
BLOG
BLOG
Artificial Intelligence is reshaping how we interact with technology, from virtual assistants to advanced search engines. However, with great power comes great responsibilityโparticularly when it comes to security. These apps often handle sensitive data, making them prime targets for cyberattacks.
At Appknox, we're committed to ensuring that the latest AI applications are safe for users. Weโre testing some of the newest AI tools, such as Claude, Perplexity, and Deepseek, and publishing our findings as part of an ongoing series.
Our first assessment focuses on the newest Android app, Deepseek. Launched with much anticipation, Deepseek promises advanced search capabilities powered by state-of-the-art AI algorithms. However, our security analysis revealed multiple critical vulnerabilities that could put users' personal data at significant risk. Hereโs what we found and what you need to know to stay safe.
If you have the Deepseek Android app installed on your phone, you might be putting your personal data at risk without even realizing it. Security researchers at Appknox recently analyzed the app and discovered multiple critical vulnerabilities that hackers could exploit. These flaws allow attackers to steal your private information, take control of your device, and even install malicious softwareโall without your knowledge.
Our security assessment uncovered six significant vulnerabilities in the Deepseek Android app, each posing considerable security risks to users. Here's a breakdown of each vulnerability, its attack type, risk level, real-world examples of breaches, and how you can protect yourself:
Man-in-the-Middle (MitM) attack
Critical.
Deepseek lacks proper network security measures, making it highly susceptible to MitM attacks. When users connect over public Wi-Fi or an untrusted network, attackers can intercept and manipulate data, potentially stealing login credentials, personal messages, and payment details.
In 2023, a MitM attack targeted a popular messaging app, exposing user conversations and financial transactions. In this case, users on public Wi-Fi were targeted, with attackers being able to intercept and manipulate data such as login credentials, emails, and personal information. Users had their private communications exposed, and the attackers could steal sensitive data through unencrypted traffic.
Impersonation attack
Critical.
Deepseek fails to validate SSL certificates, making it vulnerable to fake websites or unauthorized access. Hackers can impersonate trusted servers and intercept sensitive information, such as login credentials and personal data.
In 2022, an attacker exploited a failure in SSL certificate validation to spoof a popular social app. Without proper certificate validation, the attacker intercepted secure traffic between the app and Twitterโs servers and impersonated the official service, capturing sensitive data such as login credentials and other private user information.
Due to a lack of secure communication validation, user data was compromised, leading to unauthorized access to accounts and potential data breaches.
Privilege escalation
High
Deepseek's ineffective root detection allows attackers with root access to bypass security controls and extract sensitive data. Rooted devices are particularly vulnerable to malware and advanced cyberattacks.
A 2021 incident saw XLoader, a malware that targets Android devices by exploiting weak root detection. The malware bypassed root checks and escalated privileges, allowing it to gain control of the device and perform malicious activities, such as stealing credentials and capturing sensitive data.
The malware infected thousands of devices, enabling unauthorized data exfiltration and device control.
Phishing and identity theft
Critical
The StrandHogg vulnerability enables malicious apps to hijack legitimate app tasks, displaying fake login screens to steal user credentials.
The StrandHogg vulnerability was exploited to target financial apps. Malicious apps disguised as legitimate banking apps could display fake login screens, tricking users into entering their credentials. This vulnerability was notably used in 2020, targeting popular banking and social media apps. Multiple financial institutions and social media platforms were targeted, resulting in data breaches, identity theft, and unauthorized access to user accounts.
APK modification and malware injection
Critical
Janus allows attackers to modify an appโs APK file without breaking its digital signature, enabling malware injection.
In 2019, attackers exploited the Janus vulnerability to modify APK files in legitimate apps distributed via the Google Play Store. By bypassing the digital signature check, attackers injected malware into the apps, enabling spyware and other malicious software to be installed on users' devices without their knowledge. Several apps were compromised, leading to widespread malware infections, data theft, and spying. Users were unknowingly installing compromised versions of trusted apps.
UI manipulation
High
Tapjacking tricks users into granting dangerous permissions by overlaying invisible UI elements on legitimate buttons.
In 2022, a tapjacking attack targeting messaging apps was discovered. Attackers created invisible overlays on legitimate UI elements, tricking users into granting dangerous permissions like camera and microphone access or the ability to install malware.
The attack allowed unauthorized access to user data and allowed malware to exploit devices for malicious purposes. Users unknowingly granted dangerous permissions, which led to the installation of spyware and other malicious software.
These security vulnerabilities are not just technical issuesโthey can have real-life consequences for users:
Your login credentials, financial data, and personal messages could be stolen.
Malicious apps could replace Deepseek and operate in disguise, stealing sensitive data.
Attackers could gain remote access to your phone, spying on your activities and manipulating device functions.
A hacker could manipulate what you see and interact with, leading to unauthorized transactions or identity theft. If you're using the Deepseek Android app, your private information could be exposed to cybercriminals at any moment.
Until the developers fix these vulnerabilities, we strongly recommend taking the following steps:
๐ Uninstall the Deepseek app immediately to avoid security risks.
โ Use trusted applications from reputable developers and sources.
๐ Keep your Android OS and apps updated to patch known security flaws.
๐ Avoid using public Wi-Fi for sensitive transactions unless you're using a VPN.
๐ก๏ธ Enable Play Protect and use a trusted mobile security solution to scan for malware.
๐ซ Be cautious of pop-ups and UI overlays that ask for unexpected permissions.
โOur findings in the Deepseek app underscore the critical need for rigorous security measures in AI-driven applications. Without proactive security assessments, user data remains vulnerable to sophisticated cyber threats.โ
Subho Halder,
CEO, Appknox
Mobile security is more important than ever. The vulnerabilities found in the Deepseek Android app highlight the importance of secure app development and rigorous testing. Developers must implement proper security controls, such as SSL pinning, root detection, and vulnerability patches, to ensure user safety.
Is your AI app secure?
Donโt wait until itโs too late. Schedule a free consultation with Appknox today to discover potential vulnerabilities in your application before cybercriminals do.
๐ Stay safe. Stay secure.
We have so many ideas for new features that can help your mobile app security even more efficiently. We promise you that we wont mail bomb you, just once in a month.