Fake DeepSeek TUI GitHub Repositories Used to Spread Malware via AI Tool Spoofing
Security researchers found a malware campaign abusing fake GitHub repositories impersonating the DeepSeek TUI AI tool. Attackers lure users into downloading malicious archives disguised as legitimate AI software, often leveraging trending names like Claude, Grok, and WormGPT.


Once executed, the malware performs sandbox detection, disables Windows Defender protections, and installs multi-stage payloads for persistence. It uses PowerShell scripts, registry modifications, and scheduled tasks to maintain long-term system access while exfiltrating data via external servers and Telegram channels.
The campaign highlights a growing trend of AI-themed malware distribution targeting developers through trusted platforms like GitHub, using sophisticated evasion and persistence techniques.
Hackers are weaponizing trusted AI brands. NPAV EPS detects malicious installers, hidden payloads, and advanced malware behavior before damage begins.
- Other (43)
- Ransomware (179)
- Events and News (28)
- Features (45)
- Security (505)
- Tips (83)
- Google (49)
- Achievements (13)
- Products (37)
- Activation (7)
- Dealers (1)
- Bank Phishing (61)
- Malware Alerts (299)
- Cyber Attack (383)
- Data Backup (15)
- Data Breach (232)
- Phishing (194)
- Securty Tips (9)
- Browser Hijack (30)
- Adware (15)
- Email And Password (90)
- Android Security (97)
- Knoweldgebase (37)
- Botnet (20)
- Updates (12)
- Alert (72)
- Hacking (90)
- Social Media (11)
- vulnerability (132)
- Hacker (107)
- Spyware (18)
- Windows (29)
- Microsoft (46)
- Uber (1)
- YouTube (4)
- Trojan (7)
- Website hacks (17)
- Paytm (1)
- Credit card scam (4)
- Telegram (9)
- RAT (12)
- Bug (5)
- Twitter (3)
- Facebook (14)
- Banking Trojan (17)
- Mozilla (2)
- COVID-19 (5)
- Instagram (5)
- NPAV Announcement (18)
- IoT Security (4)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (5)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (5)
- Cloud malware (5)
- Cloud storage (2)
- Financial fraud (115)
- Impersonation phishing (4)
- DDoS (12)
- Smishing (2)
- Whale (0)
- Whale phishing (6)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (101)
-
Mobile Frauds
(80)
- WhatsApp (21)
- AI (41)