<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><a href="https://www.nowsecure.com/blog/2025/02/06/nowsecure-uncovers-multiple-security-and-privacy-flaws-in-deepseek-ios-mobile-app/" rel="noopener" target="_blank"><span><strong>NowSecure</strong></span></a> uncovered multiple security and privacy vulnerabilities in the <span><strong>DeepSeek iOS mobile app</strong></span>—ranging from <span><strong>unencrypted data transmission</strong></span> and <span><strong>weak encryption practices</strong></span> to <span><strong>insecure data storage</strong></span> and <span><strong>extensive data collection</strong></span>. With warnings from security experts and worldwide bans in public and private sectors, enterprises need a proactive strategy for blocking DeepSeek usage on their networks.</p> <!--more--><p>Today, <span><strong>ThreatSTOP</strong></span> is excited to announce a new target named <span><strong>“DeepSeekAI - Domains”</strong></span>, designed to proactively defend your organization from the significant risks identified by NowSecure. Whether you deploy <span><strong>DNS Defense Cloud</strong></span>(our DNS protection service using ThreatSTOP’s DNS servers in the cloud) or <span><strong>DNS Defense</strong></span> (ThreatSTOP intelligence integrated with your on-premises DNS servers), you can now immediately restrict and block the use of DeepSeek-associated domains across your environment.</p> <p>&nbsp;</p> <p style="font-weight: bold;">Why DeepSeek Is a Risk</p> <p>According to the <span><strong>NowSecure</strong></span> assessment, the DeepSeek iOS app introduces critical issues that can compromise an organization’s sensitive data, intellectual property, and overall security posture. Key concerns include:</p> <ul> <li><span></span><span><strong>Unencrypted Data Transmission</strong></span>: Sensitive information, including user details, can be intercepted and manipulated.</li> <li><span></span><span><strong>Weak &amp; Hardcoded Encryption Keys</strong></span>: Outdated encryption (Triple DES) and reused initialization vectors create exploitable vulnerabilities.</li> <li><span></span><span><strong>Insecure Data Storage</strong></span>: Credentials and encryption keys are stored in ways that attackers could easily harvest.</li> <li><span></span><span><strong>Extensive Data Collection &amp; Fingerprinting</strong></span>: The app aggregates enough information to identify and track individuals, posing a major surveillance threat.</li> <li><span></span><span><strong>Transmission &amp; Governance Under PRC Laws</strong></span>: Data is stored and processed by servers linked to China, raising compliance concerns and potential government oversight risks.</li> </ul> <p>These flaws make DeepSeek unsuitable for enterprise and government environments, as highlighted by NowSecure’s recommendation for its immediate removal.</p> <p>&nbsp;</p> <p style="font-weight: bold;">ThreatSTOP’s Proactive Approach</p> <p>ThreatSTOP’s protective DNS solutions are constantly updated to stay ahead of emerging threats. Our <span><strong>ThreatSTOP Security, Intelligence, and Research team</strong></span> specializes in creating protections for command and control, invalid traffic, peer-to-peer communication, data exfiltration, phishing, SPAM, Distributed Denial of Service (DDoS) activity, and more. These proactive policies have a track record of helping organizations intercept threats before they cause harm.</p> <p>With the new <span><strong>DeepSeekAI - Domains</strong></span> target, ThreatSTOP customers now have an additional layer of proactive protection. By blocking known risky domains associated with DeepSeek, you ensure that devices on your network—whether managed or part of BYOD—cannot communicate with DeepSeek’s infrastructure. This approach mitigates the risk of data leakage, credential theft, or unauthorized surveillance, helping you maintain a robust security posture without compromising business operations.</p> <p>&nbsp;</p> <p><strong>How It Works</strong></p> <p><span></span>1.<span> </span><span><strong>DNS Defense Cloud</strong></span>: For customers using our cloud-based DNS servers, simply enable the new DeepSeekAI - Domains target in your ThreatSTOP policy. All DNS lookups to associated DeepSeek domains will be denied automatically—no on-premises hardware changes needed.</p> <p><span></span>2.<span> </span><span><strong>DNS Defense</strong></span>: Customers running ThreatSTOP intelligence on their own DNS infrastructure can activate DeepSeekAI - Domains in the same, straightforward manner. The lists are updated constantly, ensuring that any new domains tied to DeepSeek threats are blocked as soon as they appear in our system.</p> <p>By stopping resolution requests at the DNS layer, ThreatSTOP prevents users from inadvertently connecting to unsafe endpoints, even if employees have the DeepSeek app installed on their devices.</p> <p>&nbsp;</p> <p style="font-weight: bold;">Taking Action</p> <p>With the findings from NowSecure, many enterprises and government agencies have already pulled DeepSeek from their devices. However, ensuring this app can’t bypass policy or resurface in your environment calls for layered defenses. ThreatSTOP offers a decisive line of protection, giving security teams the confidence that DeepSeek’s compromised domains won’t pose a threat to data or operations.</p> <p>&nbsp;</p> <p style="font-weight: bold;">Next Steps</p> <p><span></span>•<span> </span><span><strong>Enable the “DeepSeekAI - Domains” target</strong></span>: Start blocking potentially harmful communications immediately.</p> <p><span></span>•<span> </span><span><strong>Audit existing device usage</strong></span>: Identify any users or systems still leveraging DeepSeek and remove it from all managed and BYOD devices.</p> <p><span></span>•<span> </span><span><strong>Stay vigilant</strong></span>: Continue adopting new ThreatSTOP protections as soon as they are released. We regularly add new intelligence indicators so that your defenses remain active against emerging threats.</p> <p style="font-weight: bold;">&nbsp;</p> <p style="font-weight: bold;">Join the ThreatSTOP Family</p> <p>For those interested in joining the ThreatSTOP family, or to learn more about our proactive protections for all environments, we invite you to visit our&nbsp;<a href="/threatstop-platform" rel="noopener" target="_blank">product page</a>. Discover how our solutions can make a significant difference in your digital security landscape. We have&nbsp;pricing&nbsp;for all sizes of customers!&nbsp;Get started with a Demo today!</p> <p style="font-weight: bold;">Connect with Customers, Disconnect from Risks</p></span>