Executive Summary
Threat actors are exploiting the growing popularity of DeepSeek by launching phishing campaigns that use DeepSeek's brand name. These campaigns aim to steal credentials and distribute malware, including through fake investment schemes.
CloudSEK's Threat Research Team has discovered a domain used to spread Vidar Stealer malware through ClickFix phishing campaigns, a type of scam where victims are tricked into clicking on a malicious link that appears to be a captcha verification. These links often lead to the installation of malware, such as the Lumma Stealer mentioned in this report. A previous blog post, published in September of last year, explained this in detail.
Analysis and Attribution
Analysis of the Fake Domain
1. On 31 Jan 2025, CloudSEK’s contextual AI URL Analyser detected a domain with the name deepseekcaptcha[.]top The domain was hosted behind Cloudflare and was used to display a fake DeepSeek blogger theme offer.
![](https://cdn.prod.website-files.com/635e632477408d12d1811a64/67aa14b53e5f2ca8b49d3337_AD_4nXe1L8XYgJh20eCtbxq2heSlVw_ppzSi_8SE3FD-C831WLxkpD677tBtBu4XtaXJzN6s5Cs8cZX5pw-DKz6CQU-D3xpy2lUBHyLxZvYiisTpx30uKrRqq4JN78PQpO-8qoqiYqHh6g.png)
2. The WHOIS record shows that the domain was registered on January 31, 2025. The domain uses Cloudflare's hosting services to mask its true nature and evade detection from AI-based search engines, allowing it to remain undetected for an extended period.
3. While analyzing the functionality and flow of the phishing site, it became apparent that clicking the “Verificate” button on the malicious webpage’s landing page would copy a malicious PowerShell command, and once the instructions were followed, a malicious file download would begin.
![](https://cdn.prod.website-files.com/635e632477408d12d1811a64/67aa14d70c2e455921749675_AD_4nXfccPDjnqFG0o8NhTzK0k5MgBZAOwUOoxyvnV5gyC3eh7QMEOYLn7XAknUnFIECZz93z0vAKvr6VCpFodT_DnjkLxlZ2E_nU4BPcBwq4zpz70rw_JFYabgP2G2oLrHQetUotraU3A.png)
4. The highlighted command in the screenshot reveals that the file named 1.exe was downloaded and subsequently executed from the %TEMP% directory without any user interaction. Upon checking the IP address, 147.45.44[.]209 we found the Directory Listing reveals all the files and script in the campaigns used.
![](https://cdn.prod.website-files.com/635e632477408d12d1811a64/67aa14ed7ef139dd67946904_AD_4nXdAMXGGpD8lIIXm-fOExLYctAqxD57r6ruZ7YdhbC47VahAoAWreeoKYUlEWHt9oQqolJ-Sv7GLJG0qgJD-5m7J0pwkZ5J4GJNCFnijRc5ciRNQJmJvWU1SQ7idSSlXzThKJ6-bnA.png)
4. Based on the primary static analysis of the downloaded file, 1.exe is classified to be the 1st stage downloader of Vidar Stealer which is used to infect devices and steal information.
5. Further analysis has revealed that the stealer has incorporated social media platforms, such as Telegram and Steam, into its infrastructure to provide updates and support, as well as command-and-control (C2) functionality. This includes embedding the IP address/URL on the profile page, which the malware retrieves during the initial stage of execution.
![](https://cdn.prod.website-files.com/635e632477408d12d1811a64/67aa1507ed8979dd3d3be65b_AD_4nXeOIBNpAE1jLmk9INuv5IHBCSLg3rs5j0qYvKd-mcAgeflB8fc5_UlHrkKCKAQEEFXoq7B2yQQOZuHGHteX_gNrDlajNQ4kPrfz8Ja3t2ktnTepTqoMUWtq8ERYLo6gVjBrAx6ssQ.png)
Recommendations
- User Awareness and Education: The best defense against phishing attacks is a well-informed user base. Organizations and individuals should conduct regular security awareness training programs that educate users about the risks of phishing attacks and how to identify and avoid them. This includes:
- Identifying Phishing Emails: Teach users to recognize the common signs of phishing emails, such as suspicious sender addresses, urgent requests for personal information, and links to unfamiliar websites.
- Hover Before You Click: Encourage users to hover their mouse over links before clicking to verify the destination URL.
- Verifying Website Authenticity: Advise users to check for the padlock symbol and "https://" in the address bar to ensure they are visiting a secure website.
- Reporting Suspicious Activity: Establish a clear process for users to report suspicious emails or websites to the IT department.
- Multi-Factor Authentication (MFA): Implementing MFA adds an extra layer of security by requiring users to provide multiple forms of verification before accessing sensitive accounts or systems. This can significantly reduce the risk of unauthorized access even if credentials are compromised.
- Email Filtering and Anti-Phishing Solutions: Employ email filtering and anti-phishing solutions to detect and block malicious emails before they reach users' inboxes. These solutions can use a variety of techniques, such as signature-based detection, reputation analysis, and machine learning, to identify and quarantine phishing emails.
- Network Segmentation: Segmenting the network can help to contain the spread of malware in the event of a successful phishing attack. By isolating critical systems and data from the rest of the network, organizations can limit the potential damage caused by a breach.
- Incident Response Plan: Having a well-defined incident response plan in place can help organizations to respond quickly and effectively to phishing attacks. This plan should include procedures for identifying, containing, and eradicating the threat, as well as communicating with stakeholders.
- Regular Software Updates: Keeping software and systems up to date with the latest security patches is crucial for mitigating vulnerabilities that can be exploited by threat actors.
- Anti-Malware Software: Deploying anti-malware software on all endpoints can help to detect and remove malicious software that may be installed through phishing attacks.
- Password Management: Encourage users to use strong, unique passwords for all of their accounts and to avoid reusing passwords across multiple sites. Consider implementing a password manager to help users manage their credentials securely.
By following these recommendations, organizations and individuals can significantly reduce their risk of falling victim to phishing attacks and protect themselves from the associated risks of data theft, financial loss, and reputational damage.
List of Indicator of Compromises
Following are the IOCs gathered from the campaign:
References
- *Intelligence source and information reliability - Wikipedia
- #Traffic Light Protocol - Wikipedia
- https://www.cloudsek.com/blog/unmasking-the-danger-lumma-stealer-malware-exploits-fake-captcha-pages
Appendix
![](https://cdn.prod.website-files.com/635e632477408d12d1811a64/66ebc8bb363e3dbda165f51e_AD_4nXdOigBvCIZYS2MU9IcK4rOxtnWuX11yy5-31N5t2vMSXaWzrAdtgIP9oLaj6irgPq_d0aebqtFUh687Xeb2ZmjCteZx6hZf_HkUIr2IlKKouZ0FZ7aFqA9eA-GOwACMvf0kb9niwz0OVZuoaJxFIR0zRETJ.png)