes that while botnet attacks are an old method, they remain effective. "Clearly, in the wave of attacks early this morning, hackers have procured professional botnet attack services," said the XLab expert. 

      DeepSeek gained widespread attention after it released the latest open-source model DeepSeek-R1 earlier in January. The model has achieved an important technological breakthrough - using pure deep learning methods to allow AI to spontaneously emerge with reasoning capabilities. 

      On Tuesday, the eve of Chinese New Year, the company launched a new open-source multimodal model Janus-Pro, an upgraded version of its earlier Janus model, which significantly enhances multimodal understanding and visual generation capabilities and reportedly outperforms OpenAI in benchmark tests.

      The attacks in the past months have affected the registration and services of DeepSeek. DeepSeek reportedly released an announcement on Tuesday saying that its online services had recently been subjected to large-scale malicious attacks. To ensure continued service, the company had temporarily restricted registration methods other than those with +86 mobile phone numbers. 

      Tuesday attacks on DeepSeek also caused global concerns over security of AI services. "The attack, which forced DeepSeek to disable new user registrations, is believed to be a distributed denial-of-service attack targeting its API and web chat platform. While existing users can still access the platform, this incident raises broader questions about the security of AI-driven platforms and the potential risks they pose to consumers," read a Forbes report on Tuesday.  

      MorePhoto

      Most popular in 24h

      MoreTop news

      MoreVideo

      LINE
      Back to top About Us | Jobs | Contact Us | Privacy Policy
      Copyright ©1999-2025 Chinanews.com. All rights reserved.
      Reproduction in whole or in part without permission is prohibited.
      [網上傳播視聽節目許可證(0106168)] [京ICP證040655號]
      [京公網安備 11010202009201號] [京ICP備05004340號-1]
      主站蜘蛛池模板: 午夜免费福利影院| 国产jizzjizz免费看jizz| 中文字幕乱码亚洲无线三区| 国产性生交xxxxx免费| 亚洲国产免费综合| 综合自拍亚洲综合图不卡区| 午夜老司机免费视频| 国产在线精品观看免费观看 | 久久久亚洲欧洲日产国码二区| 天天影院成人免费观看| 边摸边吃奶边做爽免费视频99| 亚洲国产精品无码专区在线观看| 欧洲精品成人免费视频在线观看| 一级特级aaaa毛片免费观看| 亚洲第一二三四区| 亚洲成年人啊啊aa在线观看| 五月婷婷在线免费观看| 国产成人无码精品久久久免费| 亚洲综合久久精品无码色欲| 亚洲午夜福利717| 在线观看无码的免费网站| 国产精品免费一区二区三区四区| 亚洲国产区男人本色| 亚洲精品在线观看视频| 亚洲第一网站男人都懂| 免费av欧美国产在钱| 成全视频在线观看免费| 国产成人高清亚洲一区久久 | 九九99热免费最新版| 亚洲熟妇无码八V在线播放| 情人伊人久久综合亚洲| 免费v片在线观看| 91精品成人免费国产片| 四虎国产精品免费永久在线| 日本亚洲中午字幕乱码| 亚洲一区二区三区不卡在线播放| 亚洲国产精品无码久久SM| 亚洲高清免费视频| 真实乱视频国产免费观看 | 四虎影视永久免费观看| 性xxxxx免费视频播放|