Cyber News

DeepSeek Security Scrutinized Amid Data Leaks, Jailbreaks

DeepSeek’s sudden fame this week has come with a downside, as security and AI researchers have wasted no time probing for flaws in the AI model and its security.

Claims that DeepSeek can be easily jailbroken appeared within hours of the AI startup’s rise to the center of the AI world, followed by reports of misinformation and inaccuracies found in the would-be rival to ChatGPT and other large language models (LLMs). Scammers wasted no time piling on, as Cyble detected a surge in fraud and phishing attempts aimed at exploiting DeepSeek’s sudden popularity.

The latest DeepSeek security issue involves an exposed database discovered by Wiz Research, which added to concerns about the AI startup’s security and privacy controls.

“The rapid adoption of AI services without corresponding security is inherently risky,” the Wiz researchers wrote. “This exposure underscores the fact that the immediate security risks for AI applications stem from the infrastructure and tools supporting them.”

One downside to the security and misinformation issues surrounding DeepSeek is they threaten to detract from what appears to be a genuine breakthrough in AI efficiency that has attracted the attention of tech luminaries like Snowflake CEO Sridhar Ramaswamy.

Database Leak Underscores DeepSeek Security Concerns

The Wiz researchers said they discovered a publicly accessible ClickHouse database belonging to DeepSeek that allowed full control over database operations, including the ability to access internal data.

The exposure includes more than “a million lines of log streams containing chat history, secret keys, backend details, and other highly sensitive information,” the researchers wrote. They immediately disclosed the issue to DeepSeek, which promptly secured the database.

The researchers said they began investigating DeepSeek’s security posture for any vulnerabilities following the AI startup’s sudden fame. It didn’t take long to find significant issues.

“Within minutes, we found a publicly accessible ClickHouse database linked to DeepSeek, completely open and unauthenticated, exposing sensitive data,” they said.

The unsecured instance allowed for “full database control and potential privilege escalation within the DeepSeek environment, without any authentication or defense mechanism to the outside world,” the researchers added.

The data appeared to be recent, with logs dating from January 6, 2025. It included references to internal DeepSeek API endpoints and exposed plaintext logs that included chat history, API keys, backend details, and operational metadata.

“This level of access posed a critical risk to DeepSeek’s own security and for its end-users,” the researchers said. “Not only an attacker could retrieve sensitive logs and actual plain-text chat messages, but they could also potentially exfiltrate plaintext passwords and local files along propriety information directly from the server.”

An AI Breakthrough Clouded By Security and Misinformation Issues

An unfortunate side effect of the widespread focus on DeepSeek’s security and accuracy issues is that the controversy threatens to obscure the fact that DeepSeek may well be the cost and efficiency breakthrough that the company claims to be.

In a market full of hugely expensive, energy-inefficient GenAI models, a model that can compete while using 90% to 98% less power is very good news indeed. And DeepSeek has even open-sourced one of its models, giving others a chance to work with it.

It remains to be seen whether DeepSeek’s security and misinformation issues could limit its adoption, but the window for getting it right may not be open long, as rivals like Alibaba are quickly following with their own claims of GenAI breakthroughs.

And perhaps there’s a lesson here for other startups, whether they’re focused on AI or other technologies: Don’t let cybersecurity issues detract from your biggest breakthroughs.

Paul Shread

Paul Shread, International Editor for The Cyber Express and Cyble, has covered nearly every aspect of enterprise technology in his 25 years in IT journalism, including award-winning articles on endpoint security and virtual data centers, and a report exposing critical security flaws in a major SIEM system. Publications he has edited and written for include eSecurity Planet, Datamation, eWeek, IT Business Edge, Webopedia, and many more. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst, cybersecurity, and analytics certifications. You can follow him on LinkedIn at: https://www.linkedin.com/in/paul-shread/

Recent Posts

Ivanti Patches Two Zero-Days in Mobile Manager After Attackers Exploit Vulnerable Systems

Ivanti released emergency patches for two critical zero-day vulnerabilities in Endpoint Manager Mobile that are being exploited in-the-wild.

29 minutes ago

CNIL Fine on France Travail After Hack Exposes 20 Years of Job Seekers’ Personal Data

The CNIL’s decision focuses heavily on failure to ensure the security of personal data processed, a requirement under Article 32…

52 minutes ago

Cyble Research Discovers ShadowHS, an In-Memory Linux Framework for Long-Term Access

CRIL uncovers ShadowHS, a fileless Linux framework using weaponized hackshell for stealthy post-exploitation and operator-driven control.

55 minutes ago

Cybersecurity Experts Arrested During Courthouse Pen Test Reach $600K Settlement

Cybersecurity experts arrested during a sanctioned security test at the Dallas County Courthouse reached a $600,000 settlement after years of…

1 hour ago

Security Researcher Finds Exposed Admin Panel for AI Toy

A security researcher investigating an AI toy for a neighbor found an exposed admin panel that could have leaked the…

13 hours ago

EU Data Breach Notifications Surge as GDPR Changes Loom

EU data breach notifications have surged 22% in the last year and GDPR fines remain high, according to a new…

15 hours ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More