top of page

China-Linked DKnife AitM Framework Targets Routers for Cyberattacks

  • Feb 7
  • 2 min read

Key Findings


  • DKnife is a gateway-monitoring and adversary-in-the-middle (AitM) framework operated by China-nexus threat actors since at least 2019

  • It comprises seven Linux-based implants designed for deep packet inspection, traffic manipulation, and malware delivery via routers and edge devices

  • The framework's primary targets appear to be Chinese-speaking users, based on the presence of credential harvesting phishing pages for Chinese email services and exfiltration modules for popular Chinese mobile apps

  • DKnife can hijack binary downloads and Android application updates to deliver the ShadowPad and DarkNimbus backdoors

  • The framework is engineered to be run on Linux-based devices and has a modular architecture that enables a wide range of functions, from packet analysis to traffic manipulation


Background


Cybersecurity researchers have taken the wraps off a gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants that are designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices.


Targeting and Connections


The framework's primary targets seem to be Chinese-speaking users, an assessment based on the presence of credential harvesting phishing pages for Chinese email services, exfiltration modules for popular Chinese mobile applications like WeChat, and code references to Chinese media domains.


An analysis of DKnife's infrastructure has also uncovered an IP address hosting WizardNet, a Windows implant deployed by a China-aligned advanced persistent threat (APT) group called TheWizards via an AitM framework referred to as Spellbinder. This suggests a connection between DKnife and WizardNet, as TheWizards is known to target individuals and the gambling sector across Cambodia, Hong Kong, Mainland China, the Philippines, and the United Arab Emirates.


Functionality of DKnife Components


DKnife is engineered to be run on Linux-based devices and has a modular architecture that enables operators to perform a wide range of functions, including:


  • Deep packet inspection

  • User activity reporting

  • Binary download hijacking

  • DNS hijacking

  • Credential harvesting from Chinese email providers

  • Hosting phishing pages for other services

  • Serving updated C2 infrastructure for the DarkNimbus malware

  • Hijacking and replacing Android app updates and Windows binary downloads to deliver the ShadowPad backdoor


The core component, "dknife.bin," is responsible for these malicious activities, allowing the operators to conduct traffic monitoring and in-line attacks that replace legitimate downloads with malicious payloads.


Conclusion


DKnife is a sophisticated AitM framework that demonstrates the capabilities of China-linked threat actors in targeting routers and edge devices to hijack traffic, deliver malware, and monitor user activity. The framework's modular design and extensive functionality make it a significant threat, particularly for Chinese-speaking users.


Sources


  • https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html

  • https://x.com/TheCyberSecHub/status/2019788824864493691

  • https://www.cypro.se/2026/02/06/china-linked-dknife-aitm-framework-targets-routers-for-traffic-hijacking-malware-delivery/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page