DeepSeek AI Gains Attention from Hackers:
Tech giants like OpenAI and Google have praised the new R1 AI model from DeepSeek, but it seems this China-based AI company is becoming a favorite tool for cybercriminals. According to a recent report by Check Point, hackers are now moving beyond tools like ChatGPT and using DeepSeek and Qwen AI models to create dangerous content.
A New Challenge: Misuse of AI
DeepSeek and other powerful AI models have made many tasks easier. However, their misuse by hackers is a growing concern. Millions of people rely on these free AI chatbots for daily needs, but when these tools are exploited by cybercriminals, they pose a threat to the general public.
DeepSeek is available for free on mobile, web, and other platforms, but using these free models raises serious privacy and security concerns.
Is Using Free AI Safe?
Cybersecurity experts warn that relying too much on new AI models can be risky. Check Point reports that models like DeepSeek and Qwen can be easily manipulated by hackers, enabling them to bypass security barriers without advanced technical knowledge.
This is why OpenAI added security features to ChatGPT to make it less useful for hackers. However, as models like DeepSeek and Qwen gain popularity, censorship-free versions might soon appear, increasing cybersecurity risks.
Personal Data at Risk
The report mentions cases where the Qwen AI model was used to steal users’ personal data without their knowledge. Tools like DeepSeek have made cybercrimes easier, raising concerns about possible large-scale bank fraud or data breaches involving AI.
Jailbreaking and AI Misuse
Hackers are now focusing on “jailbreaking” AI models, which involves manipulating them to create harmful content. Recently, there were reports of DeepSeek data leaks, showing that such cyber attacks are becoming more common.
What Should You Do?
- Avoid fully relying on AI tools.
- Do not share sensitive information.
- Adopt cybersecurity measures and stay alert.
AI technology is both helpful and dangerous. Use AI tools carefully and prioritize the protection of your data.


