A newly found toolkit known as DKnife has been used since 2019 to hijack visitors on the edge-device stage and ship malware in espionage campaigns.
The framework serves as a post-compromise framework for visitors monitoring and adversary-in-the-middle (AitM) actions. It’s designed to intercept and manipulate visitors destined for endpoints (computer systems, cell gadgets, IoTs) on the community.
Researchers at Cisco Talos say that DKnife is an ELF framework with seven Linux-based elements designed for deep packet inspection (DPI), visitors manipulation, credential harvesting, and malware supply.

The malware options Simplified Chinese language language artifacts in part names and code feedback, and explicitly targets Chinese language providers corresponding to electronic mail suppliers, cell apps, media domains, and WeChat customers.
Talos researchers assess with excessive confidence that the operator of DKnife is a China-nexus menace actor.

Supply: Cisco Talos
Researchers could not decide how the community gear is compromised, however discovered that DKnife delivers and interacts with the ShadowPad and DarkNimbus backdoors, each related to Chinese language menace actors.
DKnife consists of seven modules, every accountable for particular actions associated to communication with the C2 servers, relaying or altering visitors, and hiding the malicious visitors origin:
- dknife.bin – responible for packet inspection and assault logics, it additionally stories assault standing, consumer actions, and sends collected knowledge
- postapi.bin – relay part between DKnife.bin and C2 servers
- sslmm.bin – customized reverse proxy server derived from HAProxy
- yitiji.bin – creates a digital Ethernet interface (TAP) on the router and bridges it into the LAN to route the attacker’s visitors
- distant.bin – peer-to-peer VPN consumer utilizing the n2n VPN software program
- mmdown.bin – malware downloader and updater for Android APK information
- dkupdate.bin – DKnife obtain, deploy, and replace part
“Its [DKnife’s] key capabilities include serving update C2 for the backdoors, DNS hijacking, hijacking Android application updates and binary downloads, delivering ShadowPad and DarkNimbus backdoors, selectively disrupting security-product traffic and exfiltrating user activity to remote C2 servers,” the researchers mentioned in a report this week.
As soon as put in, DKnife makes use of its yitiji.bin part to create a bridged TAP interface (digital community machine) on the router on the non-public IP tackle 10.3.3.3. This permits the menace actor to intercept and rewrite community packets of their transit to the meant host.
This fashion, DKnife can be utilized to ship malicious APK information to cell gadgets or Home windows methods on the community.
Cisco researchers noticed DKnife dropping the ShadowPad backdoor for Home windows signed with a Chinese language agency’s certificates. This motion was adopted by the deployment of the DarkNimbus backdoor. On Android gadgets, the backdoor is delivered straight by DKnife.

Supply: Cisco Talos
On the identical infrastructure related to the DKnife framework exercise, the researchers additionally discovered that it was internet hosting the WizardNet backdoor, which ESET researchers beforehand linked to the Spellbinder AitM framework.
Aside from payload supply, DKnife can be able to:
- DNS hijacking
- hijacking Android app updates
- hijacking Home windows binaries
- Credential harvesting through POP3/IMAP decryption
- Phishing web page internet hosting
- Anti-virus visitors disruption
- monitoring consumer exercise, together with messaging app use (WeChat and Sign), maps app use, information consumption, calling exercise, ride-hailing, and purchasing
WeChat actions are tracked extra analytically, Cisco Talos says, with DKnife monitoring for voice and video calls, textual content messages, photographs despatched and acquired, and articles learn on the platform.

Supply: Cisco Talos
The consumer’s exercise occasions are first routed internally between DKnife’s elements after which exfiltrated through HTTP POST requests to particular command-and-control (C2) API endpoints.
As a result of DKnife sits on gateway gadgets and stories occasions as packets go via, it permits monitoring consumer exercise and amassing knowledge in actual time.
As of January 2026, the DKnife C2 servers are nonetheless lively, the researchers say. Cisco Talos has revealed the complete set of indicators of compromise (IoCs) related to this exercise.

Fashionable IT infrastructure strikes quicker than handbook workflows can deal with.
On this new Tines information, learn the way your workforce can scale back hidden handbook delays, enhance reliability via automated response, and construct and scale clever workflows on prime of instruments you already use.



