Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
DKnife is a sophisticated adversary-in-the-middle (AitM) malware framework discovered by Cisco Talos, used since 2019 by China-nexus threat actors. It consists of seven Linux-based implants deployed on routers and edge devices to perform deep-packet inspection, traffic manipulation, and malware delivery targeting PCs, mobile devices, and IoT. DKnife delivers backdoors such as ShadowPad and DarkNimbus and employs techniques including DNS hijacking, Android app update hijacking, Windows binary hijacking, antivirus traffic disruption, and user activity monitoring. The framework primarily targets Chinese-speaking users but poses risks to any network with vulnerable edge devices. It shares operational lineage with the WizardNet campaign, indicating a mature and evolving threat. No known exploits in the wild have been reported, but the complexity and persistence of DKnife make it a significant threat. The medium severity rating reflects its targeted nature and operational sophistication. European organizations using vulnerable network infrastructure or serving Chinese-speaking communities should be vigilant.
AI Analysis
Technical Summary
DKnife is an advanced gateway-monitoring and adversary-in-the-middle (AitM) framework uncovered by Cisco Talos, comprising seven distinct Linux-based implants designed to infiltrate routers and edge devices. Operational since 2019, it enables attackers to perform deep-packet inspection and manipulate network traffic to facilitate malware delivery and persistent access. The framework targets a broad range of devices including PCs, mobile devices, and IoT endpoints by intercepting and altering network communications. Key capabilities include DNS hijacking to redirect traffic, hijacking Android application updates to distribute malicious payloads, hijacking Windows binaries to execute malware, and disrupting antivirus traffic to evade detection. It also monitors user activity to gather intelligence. DKnife delivers sophisticated backdoors such as ShadowPad and DarkNimbus, which provide remote access and control. The malware's infrastructure and code share links with the WizardNet campaign, suggesting shared development or operational resources among China-nexus threat actors. Indicators of compromise include specific IP addresses, SSL certificate fingerprints, and file hashes. Although no active exploits have been publicly reported, the framework's complexity and stealth make it a potent tool for long-term espionage and network compromise. The threat is primarily focused on Chinese-speaking users but could impact any organization with vulnerable edge devices, especially those with routers or gateways running Linux-based firmware. The medium severity rating reflects the targeted nature and operational sophistication, balanced against the lack of widespread exploitation evidence.
Potential Impact
For European organizations, DKnife poses a significant risk primarily to those with network infrastructure that includes Linux-based routers and edge devices, especially if these devices are not regularly updated or monitored. The malware's ability to perform deep-packet inspection and traffic manipulation can lead to data exfiltration, espionage, and the delivery of additional malware such as ShadowPad and DarkNimbus backdoors. This can compromise confidentiality and integrity of sensitive data, disrupt normal network operations, and potentially degrade availability through traffic manipulation or antivirus disruption. Organizations serving Chinese-speaking communities or with business ties to China may be specifically targeted, increasing their risk profile. The stealthy nature of DKnife and its persistence mechanisms complicate detection and remediation, potentially allowing prolonged unauthorized access. The disruption of antivirus traffic and hijacking of legitimate update mechanisms can undermine endpoint security, increasing the risk of secondary infections. Overall, the threat could impact critical infrastructure, government agencies, telecommunications, and enterprises with exposed or poorly secured edge devices, leading to espionage, intellectual property theft, and operational disruptions.