Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    T-glass, a type of ultrathin glass sheet used in advanced chips, is in short supply and largely comes from Nittobo, which is not adding capacity for months (Yang Jie/Wall Street Journal)

    February 8, 2026

    New data sources and spark_apply() capabilities, better interfaces for sparklyr extensions, and more!

    February 8, 2026

    Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

    February 8, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
    IT/ Cybersecurity

    China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

    big tee tech hubBy big tee tech hubFebruary 7, 2026004 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananFeb 06, 2026Malware / IoT Security

    China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

    Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that’s operated by China-nexus threat actors since at least 2019.

    The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices. Its primary targets seem to be Chinese-speaking users, an assessment based on the presence of credential harvesting phishing pages for Chinese email services, exfiltration modules for popular Chinese mobile applications like WeChat, and code references to Chinese media domains.

    “DKnife’s attacks target a wide range of devices, including PCs, mobile devices, and Internet of Things (IoT) devices,” Cisco Talos researcher Ashley Shen noted in a Thursday report. “It delivers and interacts with the ShadowPad and DarkNimbus backdoors by hijacking binary downloads and Android application updates.”

    The cybersecurity company said it discovered DKnife as part of its ongoing monitoring of another Chinese threat activity cluster codenamed Earth Minotaur that’s linked to tools like the MOONSHINE exploit kit and the DarkNimbus (aka DarkNights) backdoor. Interestingly, the backdoor has also been put to use by a third China-aligned advanced persistent threat (APT) group called TheWizards.

    An analysis of DKnife’s infrastructure has uncovered an IP address hosting WizardNet, a Windows implant deployed by TheWizards via an AitM framework referred to as Spellbinder. Details of the toolkit were documented by ESET in April 2025.

    The targeting of Chinese-speaking users, Cisco said, hinges on the discovery of configuration files obtained from a single command-and-control (C2) server, raising the possibility that there could be other servers hosting similar configurations for different regional targeting.

    This is significant in light of infrastructural connections between DKnife and WizardNet, as TheWizards is known to target individuals and the gambling sector across Cambodia, Hong Kong, Mainland China, the Philippines, and the United Arab Emirates.

    postapi
    Functions of seven DKnife components

    Unlike WizardNet, DKnife is engineered to be run on Linux-based devices. Its modular architecture enables operators to serve a wide range of functions, ranging from packet analysis to traffic manipulation. Delivered by means of an ELF downloader, it contains seven different components –

    • dknife.bin – The central nervous system of the framework responsible for deep packet inspection, user activities reporting, binary download hijacking, and DNS hijacking
    • postapi.bin – A data reporter module that acts as a relay by receiving traffic from DKnife and reporting to remote C2
    • sslmm.bin – A reverse proxy module modified from HAProxy that performs TLS termination, email decryption, and URL rerouting
    • mmdown.bin – An updater module that connects to a hard-coded C2 server to download APKs used for the attack
    • yitiji.bin – A packet forwarder module that creates a bridged TAP interface on the router to host and route attacker-injected LAN traffic
    • remote.bin – A peer-to-peer (P2P) VPN client module that creates a communication channel to remote C2
    • dkupdate.bin – An updater and watchdog module that keeps the various components alive

    “DKnife can harvest credentials from a major Chinese email provider and host phishing pages for other services,” Talos said. “For harvesting email credentials, the sslmm.bin component presents its own TLS certificate to clients, terminates and decrypts POP3/IMAP connections, and inspects the plaintext stream to extract usernames and passwords.”

    “Extracted credentials are tagged with ‘PASSWORD,’ forwarded to the postapi.bin component, and ultimately relayed to remote C2 servers.”

    The core component of the framework is “dknife.bin,” which takes care of deep packet inspection, allowing operators to conduct traffic monitoring campaigns ranging from “covert monitoring of user activity to active in-line attacks that replace legitimate downloads with malicious payloads.” This includes –

    • Serving updated C2 to Android and Windows variants of DarkNimbus malware
    • Conducting Domain Name System (DNS)-based hijacking over IPv4 and IPv6 to facilitate malicious redirects for JD.com-related domains
    • Hijacking and replacing Android application updates associated with Chinese news media, video streaming, image editing apps, e-commerce platforms, taxi-service platforms, gaming, and pornography video streaming apps by intercepting their update manifest requests
    • Hijacking Windows and other binary downloads based on certain pre-configured rules to deliver via DLL side-loading the ShadowPad backdoor, which then loads DarkNimbus
    • Interfering with communications from antivirus and PC-management products, including 360 Total Security and Tencent services
    • Monitoring user activity in real-time and reporting it back to the C2 server

    “Routers and edge devices remain prime targets in sophisticated targeted attack campaigns,” Talos said. “As threat actors intensify their efforts to compromise this infrastructure, understanding the tools and TTPs they employ is critical. The discovery of the DKnife framework highlights the advanced capabilities of modern AitM threats, which blend deep‑packet inspection, traffic manipulation, and customized malware delivery across a wide range of device types.”



    Source link

    AitM ChinaLinked delivery DKnife framework Hijacking Malware routers targets Traffic
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

    February 8, 2026

    State actor targets 155 countries in ‘Shadow Campaigns’ espionage op

    February 8, 2026

    Microsoft bumps .NET Framework 3.5 from Windows installers

    February 7, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    T-glass, a type of ultrathin glass sheet used in advanced chips, is in short supply and largely comes from Nittobo, which is not adding capacity for months (Yang Jie/Wall Street Journal)

    February 8, 2026

    New data sources and spark_apply() capabilities, better interfaces for sparklyr extensions, and more!

    February 8, 2026

    Fake Dubai Crown Prince tracked to Nigerian mansion after $2.5M romance scam

    February 8, 2026

    Nanotoxicology Advances to Integrated Safety Frameworks

    February 8, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    T-glass, a type of ultrathin glass sheet used in advanced chips, is in short supply and largely comes from Nittobo, which is not adding capacity for months (Yang Jie/Wall Street Journal)

    February 8, 2026

    New data sources and spark_apply() capabilities, better interfaces for sparklyr extensions, and more!

    February 8, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.