Wired: Exposed DeepSeek Database Revealed Chat Prompts and Internal Data

Source URL: https://www.wired.com/story/exposed-deepseek-database-revealed-chat-prompts-and-internal-data/
Source: Wired
Title: Exposed DeepSeek Database Revealed Chat Prompts and Internal Data

Feedly Summary: China-based DeepSeek has exploded in popularity, drawing greater scrutiny. Case in point: Security researchers found more than 1 million records, including user data and API keys, in an open database.

AI Summary and Description: Yes

Summary: The text discusses a significant data exposure incident involving the Chinese generative AI platform DeepSeek, which has raised concerns about its security maturity. Researchers from cloud security firm Wiz discovered that DeepSeek left a critical database exposed on the internet, leaking over 1 million records, including sensitive user data. This incident underscores ongoing vulnerabilities in AI services and the potential risks to sensitive data in cloud environments.

Detailed Description:

– **Incident Overview**: DeepSeek, a new generative AI platform in China, experienced a critical data breach when researchers from Wiz found that one of its core databases was publicly accessible online. The exposure included sensitive information, totaling over 1 million records, which raised alarms about the company’s security practices.

– **Data Leak Details**:
– The exposed database leaked system logs, user prompt submissions, and API authentication tokens.
– Researchers characterized this exposure as dramatic and concerning due to the low effort required to access the data.
– The database was identified as a ClickHouse database, commonly used for server analytics.

– **Security Implications**:
– The incident illustrates the ongoing issue of misconfigured databases in cloud environments, which have been a long-standing concern for both institutions and service providers.
– The ease of discovering the database—almost immediate with minimal effort—contrasts sharply with typical cases where extensive scanning is necessary to find such vulnerabilities.

– **Response from Wiz**:
– Wiz researchers attempted to notify DeepSeek using various channels but did not receive a timely response. However, within a half-hour of their outreach, the database was secured and became inaccessible to unauthorized users.
– CTO Ami Luttwak emphasized that such vulnerabilities indicate that DeepSeek is not adequately prepared to handle sensitive data.

– **Potential Risks**:
– Despite the researchers’ claims of performing the minimum necessary assessment to protect user privacy, they warned that malicious actors could have used the exposed data for lateral movement within DeepSeek’s infrastructure, potentially leading to further exploitation.

– **Conclusions**: This incident highlights critical security vulnerabilities in generative AI platforms, emphasizing the necessity for robust security practices, especially in cloud settings, to protect sensitive data and maintain user trust. It serves as a reminder for security professionals in AI and cloud computing to advocate for stringent security controls and continuous monitoring to prevent similar occurrences.