Fake DeepSeek ads deliver ‘BrowserVenom’ malware to curious AI users
The malware, spread via Google ads, targeted users searching for DeepSeek’s R1 model and deployed a fake installer.

Cybercriminals are exploiting the surge in interest around local AI tools by spreading a new malware strain via Google ads.
According to antivirus firm Kaspersky, attackers use fake ads for DeepSeek’s R1 AI model to deliver ‘BrowserVenom,’ malware designed to intercept and manipulate a user’s internet traffic instead of merely infecting the device.
The attackers purchased ads appearing in Google search results for ‘deep seek r1.’ Users who clicked were redirected to a fake website—deepseek-platform[.]com—which mimicked the official DeepSeek site and offered a file named AI_Launcher_1.21.exe.
Kaspersky’s analysis of the site’s source code uncovered developer notes in Russian, suggesting the campaign is operated by Russian-speaking actors.
Once launched, the fake installer displayed a decoy installation screen for the R1 model, but silently deployed malware that altered browser configurations.
BrowserVenom rerouted web traffic through a proxy server controlled by the hackers, allowing them to decrypt browsing sessions and capture sensitive data, while evading most antivirus tools.
Kaspersky reports confirmed infections across multiple countries, including Brazil, Cuba, India, and South Africa.
The malicious domain has since been taken down. However, the incident highlights the dangers of downloading AI tools from unofficial sources. Open-source models like DeepSeek R1 require technical setup, typically involving multiple configuration steps, instead of a simple Windows installer.
As interest in running local AI grows, users should verify official domains and avoid shortcuts that could lead to malware.
Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!