Connect with us

Hi, what are you looking for?

AI Cybersecurity

AI-Driven Cyber Attack Exposes Kuaishou Users to Inappropriate Content for 90 Minutes

Kuaishou’s cybersecurity breach exposed 85 million users to inappropriate content for 90 minutes, revealing alarming vulnerabilities in AI-driven defenses.

Kuaishou, a prominent Chinese short-video platform and major competitor to TikTok and Douyin, faced a significant cybersecurity breach that compromised user safety during live streaming sessions. The incident occurred on March 19, 2025, and lasted for nearly 90 minutes, exposing viewers to inappropriate and abusive content that violated both platform guidelines and national content regulations. This disruption has raised alarms about the increasing sophistication of cyberattacks targeting major digital platforms.

Initial investigations indicated that the breach was facilitated by artificial intelligence and automated systems. Hackers managed to overwhelm Kuaishou’s infrastructure at an unprecedented scale. Preliminary findings suggest that the operation was highly coordinated, leading to speculation that state-funded actors from Western nations may be behind the attack. While definitive attribution remains unconfirmed, cybersecurity experts noted that the technical precision observed during the breach points toward advanced capabilities rather than typical isolated criminal activity.

In response to the incident, Kuaishou took rapid action to mitigate the damage. The company removed the offensive live streams and deleted all adult and violent content from its servers. Furthermore, it launched immediate remediation measures aimed at reassuring its users and preventing further exposure to harmful content. Kuaishou issued a public apology, acknowledging that approximately 85 million active live-stream users, out of its total user base of more than 416 million, were affected by the disruption.

Additional details surfaced in a statement by China Daily, which reported that the hacking group utilized around 17,000 automated bot accounts as part of their strategy. These bots manipulated server functions to broadcast prohibited content across live channels forcefully. The attackers leveraged automated software tools to evade content moderation systems, thereby exposing vulnerabilities that even leading technology platforms face despite existing safeguards.

The findings were corroborated by QAX, a cybersecurity firm based in Hong Kong, which emphasized the attack’s reliance on automation and artificial intelligence. Analysts highlighted that such incidents underscore the growing trend of malicious actors employing AI to enhance the speed, scale, and impact of digital attacks, complicating detection and prevention efforts for platform operators.

The timing of the breach has attracted further scrutiny. It coincided with a period when Chinese authorities, under the leadership of President Xi Jinping, were advocating for amendments to laws imposing stricter bans on the distribution of explicit and harmful online content. This coincidence has led some observers to speculate whether the cyberattack was intended as a retaliatory or symbolic act against China’s tightening digital regulations.

Overall, this incident highlights the evolving nature of cybersecurity threats in the age of artificial intelligence. It brings to the forefront the critical importance of maintaining robust content moderation systems, executing rapid incident responses, and fostering international cooperation to address complex cyber risks that increasingly affect global digital platforms. The Kuaishou breach serves as a stark reminder of the ongoing challenges faced by major technology companies in safeguarding their environments against sophisticated cyber threats.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

Top Stories

China's AI governance model, shaped by state, private sector, and societal influences, sees 23 of the world's top AI products from Chinese firms generating...

Top Stories

Amazon shares plummet 18% to $198.79 as a $200 billion AI investment plan stirs profitability doubts, marking a challenging market landscape for tech stocks.

AI Generative

ByteDance unveils Seedance 2.0, a cutting-edge AI video generator that creates 15-second clips using up to nine images and three audio files, revolutionizing content...

AI Generative

TikTok's Seedance 2.0, an AI video creation tool, sparks Hollywood backlash as users generate viral content featuring A-list stars like Tom Cruise and Brad...

Top Stories

ByteDance invests billions in AI by 2026, launching Doubao with over 100M daily users, positioning itself as a leader amid rising global competition.

AI Regulation

Disney has sent a cease-and-desist letter to ByteDance, claiming its Seedance 2.0 AI tool unlawfully uses Disney's characters and assets for generative content.

AI Technology

DOE launches 26 AI challenges to cut nuclear deployment timelines by 50% and reduce operational costs by over 50% in a revolutionary energy initiative.

AI Generative

Bytedance launches Seedance 2.0, a revolutionary video generation AI allowing users to create intricate videos using up to 9 images and 3 videos simultaneously.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.