Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework

0
Medium
Published: Thu Feb 05 2026 (02/05/2026, 20:16:27 UTC)
Source: AlienVault OTX General

Description

DKnife is a sophisticated adversary-in-the-middle (AitM) malware framework discovered by Cisco Talos, used since 2019 by China-nexus threat actors. It consists of seven Linux-based implants deployed on routers and edge devices to perform deep-packet inspection, traffic manipulation, and malware delivery targeting PCs, mobile devices, and IoT. DKnife delivers backdoors such as ShadowPad and DarkNimbus and employs techniques including DNS hijacking, Android app update hijacking, Windows binary hijacking, antivirus traffic disruption, and user activity monitoring. The framework primarily targets Chinese-speaking users but poses risks to any network with vulnerable edge devices. It shares operational lineage with the WizardNet campaign, indicating a mature and evolving threat. No known exploits in the wild have been reported, but the complexity and persistence of DKnife make it a significant threat. The medium severity rating reflects its targeted nature and operational sophistication. European organizations using vulnerable network infrastructure or serving Chinese-speaking communities should be vigilant.

AI-Powered Analysis

AILast updated: 02/05/2026, 21:00:06 UTC

Technical Analysis

DKnife is an advanced gateway-monitoring and adversary-in-the-middle (AitM) framework uncovered by Cisco Talos, comprising seven distinct Linux-based implants designed to infiltrate routers and edge devices. Operational since 2019, it enables attackers to perform deep-packet inspection and manipulate network traffic to facilitate malware delivery and persistent access. The framework targets a broad range of devices including PCs, mobile devices, and IoT endpoints by intercepting and altering network communications. Key capabilities include DNS hijacking to redirect traffic, hijacking Android application updates to distribute malicious payloads, hijacking Windows binaries to execute malware, and disrupting antivirus traffic to evade detection. It also monitors user activity to gather intelligence. DKnife delivers sophisticated backdoors such as ShadowPad and DarkNimbus, which provide remote access and control. The malware's infrastructure and code share links with the WizardNet campaign, suggesting shared development or operational resources among China-nexus threat actors. Indicators of compromise include specific IP addresses, SSL certificate fingerprints, and file hashes. Although no active exploits have been publicly reported, the framework's complexity and stealth make it a potent tool for long-term espionage and network compromise. The threat is primarily focused on Chinese-speaking users but could impact any organization with vulnerable edge devices, especially those with routers or gateways running Linux-based firmware. The medium severity rating reflects the targeted nature and operational sophistication, balanced against the lack of widespread exploitation evidence.

Potential Impact

For European organizations, DKnife poses a significant risk primarily to those with network infrastructure that includes Linux-based routers and edge devices, especially if these devices are not regularly updated or monitored. The malware's ability to perform deep-packet inspection and traffic manipulation can lead to data exfiltration, espionage, and the delivery of additional malware such as ShadowPad and DarkNimbus backdoors. This can compromise confidentiality and integrity of sensitive data, disrupt normal network operations, and potentially degrade availability through traffic manipulation or antivirus disruption. Organizations serving Chinese-speaking communities or with business ties to China may be specifically targeted, increasing their risk profile. The stealthy nature of DKnife and its persistence mechanisms complicate detection and remediation, potentially allowing prolonged unauthorized access. The disruption of antivirus traffic and hijacking of legitimate update mechanisms can undermine endpoint security, increasing the risk of secondary infections. Overall, the threat could impact critical infrastructure, government agencies, telecommunications, and enterprises with exposed or poorly secured edge devices, leading to espionage, intellectual property theft, and operational disruptions.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy focused on securing network edge devices. First, conduct comprehensive inventories of all routers, gateways, and edge devices, verifying firmware versions and applying all available security patches promptly. Deploy network segmentation to isolate critical systems from less secure edge devices. Implement strict access controls and disable unnecessary services on network devices to reduce attack surface. Monitor network traffic for anomalies indicative of DNS hijacking, traffic manipulation, or unusual update behaviors. Use network intrusion detection systems (NIDS) with signatures or heuristics tuned to detect known DKnife indicators such as specific IP addresses, SSL certificate fingerprints, and file hashes. Employ endpoint detection and response (EDR) solutions capable of identifying ShadowPad, DarkNimbus, and related backdoors. Regularly audit and harden update mechanisms for Android applications and Windows binaries to prevent hijacking. Establish robust logging and alerting to detect user activity monitoring attempts. Collaborate with threat intelligence providers to stay updated on emerging indicators and tactics related to DKnife and WizardNet. Finally, conduct targeted security awareness training for IT staff on the risks of gateway-level compromises and the importance of securing network infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.talosintelligence.com/knife-cutting-the-edge/"]
Adversary
China-nexus threat actors
Pulse Id
6984fa9b481e11f8426b9eb0
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashc0a25786959eae643c1189b8b0ee549d
hashc62d929e7b7e7b6165923a5dfc60cb56
hashcd09f8f7ea3b57d5eb6f3f16af445454
hash13dda1896509d5a27bce1e2b26fef51707c19503
hash17a2dd45f9f57161b4cc40924296c4deab65beea447efb46d3178a9e76815d06
hash2550aa4c4bc0a020ec4b16973df271b81118a7abea77f77fec2f575a32dc3444
hash43891d3898a54a132d198be47a44a8d4856201fa7a87f3f850432ba9e038893a
hashc59509018bbbe5482452a205513a2eb5d86004369309818ece7eba7a462ef854

Ip

ValueDescriptionCopy
ip117.175.185.81
ip47.93.54.134
ip240e:a03:a03:303:a03:303:a03:303

Sslcertfingerprint

ValueDescriptionCopy
sslcertfingerprint78:47:e0:0e:9c:0a:60:80:a6:48:ce:97:7f:30:63:7e:8a:d5:22:97:ea:10:8e:5f:cb:e9:87:48:49:bc:a5:47
sslcertfingerprint80:bc:19:8b:a9:e9:0e:62:50:4b:21:ec:69:2f:87:30:3b:7d:75:e7:a8:95:06:d3:0b:fa:52:18:57:23:3d:72

Url

ValueDescriptionCopy
urlhttp://117.175.185.81:8003/
urlhttp://43.132.205.118:81/app/minibrowser11_rpl.zip
urlhttp://47.93.54.134:8005
urlhttp://47.93.54.134:8005/
urlhttps://47.93.54.134:8003

Threat ID: 69850155f9fa50a62f38cca7

Added to database: 2/5/2026, 8:45:09 PM

Last enriched: 2/5/2026, 9:00:06 PM

Last updated: 2/6/2026, 2:55:15 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats