Sumu's Diary

Sumu's Diary it's me sumu đŸĨ˛

pretty Little babies♡
08/08/2025

pretty Little babies♡

Just hold my hand, I want to stay with you as yours forever.🤍đŸ’ĢđŸ•Šī¸
03/08/2025

Just hold my hand, I want to stay with you as yours forever.🤍đŸ’ĢđŸ•Šī¸

āύ⧁āĻĄā§āϞāϏ āĻĒāĻ•ā§‹ā§œāĻžđŸ˜‹
02/08/2025

āύ⧁āĻĄā§āϞāϏ āĻĒāĻ•ā§‹ā§œāĻžđŸ˜‹

big dream 🤍
02/08/2025

big dream 🤍

āĻŽā§‡ā§Ÿā§‡āϰāĻž āĻāχāĻ–āĻžāύ⧇āχ āφāϟāĻ•āĻžā§ŸđŸ’—đŸĨš
01/08/2025

āĻŽā§‡ā§Ÿā§‡āϰāĻž āĻāχāĻ–āĻžāύ⧇āχ āφāϟāĻ•āĻžā§ŸđŸ’—đŸĨš

Handmade gifts >>>>
01/08/2025

Handmade gifts >>>>

small efforts does matter!💌
27/07/2025

small efforts does matter!💌

ā§§āĻŽ āĻŦāĻžāϰ āϕ⧋āύ⧋ āĻ•āύāĻŸā§‡āĻ¸ā§āϟ āĻ āĻ…āĻ‚āĻļāĻ—ā§āϰāĻšāύ āĻ•āϰāĻ›āĻŋ,āφāϰ ā§§āĻŽ āĻšāϞāĻžāĻŽđŸĨšđŸĨšmomo's ta onkk yummyyy chiloooođŸĨšđŸĨšMomo's N More-Maijdee
26/07/2025

ā§§āĻŽ āĻŦāĻžāϰ āϕ⧋āύ⧋ āĻ•āύāĻŸā§‡āĻ¸ā§āϟ āĻ āĻ…āĻ‚āĻļāĻ—ā§āϰāĻšāύ āĻ•āϰāĻ›āĻŋ,āφāϰ ā§§āĻŽ āĻšāϞāĻžāĻŽđŸĨšđŸĨš
momo's ta onkk yummyyy chiloooođŸĨšđŸĨš

Momo's N More-Maijdee

āĻĒā§āϰāĻĨāĻŽ āĻĻ⧇āĻ–āĻžā§Ÿ āĻŽāύ⧇  āĻšāϤ⧇ āĻĒāĻžāϰ⧇ āĻāϟāĻž āĻĒ⧇āχāĻ¨ā§āϟāĻŋāĻ‚, āĻ•āĻŋāĻ¨ā§āϤ⧁ āύāĻž āĻāϟāĻž āύāϰāĻ“ā§Ÿā§‡āϰ āĻāĻ•āϟāĻž āĻ—ā§āϰāĻžāĻŽ,
26/07/2025

āĻĒā§āϰāĻĨāĻŽ āĻĻ⧇āĻ–āĻžā§Ÿ āĻŽāύ⧇ āĻšāϤ⧇ āĻĒāĻžāϰ⧇ āĻāϟāĻž āĻĒ⧇āχāĻ¨ā§āϟāĻŋāĻ‚, āĻ•āĻŋāĻ¨ā§āϤ⧁ āύāĻž āĻāϟāĻž āύāϰāĻ“ā§Ÿā§‡āϰ āĻāĻ•āϟāĻž āĻ—ā§āϰāĻžāĻŽ,

30/01/2025

Hi everyone! 🌟 You can support me by sending Stars - they help me earn money to keep making content you love.

Whenever you see the Stars icon, you can send me Stars!

➤ DeepSeek Database Leaked – Full Control Over DB Secret keys, Logs & Chat History ExposedA security vulnerability in De...
30/01/2025

➤ DeepSeek Database Leaked – Full Control Over DB Secret keys, Logs & Chat History Exposed

A security vulnerability in DeepSeek, a prominent Chinese AI startup, exposed a publicly accessible ClickHouse database containing highly sensitive information, including over a million lines of log streams.

The breach, which included chat logs, API keys, backend details, and operational metadata, has raised alarms about the security practices of rapidly growing AI startups.

DeepSeek has recently garnered global attention for its flagship AI reasoning model, DeepSeek-R1, which is lauded for its cost-effectiveness and efficiency.

The company’s rapid ascent has placed it alongside industry giants like OpenAI in terms of performance. However, this incident underscores the challenges of maintaining robust security in the fast-moving AI industry.

A security vulnerability in DeepSeek, a prominent Chinese AI startup, exposed a publicly accessible ClickHouse database containing highly sensitive information, including over a million lines of log streams.

The breach, which included chat logs, API keys, backend details, and operational metadata, has raised alarms about the security practices of rapidly growing AI startups.

DeepSeek has recently garnered global attention for its flagship AI reasoning model, DeepSeek-R1, which is lauded for its cost-effectiveness and efficiency.

The company’s rapid ascent has placed it alongside industry giants like OpenAI in terms of performance. However, this incident underscores the challenges of maintaining robust security in the fast-moving AI industry.

The database, which was hosted on oauth2callback.deepseek.com:9000 and dev.deepseek.com:9000, allowed unrestricted access, enabling unauthorized users to execute SQL queries and view sensitive internal data.

The exposed database, connected to DeepSeek’s backend services, contained over one million log entries.

