Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. DKnife: China-Linked AitM Framework Hijacks Router Traffic
DKnife: China-Linked AitM Framework Hijacks Router Traffic
NEWS

DKnife: China-Linked AitM Framework Hijacks Router Traffic

Cisco Talos uncovers a seven-component Linux framework called DKnife that compromises routers to intercept credentials, replace downloads with trojans,...

Dylan H.

News Desk

February 6, 2026
4 min read

Router-Level Espionage Framework Exposed

Cisco Talos researchers have uncovered DKnife, a sophisticated adversary-in-the-middle (AitM) framework comprising seven Linux-based implants designed to compromise routers and edge devices for deep packet inspection, credential theft, and malware delivery. The framework has been operational since at least 2019 and is attributed to China-nexus threat actors with links to the Earth Minotaur and TheWizards APT clusters.

DKnife represents a growing trend of targeting network infrastructure rather than endpoints. By compromising the router itself, attackers gain a privileged position to intercept, modify, and redirect all traffic passing through the device without touching the victim's machine.


How DKnife Works

Seven-Component Architecture

DKnife is modular by design. Each component handles a specific function in the attack chain:

ComponentFunction
dknife.binCore module: deep packet inspection, DNS hijacking, binary replacement
sslmm.binHAProxy-based reverse proxy for TLS termination and decryption
postapi.binData relay module reporting stolen data to C2 servers
mmdown.binAPK update downloader for replacing legitimate mobile app updates
yitiji.binPacket forwarder creating bridged TAP interfaces for traffic interception
remote.binP2P VPN client for covert C2 communication
dkupdate.binUpdate and watchdog module ensuring persistence

Attack Flow

Once deployed on a compromised router, DKnife operates as a transparent man-in-the-middle:

  1. Traffic interception - The core module performs deep packet inspection on all traffic traversing the router
  2. Credential harvesting - Decrypts POP3/IMAP email streams to extract login credentials (tagged as "PASSWORD" in internal logs)
  3. Download replacement - Swaps legitimate software downloads and Android app updates with trojaned versions mid-transit
  4. DNS hijacking - Redirects both IPv4 and IPv6 DNS queries to attacker-controlled infrastructure
  5. Malware delivery - Deploys ShadowPad and DarkNimbus backdoors to victim devices via DLL side-loading

What DKnife Monitors

The framework's surveillance capabilities are extensive. Cisco Talos identified monitoring configurations targeting:

  • Email credentials from major providers
  • WeChat communications and contacts
  • E-commerce transactions (including JD.com)
  • Banking and financial application traffic
  • Video streaming activity
  • Messaging, gaming, and dating applications
  • Security product communications (360 Total Security, Tencent)

"Routers and edge devices remain prime targets in sophisticated targeted attack campaigns. DKnife's attacks target a wide range of devices, including PCs, mobile devices, and Internet of Things devices." - Cisco Talos

The monitoring of security product communications is particularly concerning, as it allows attackers to understand what defenses are present and potentially subvert update mechanisms.


Attribution and Targets

China-Nexus Indicators

Multiple factors point to Chinese state-sponsored origin:

  • Credential harvesting specifically targets Chinese email services
  • Exfiltration modules focus on WeChat and Chinese applications
  • Code references to Chinese media domains
  • Infrastructure overlaps with Earth Minotaur (a known Chinese APT cluster)
  • Connection to TheWizards APT group and its WizardNet implant

Geographic Focus

RegionTarget Types
CambodiaGovernment and civil society
Hong KongMedia and communications
Mainland ChinaDissident and minority communities
PhilippinesGovernment agencies
UAEBusiness and diplomatic targets

Defensive Recommendations

For Network Teams

  1. Audit router and edge device integrity - Compare firmware hashes against vendor-provided checksums to detect unauthorized modifications
  2. Monitor for anomalous traffic patterns - Look for unexpected TAP interfaces, unusual DNS responses, or TLS certificate mismatches originating from network devices
  3. Segment router management interfaces - Ensure administrative access to network devices is isolated from general traffic
  4. Deploy out-of-band monitoring - DKnife operates at the network level, so endpoint tools alone will not detect it

For Security Teams

  1. Inspect application update chains - Verify that mobile app and software updates arrive from expected sources with valid signatures
  2. Monitor for ShadowPad and DarkNimbus indicators - Review Cisco Talos IOCs for file hashes, C2 domains, and behavioral patterns
  3. Review DNS query logs - Identify unexpected DNS redirection that could indicate DKnife's DNS hijacking module
  4. Evaluate edge device patching cadence - Routers frequently lag behind in patch management, creating the initial foothold

For Organizations in Targeted Regions

  • Organizations in Southeast Asia and Chinese-speaking regions should treat this as an active and ongoing threat
  • Conduct router-level forensics as part of incident response procedures
  • Consider hardware-based network monitoring that operates independently of potentially compromised infrastructure

Sources

  • The Hacker News - China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • Cisco Talos Intelligence Research

Related Articles

  • Fortinet FortiGate Mass Exploitation Underway
  • Ivanti Connect Secure Under Active Attack
#Malware#Nation-State#The Hacker News#Vulnerability#Critical Infrastructure

Related Articles

WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Cybersecurity researchers have uncovered a sophisticated new payment skimmer that weaponises WebRTC data channels to exfiltrate stolen credit card data...

4 min read

Trivy Vulnerability Scanner Breached to Push Infostealer via GitHub Actions

The Trivy open-source vulnerability scanner was compromised in a supply chain attack by the threat group TeamPCP, which hijacked 75 release tags and...

6 min read

New Speagle Malware Hijacks Cobra DocGuard for State-Sponsored Espionage

A newly discovered .NET infostealer dubbed Speagle repurposes compromised Cobra DocGuard servers for C2 and data exfiltration, targeting organizations...

3 min read
Back to all News