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy focused on securing network edge devices. First, conduct comprehensive inventories of all routers, gateways, and edge devices, verifying firmware versions and applying all available security patches promptly. Deploy network segmentation to isolate critical systems from less secure edge devices. Implement strict access controls and disable unnecessary services on network devices to reduce attack surface. Monitor network traffic for anomalies indicative of DNS hijacking, traffic manipulation, or unusual update behaviors. Use network intrusion detection systems (NIDS) with signatures or heuristics tuned to detect known DKnife indicators such as specific IP addresses, SSL certificate fingerprints, and file hashes. Employ endpoint detection and response (EDR) solutions capable of identifying ShadowPad, DarkNimbus, and related backdoors. Regularly audit and harden update mechanisms for Android applications and Windows binaries to prevent hijacking. Establish robust logging and alerting to detect user activity monitoring attempts. Collaborate with threat intelligence providers to stay updated on emerging indicators and tactics related to DKnife and WizardNet. Finally, conduct targeted security awareness training for IT staff on the risks of gateway-level compromises and the importance of securing network infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: c0a25786959eae643c1189b8b0ee549d
- hash: c62d929e7b7e7b6165923a5dfc60cb56
- hash: cd09f8f7ea3b57d5eb6f3f16af445454
- hash: 13dda1896509d5a27bce1e2b26fef51707c19503
- hash: 17a2dd45f9f57161b4cc40924296c4deab65beea447efb46d3178a9e76815d06
- hash: 2550aa4c4bc0a020ec4b16973df271b81118a7abea77f77fec2f575a32dc3444
- hash: 43891d3898a54a132d198be47a44a8d4856201fa7a87f3f850432ba9e038893a
- hash: c59509018bbbe5482452a205513a2eb5d86004369309818ece7eba7a462ef854
- ip: 117.175.185.81
- ip: 47.93.54.134
- ip: 240e:a03:a03:303:a03:303:a03:303
- sslcertfingerprint: 78:47:e0:0e:9c:0a:60:80:a6:48:ce:97:7f:30:63:7e:8a:d5:22:97:ea:10:8e:5f:cb:e9:87:48:49:bc:a5:47
- sslcertfingerprint: 80:bc:19:8b:a9:e9:0e:62:50:4b:21:ec:69:2f:87:30:3b:7d:75:e7:a8:95:06:d3:0b:fa:52:18:57:23:3d:72
- url: http://117.175.185.81:8003/
- url: http://43.132.205.118:81/app/minibrowser11_rpl.zip
- url: http://47.93.54.134:8005
- url: http://47.93.54.134:8005/
- url: https://47.93.54.134:8003
Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
Description
DKnife is a sophisticated adversary-in-the-middle (AitM) malware framework discovered by Cisco Talos, used since 2019 by China-nexus threat actors. It consists of seven Linux-based implants deployed on routers and edge devices to perform deep-packet inspection, traffic manipulation, and malware delivery targeting PCs, mobile devices, and IoT. DKnife delivers backdoors such as ShadowPad and DarkNimbus and employs techniques including DNS hijacking, Android app update hijacking, Windows binary hijacking, antivirus traffic disruption, and user activity monitoring. The framework primarily targets Chinese-speaking users but poses risks to any network with vulnerable edge devices. It shares operational lineage with the WizardNet campaign, indicating a mature and evolving threat. No known exploits in the wild have been reported, but the complexity and persistence of DKnife make it a significant threat. The medium severity rating reflects its targeted nature and operational sophistication. European organizations using vulnerable network infrastructure or serving Chinese-speaking communities should be vigilant.
AI-Powered Analysis
Technical Analysis
DKnife is an advanced gateway-monitoring and adversary-in-the-middle (AitM) framework uncovered by Cisco Talos, comprising seven distinct Linux-based implants designed to infiltrate routers and edge devices. Operational since 2019, it enables attackers to perform deep-packet inspection and manipulate network traffic to facilitate malware delivery and persistent access. The framework targets a broad range of devices including PCs, mobile devices, and IoT endpoints by intercepting and altering network communications. Key capabilities include DNS hijacking to redirect traffic, hijacking Android application updates to distribute malicious payloads, hijacking Windows binaries to execute malware, and disrupting antivirus traffic to evade detection. It also monitors user activity to gather intelligence. DKnife delivers sophisticated backdoors such as ShadowPad and DarkNimbus, which provide remote access and control. The malware's infrastructure and code share links with the WizardNet campaign, suggesting shared development or operational resources among China-nexus threat actors. Indicators of compromise include specific IP addresses, SSL certificate fingerprints, and file hashes. Although no active exploits have been publicly reported, the framework's complexity and stealth make it a potent tool for long-term espionage and network compromise. The threat is primarily focused on Chinese-speaking users but could impact any organization with vulnerable edge devices, especially those with routers or gateways running Linux-based firmware. The medium severity rating reflects the targeted nature and operational sophistication, balanced against the lack of widespread exploitation evidence.
