Article Details

Original Article Text

Click to Toggle View

DeepSeek exposes database with over 1 million chat records. DeepSeek, the Chinese AI startup known for its DeepSeek-R1 LLM model, has publicly exposed two databases containing sensitive user and operational information. The unsecured ClickHouse instances reportedly held over a million log entries containing user chat history in plaintext form, API keys, backend details, and operational metadata. Wiz Research discovered this exposure during a security assessment of DeepSeek's external infrastructure. The security firm found two publicly accessible database instances at oauth2callback.deepseek.com:9000 and dev.deepseek.com:9000 that allowed arbitrary SQL queries via a web interface without requiring authentication. The databases contained a 'log_stream' table that stored sensitive internal logs dating from January 6, 2025, containing: "This level of access posed a critical risk to DeepSeek's own security and for its end-users," comments Wiz. "Not only an attacker could retrieve sensitive logs and actual plaintext chat messages, but they could also potentially exfiltrate plaintext passwords and local files along propriety information directly from the server using queries like: SELECT * FROM file('filename') depending on their ClickHouse configuration." Wiz says it could execute more intrusive queries but limited its exploration to enumeration to keep its research within certain ethical constraints. It is unknown if Wiz's researchers were the first to discover this exposure or if malicious actors have already taken advantage of the misconfiguration. In any case, Wiz informed DeepSeek of the matter, and the company promptly addressed the exposure, so the databases are no longer public. DeepSeek's security problems Apart from all the concerns that arise from DeepSeek being a China-based technology company, meaning it has to comply with aggressive data access requests from the country's government, the company does not appear to have established a solid security stance, placing sensitive data at risk. The exposure of user prompts is a privacy breach that should be very concerning for organizations using the AI model for sensitive business operations. Additionally, the exposure of backend details and API keys could give attackers a way into DeepSeek's internal networks, privilege escalation, and potentially larger-scale breaches. Earlier this week, the Chinese platform was targeted by persistent cyberattacks, which it appeared unable to thwart, forcing it to suspend new user registrations for nearly 24 hours.

Daily Brief Summary

DATA BREACH // Chinese AI Firm Exposes Over Million User Chats and Data

DeepSeek, a Chinese AI startup, inadvertently exposed two databases containing over a million plaintext user chats and sensitive operational information.

The unsecured databases were found on subdomains that allowed unauthorized SQL queries without authentication, posing a severe security risk.

Discovered by Wiz Research, the data exposure included chat logs, API keys, backend details, operational metadata, and potentially plaintext passwords.

This exposure was critical as it left DeepSeek vulnerable to data theft and unauthorized access, which could lead to further system intrusions and data breaches.

Despite the swift response from DeepSeek in securing the databases after being alerted by Wiz, concerns persist about the company's overall security posture.

The incident raises additional privacy concerns, especially given DeepSeek's obligation to adhere to stringent government data access requests in China.

DeepSeek had faced persistent cyberattacks earlier in the week, which even led to a temporary suspension of new user registrations.