The DeepSeek AI model is a **large language model (LLM)** developed in China that has been leveraged for offensive cyber operations, particularly those targeting U.S. critical infrastructure.

Checked on December 17, 2025
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

This fact-check may be outdated. Consider refreshing it to get the most current information.

Executive summary

DeepSeek is a Chinese-developed large language model (LLM) whose rapid rise has prompted U.S. and allied officials to warn it presents serious cyber, privacy, and influence risks — including being well-suited to scale offensive cyber activity — but publicly available reporting does not show a verified, finished campaign that has successfully used DeepSeek to degrade U.S. critical infrastructure as of the sources provided [1] [2] [3]. Analysts and government reports characterize DeepSeek as both an effective, low-cost model and as unusually vulnerable, meaning it can materially lower the bar for certain malicious cyber tasks while still lagging top U.S. models in safer design [4] [5] [6].

1. What DeepSeek is and why experts alarmed

DeepSeek is described across multiple investigations as a China-based LLM and chatbot that rapidly achieved capabilities close to leading Western models while operating with different safety and data-handling practices; researchers say its architecture and access to large datasets make it especially useful for offensive cyber tasks like scalable phishing, code generation for exploits, and large‑scale data correlation useful to intelligence campaigns [1] [7] [4]. U.S. congressional and security bodies have raised alarms that DeepSeek’s development prioritized speed and scale over robust guardrails, and that the company’s privacy policy and embedded code paths raise the prospect of user data flowing to China-based servers and possibly state-linked actors [8] [2] [7].

2. Evidence it has been used for offensive or influence operations — what exists

Reporting indicates DeepSeek and similar models have been used by China-based actors for phishing and disinformation operations against U.S. targets, and lawmakers have warned state and local officials about security risks associated with the model’s use, implying operational exploitation for information operations is occurring now [3] [2]. Security firms and national agencies have also found features that could amplify offensive cyber campaigns — for instance automation of reconnaissance, synthesis of spearphishing content, and correlation of disparate datasets that could de-anonymize data — capabilities explicitly framed as useful to advanced persistent threat (APT) activity [1] [7].

3. What remains unproven or contested

No source in the provided reporting documents a conclusive, forensic attribution showing DeepSeek directly conducted or materially enabled an identified destructive cyberattack on U.S. critical infrastructure (for example, a power grid outage) — the public record cited here instead contains risk assessments, demonstrations of utility in phishing and code generation, and allegations of potential misuse [1] [3] [2]. Independent technical evaluations also complicate the threat picture: U.S. testing later found DeepSeek models lag behind the best U.S. systems on many benchmarks and that they are far more susceptible to jailbreaking and unsafe outputs, which both raises misuse risk and suggests the tool is not strictly superior to Western counterparts [5].

4. Motives, biases, and political context shaping the narrative

Several U.S. government and congressional sources frame DeepSeek as a national security threat in the context of broader strategic competition with China, with explicit policy recommendations to restrict its use on critical systems; such sources have institutional motives to emphasize worst-case risks [9] [2]. Conversely, Chinese state media and company statements have characterized cyber incidents around DeepSeek differently — for example asserting cyberattacks against DeepSeek originated from the U.S. — illustrating reciprocal information and political framing in play [10] [11]. Independent analysts caution that some outages attributed to attacks could reflect scalability issues or hype-driven narratives rather than confirmed hostile exploitation [12].

5. Bottom line for policymakers and defenders

The reporting establishes that DeepSeek materially lowers the technical and cost barriers for many offensive cyber tasks, has been used or repurposed for phishing and information operations, and presents data‑flow and censorship risks linked to Chinese legal and commercial structures — all of which justify treating the model as a consequential risk to critical‑infrastructure cybersecurity and supply chains [1] [3] [7]. At the same time, the sources do not supply an incontrovertible public case that DeepSeek has already been used to carry out a successful, destructive attack on U.S. critical infrastructure; that important evidentiary gap should shape measured but precautionary policy responses [5] [2].

Want to dive deeper?
What documented instances exist of AI-assisted phishing or phishing campaigns linked to Chinese models since 2024?
How have U.S. agencies and private-sector defenders tested DeepSeek for exploit generation and jailbreak susceptibility?
What legal and technical controls could prevent foreign LLMs from being used on U.S. critical infrastructure?