Article Details
Scrape Timestamp (UTC): 2026-02-06 15:00:45.270
Source: https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
Original Article Text
Click to Toggle View
China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery. Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to be Chinese-speaking users, an assessment based on the presence of credential harvesting phishing pages for Chinese email services, exfiltration modules for popular Chinese mobile applications like WeChat, and code references to Chinese media domains. "DKnife's attacks target a wide range of devices, including PCs, mobile devices, and Internet of Things (IoT) devices," Cisco Talos researcher Ashley Shen noted in a Thursday report. "It delivers and interacts with the ShadowPad and DarkNimbus backdoors by hijacking binary downloads and Android application updates." The cybersecurity company said it discovered DKnife as part of its ongoing monitoring of another Chinese threat activity cluster codenamed Earth Minotaur that's linked to tools like the MOONSHINE exploit kit and the DarkNimbus (aka DarkNights) backdoor. Interestingly, the backdoor has also been put to use by a third China-aligned advanced persistent threat (APT) group called TheWizards. An analysis of DKnife's infrastructure has uncovered an IP address hosting WizardNet, a Windows implant deployed by TheWizards via an AitM framework referred to as Spellbinder. Details of the toolkit were documented by ESET in April 2025. The targeting of Chinese-speaking users, Cisco said, hinges on the discovery of configuration files obtained from a single command-and-control (C2) server, raising the possibility that there could be other servers hosting similar configurations for different regional targeting. This is significant in light of infrastructural connections between DKnife and WizardNet, as TheWizards is known to target individuals and the gambling sector across Cambodia, Hong Kong, Mainland China, the Philippines, and the United Arab Emirates. Unlike WizardNet, DKnife is engineered to be run on Linux-based devices. Its modular architecture enables operators to serve a wide range of functions, ranging from packet analysis to traffic manipulation. Delivered by means of an ELF downloader, it contains seven different components - "DKnife can harvest credentials from a major Chinese email provider and host phishing pages for other services," Talos said. "For harvesting email credentials, the sslmm.bin component presents its own TLS certificate to clients, terminates and decrypts POP3/IMAP connections, and inspects the plaintext stream to extract usernames and passwords." "Extracted credentials are tagged with 'PASSWORD,' forwarded to the postapi.bin component, and ultimately relayed to remote C2 servers." The core component of the framework is "dknife.bin," which takes care of deep packet inspection, allowing operators to conduct traffic monitoring campaigns ranging from "covert monitoring of user activity to active in-line attacks that replace legitimate downloads with malicious payloads." This includes - "Routers and edge devices remain prime targets in sophisticated targeted attack campaigns," Talos said. "As threat actors intensify their efforts to compromise this infrastructure, understanding the tools and TTPs they employ is critical. The discovery of the DKnife framework highlights the advanced capabilities of modern AitM threats, which blend deep‑packet inspection, traffic manipulation, and customized malware delivery across a wide range of device types."
Daily Brief Summary
Researchers have identified DKnife, an AitM framework linked to China-based actors, active since 2019, targeting routers and edge devices for traffic hijacking and malware delivery.
DKnife comprises seven Linux-based implants enabling deep packet inspection, traffic manipulation, and malware deployment, with a focus on Chinese-speaking users.
The framework interacts with ShadowPad and DarkNimbus backdoors, hijacking binary downloads and Android updates, and targets PCs, mobile devices, and IoT devices.
Cisco Talos discovered DKnife while monitoring Earth Minotaur, a Chinese threat cluster using the MOONSHINE exploit kit and DarkNimbus backdoor.
The infrastructure analysis revealed connections to TheWizards APT group, which uses a Windows implant, WizardNet, in similar AitM operations.
DKnife's modular architecture allows for diverse attack functions, including credential harvesting from Chinese email services via manipulated TLS certificates.
The discovery underscores the sophistication of modern AitM threats, emphasizing the need for robust defenses against traffic manipulation and malware delivery tactics.