Potential Impact
For European organizations, DKnife poses a significant risk primarily to those with network infrastructure that includes Linux-based routers and edge devices, especially if these devices are not regularly updated or monitored. The malware's ability to perform deep-packet inspection and traffic manipulation can lead to data exfiltration, espionage, and the delivery of additional malware such as ShadowPad and DarkNimbus backdoors. This can compromise confidentiality and integrity of sensitive data, disrupt normal network operations, and potentially degrade availability through traffic manipulation or antivirus disruption. Organizations serving Chinese-speaking communities or with business ties to China may be specifically targeted, increasing their risk profile. The stealthy nature of DKnife and its persistence mechanisms complicate detection and remediation, potentially allowing prolonged unauthorized access. The disruption of antivirus traffic and hijacking of legitimate update mechanisms can undermine endpoint security, increasing the risk of secondary infections. Overall, the threat could impact critical infrastructure, government agencies, telecommunications, and enterprises with exposed or poorly secured edge devices, leading to espionage, intellectual property theft, and operational disruptions.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy focused on securing network edge devices. First, conduct comprehensive inventories of all routers, gateways, and edge devices, verifying firmware versions and applying all available security patches promptly. Deploy network segmentation to isolate critical systems from less secure edge devices. Implement strict access controls and disable unnecessary services on network devices to reduce attack surface. Monitor network traffic for anomalies indicative of DNS hijacking, traffic manipulation, or unusual update behaviors. Use network intrusion detection systems (NIDS) with signatures or heuristics tuned to detect known DKnife indicators such as specific IP addresses, SSL certificate fingerprints, and file hashes. Employ endpoint detection and response (EDR) solutions capable of identifying ShadowPad, DarkNimbus, and related backdoors. Regularly audit and harden update mechanisms for Android applications and Windows binaries to prevent hijacking. Establish robust logging and alerting to detect user activity monitoring attempts. Collaborate with threat intelligence providers to stay updated on emerging indicators and tactics related to DKnife and WizardNet. Finally, conduct targeted security awareness training for IT staff on the risks of gateway-level compromises and the importance of securing network infrastructure.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.talosintelligence.com/knife-cutting-the-edge/"]
- Adversary
- China-nexus threat actors
- Pulse Id
- 6984fa9b481e11f8426b9eb0
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashc0a25786959eae643c1189b8b0ee549d | — | |
hashc62d929e7b7e7b6165923a5dfc60cb56 | — | |
hashcd09f8f7ea3b57d5eb6f3f16af445454 | — | |
hash13dda1896509d5a27bce1e2b26fef51707c19503 | — | |
hash17a2dd45f9f57161b4cc40924296c4deab65beea447efb46d3178a9e76815d06 | — | |
hash2550aa4c4bc0a020ec4b16973df271b81118a7abea77f77fec2f575a32dc3444 | — | |
hash43891d3898a54a132d198be47a44a8d4856201fa7a87f3f850432ba9e038893a | — | |
hashc59509018bbbe5482452a205513a2eb5d86004369309818ece7eba7a462ef854 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip117.175.185.81 | — | |
ip47.93.54.134 | — | |
ip240e:a03:a03:303:a03:303:a03:303 | — |
Sslcertfingerprint
| Value | Description | Copy |
|---|---|---|
sslcertfingerprint78:47:e0:0e:9c:0a:60:80:a6:48:ce:97:7f:30:63:7e:8a:d5:22:97:ea:10:8e:5f:cb:e9:87:48:49:bc:a5:47 | — | |
sslcertfingerprint80:bc:19:8b:a9:e9:0e:62:50:4b:21:ec:69:2f:87:30:3b:7d:75:e7:a8:95:06:d3:0b:fa:52:18:57:23:3d:72 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://117.175.185.81:8003/ | — | |
urlhttp://43.132.205.118:81/app/minibrowser11_rpl.zip | — | |
urlhttp://47.93.54.134:8005 | — | |
urlhttp://47.93.54.134:8005/ | — | |
urlhttps://47.93.54.134:8003 | — |
Threat ID: 69850155f9fa50a62f38cca7
Added to database: 2/5/2026, 8:45:09 PM
Last enriched: 2/5/2026, 9:00:06 PM
Last updated: 2/6/2026, 2:55:15 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumSystemBC Infects 10,000 Devices After Defying Law Enforcement Takedown
MediumThey Got In Through SonicWall. Then They Tried to Kill Every Security Tool
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.