“This level of access posed a critical risk to DeepSeek’s own security and for its end-users. Not only an attacker could retrieve sensitive logs and actual plain-text chat messages, but they could also potentially exfiltrate plaintext passwords and local files along propriety information directly from the server using queries like: SELECT * FROM file(‘filename’) depending on their ClickHouse configuration.”

Key details included chat history from the company’s AI chatbot, plaintext API keys, backend service metadata, and internal directories, all of which were stored in the log_stream table. This exposure posed a serious risk not only to DeepSeek but also to its end-users’ privacy and data security.

How the Breach Was Found
Researchers used standard reconnaissance techniques to map DeepSeek’s external attack surface, initially identifying approximately 30 subdomains.

While most subdomains appeared to be routine hosts of chatbot interfaces, status pages, and documentation, further investigation revealed two open ports (8123 and 9000) leading to the ClickHouse database in the following hosts.

http://oauth2callback.deepseek.com:8123
http://dev.deepseek.com:8123
http://oauth2callback.deepseek.com:9000
http://dev.deepseek.com:9000

ClickHouse is a widely used, open-source, columnar database designed for processing large datasets in real time. Its HTTP interface allowed Wiz researchers to access the /play path and execute SQL commands, revealing the full list of tables stored in the database.

Tables output from ClickHouse Web UI
Among these, the log_stream table stood out for containing highly sensitive data, including plaintext logs of conversations, API secrets, and backend service details.

The lack of authentication on the database not only allowed access to sensitive data but also provided full control over the database.

This could have enabled attackers to execute malicious commands, steal proprietary information, or even escalate privileges within DeepSeek’s environment.

“An attacker with access to this database could exploit it to retrieve plaintext passwords, sensitive server data, and other confidential information,” Wiz Research stated. While the team refrained from executing intrusive queries by ethical research practices, they highlighted the critical nature of the security lapse.

After discovering the vulnerability, Wiz Research promptly informed DeepSeek, which quickly secured the exposed database and addressed the issue. The company has not yet released an official comment on the incident.

This incident highlights the significant risks associated with the rapid adoption of AI technologies. While attention is often focused on futuristic AI threats, such as model manipulation or adversarial attacks, this breach underscores the importance of addressing fundamental security risks—like the accidental exposure of sensitive infrastructure.

“As organizations race to adopt AI, the security frameworks designed to safeguard sensitive data are often overlooked,” said a spokesperson for Wiz Research. “This incident serves as a wake-up call for the entire industry.”

The DeepSeek database breach is a stark reminder of the critical importance of security in the AI space. As AI technologies become deeply embedded in businesses worldwide, startups and established companies alike must prioritize building secure infrastructures.

Without proper safeguards, sensitive user data and proprietary information remain at risk, threatening individual companies and the broader trust in AI ecosystems.

The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put t...
29/12/2023

The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put to use by the North Korea-linked Lazarus Group to launder ill-gotten proceeds.

"Sinbad has processed millions of dollars' worth of virtual currency from Lazarus Group heists, including the Horizon Bridge and Axie Infinity heists," the department said.

"Sinbad is also used by cybercriminals to obfuscate transactions linked to malign activities such as sanctions evasion, drug trafficking, the purchase of child sexual abuse materials, and additional illicit sales on darknet marketplaces."

In addition to the sanctions, Sinbad had its website seized as part of a coordinated law enforcement action between agencies in the U.S., Finland, and the Netherlands.

The development builds on prior actions undertaken by governments in Europe and the U.S. to blockade mixers such as Blender, Tornado Cash, and ChipMixer, all of which have been accused of providing "material support" to the hacking crew by laundering the stolen assets through their services.

Sinbad, created by an individual who goes by the alias "Mehdi" in September 2022, told WIRED earlier this February that it was a legitimate privacy-preserving initiative and that it was launched as a response to the "growing centralization of cryptocurrency and the erosion of the privacy promises it once appeared to offer."

It also emerged as a replacement for Blender, with the Lazarus Group using it to launder virtual currency plundered following the hacks of Atomic Wallet and Harmony Horizon Bridge.

"Overall, more than one third of funds sent to Sinbad during its lifetime have come from crypto hacks," Chainalysis said. "Following the takedown of Tornado Cash and Blender.io last year, Sinbad emerged as the mixer of choice for DPRK-based hacking activities."

Sinbad has also been used by ransomware actors, darknet markets, and scammers, leveraging it to facilitate illicit transactions by obfuscating their origin, destination, and counterparties.

Blockchain analytics firm Elliptic said there is evidence to suggest that the same individual or group is highly likely behind both Sinbad and Blender based on an examination of on-chain patterns, the way in which the two mixers operate, similarities in their websites, and their connections to Russia.

"Analysis of blockchain transactions shows that, before it was publicly launched, a 'service' address on the Sinbad website received Bitcoin from a wallet believed to be controlled by the operator of Blender – presumably in order to test the service," the company noted.

"A Bitcoin wallet used to pay individuals who promoted Sinbad, itself received Bitcoin from the suspected Blender operator wallet. Almost all of the early incoming transactions to Sinbad originated from the suspected Blender operator wallet."

The development comes as Vitalii Chychasov, a 37-year-old administrator of the now-dismantled online marketplace named SSNDOB, was sentenced to eight years in federal prison in the U.S. for selling personal information, including the names, dates of birth, and Social Security numbers.

Chychasov, an Ukrainian national, was arrested in March 2022 while attempting to enter Hungary. He was subsequently extradited to the U.S. in July 2022. SSNDOB was taken down in a joint operation led by the U.S., Cyprus, and Latvia in June 2022.

Address

Noakhali Sadar Upazila

Website

Alerts

Be the first to know and let us send you an email when Sumu's Diary posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Sumu's Diary:

Share