Cisco Talos uncovers DKnife, a sophisticated adversary-in-the-middle framework operated by Chinese threat actors since 2019, targeting routers and edge devices to hijack traffic, harvest credentials, and deliver malware like ShadowPad and DarkNimbus to Chinese-speaking users.
Cybersecurity researchers have uncovered a sophisticated gateway-monitoring and adversary-in-the-middle (AitM) framework dubbed DKnife that's been operated by China-nexus threat actors since at least 2019. The framework comprises seven Linux-based implants designed to perform deep packet inspection, manipulate traffic, and deliver malware via routers and edge devices.

Targeting Chinese-Speaking Users
The primary targets appear to be Chinese-speaking users, based on several key indicators:
- Credential harvesting phishing pages for Chinese email services
- Exfiltration modules for popular Chinese mobile applications like WeChat
- Code references to Chinese media domains
"DKnife's attacks target a wide range of devices, including PCs, mobile devices, and Internet of Things (IoT) devices," Cisco Talos researcher Ashley Shen noted in a Thursday report. "It delivers and interacts with the ShadowPad and DarkNimbus backdoors by hijacking binary downloads and Android application updates."
Connection to Other Chinese APT Groups
The discovery of DKnife came as part of Cisco Talos's ongoing monitoring of another Chinese threat activity cluster codenamed Earth Minotaur, which is linked to tools like the MOONSHINE exploit kit and the DarkNimbus (aka DarkNights) backdoor. Interestingly, the backdoor has also been utilized by a third China-aligned advanced persistent threat (APT) group called TheWizards.
An analysis of DKnife's infrastructure uncovered an IP address hosting WizardNet, a Windows implant deployed by TheWizards via an AitM framework referred to as Spellbinder. Details of the toolkit were documented by ESET in April 2025.
The targeting of Chinese-speaking users hinges on the discovery of configuration files obtained from a single command-and-control (C2) server, raising the possibility that there could be other servers hosting similar configurations for different regional targeting. This is significant given the infrastructural connections between DKnife and WizardNet, as TheWizards is known to target individuals and the gambling sector across Cambodia, Hong Kong, Mainland China, the Philippines, and the United Arab Emirates.
The Seven DKnife Components
Unlike WizardNet, DKnife is engineered to be run on Linux-based devices. Its modular architecture enables operators to serve a wide range of functions, ranging from packet analysis to traffic manipulation. Delivered by means of an ELF downloader, it contains seven different components:
dknife.bin
- The central nervous system of the framework
- Responsible for deep packet inspection
- User activities reporting
- Binary download hijacking
- DNS hijacking
postapi.bin
- A data reporter module that acts as a relay
- Receives traffic from DKnife
- Reports to remote C2 servers
sslmm.bin
- A reverse proxy module modified from HAProxy
- Performs TLS termination
- Email decryption
- URL rerouting
mmdown.bin
- An updater module
- Connects to a hard-coded C2 server
- Downloads APKs used for the attack
yitiji.bin
- A packet forwarder module
- Creates a bridged TAP interface on the router
- Hosts and routes attacker-injected LAN traffic
remote.bin
- A peer-to-peer (P2P) VPN client module
- Creates a communication channel to remote C2 servers
dkupdate.bin
- An updater and watchdog module
- Keeps the various components alive
Credential Harvesting Capabilities
"DKnife can harvest credentials from a major Chinese email provider and host phishing pages for other services," Talos said. "For harvesting email credentials, the sslmm.bin component presents its own TLS certificate to clients, terminates and decrypts POP3/IMAP connections, and inspects the plaintext stream to extract usernames and passwords."
"Extracted credentials are tagged with 'PASSWORD,' forwarded to the postapi.bin component, and ultimately relayed to remote C2 servers."
Traffic Manipulation and Malware Delivery
The core component of the framework is "dknife.bin," which takes care of deep packet inspection, allowing operators to conduct traffic monitoring campaigns ranging from "covert monitoring of user activity to active in-line attacks that replace legitimate downloads with malicious payloads."
This includes:
- Serving updated C2 to Android and Windows variants of DarkNimbus malware
- Conducting Domain Name System (DNS)-based hijacking over IPv4 and IPv6 to facilitate malicious redirects for JD.com-related domains
- Hijacking and replacing Android application updates associated with Chinese news media, video streaming, image editing apps, e-commerce platforms, taxi-service platforms, gaming, and pornography video streaming apps by intercepting their update manifest requests
- Hijacking Windows and other binary downloads based on certain pre-configured rules to deliver via DLL side-loading the ShadowPad backdoor, which then loads DarkNimbus
- Interfering with communications from antivirus and PC-management products, including 360 Total Security and Tencent services
- Monitoring user activity in real-time and reporting it back to the C2 server
The Growing Threat to Router Infrastructure
"Routers and edge devices remain prime targets in sophisticated targeted attack campaigns," Talos said. "As threat actors intensify their efforts to compromise this infrastructure, understanding the tools and TTPs they employ is critical. The discovery of the DKnife framework highlights the advanced capabilities of modern AitM threats, which blend deep-packet inspection, traffic manipulation, and customized malware delivery across a wide range of device types."
The discovery of DKnife underscores the evolving sophistication of Chinese-linked cyber operations and their focus on compromising network infrastructure to enable persistent access and data theft operations. Organizations should ensure their routers and edge devices are properly secured, regularly updated, and monitored for signs of compromise.

Comments
Please log in or register to join the discussion