Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Forget AGI, business leaders are still trying to figure out how to make AI work

    From chaos to clarity: How AI is redefining construction at scale

    VMware vSphere 8 end-of-support challenges

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Tether Freezes $500 Million in Assets Linked to Turkish Gambling Ring

      February 7, 2026

      Crypto.com CEO Pivots to AI Agents, Launch Planned For Super Bowl

      February 7, 2026

      Will Solana’s Price Recovery Be Challenging? Here’s What On-Chain Signals Suggest

      February 7, 2026

      China Widens Crypto Ban to Choke Off Stablecoins and Asset Tokenization

      February 7, 2026

      CFTC Expands Crypto Collateral Pilot to Include National Trust Bank Stablecoins

      February 7, 2026
    • Technology

      Forget AGI, business leaders are still trying to figure out how to make AI work

      February 7, 2026

      From chaos to clarity: How AI is redefining construction at scale

      February 7, 2026

      VMware vSphere 8 end-of-support challenges

      February 7, 2026

      2026 is the year we must get serious about being a data nation

      February 7, 2026

      Banks on the hook for £173m in APP fraud reimbursement

      February 7, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»DKnife Linux toolkit hijacks router traffic to spy, deliver malware
    Technology

    DKnife Linux toolkit hijacks router traffic to spy, deliver malware

    TechAiVerseBy TechAiVerseFebruary 6, 2026No Comments4 Mins Read1 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    DKnife Linux toolkit hijacks router traffic to spy, deliver malware
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    DKnife Linux toolkit hijacks router traffic to spy, deliver malware

    A newly discovered toolkit called DKnife has been used since 2019 to hijack traffic at the edge-device level and deliver malware in espionage campaigns.

    The framework serves as a post-compromise framework for traffic monitoring and adversary-in-the-middle (AitM) activities. It is designed to intercept and manipulate traffic destined for endpoints (computers, mobile devices, IoTs) on the network.

    Researchers at Cisco Talos say that DKnife is an ELF framework with seven Linux-based components designed for deep packet inspection (DPI), traffic manipulation, credential harvesting, and malware delivery.

    The malware features Simplified Chinese language artifacts in component names and code comments, and explicitly targets Chinese services such as email providers, mobile apps, media domains, and WeChat users.

    Talos researchers assess with high confidence that the operator of DKnife is a China-nexus threat actor.

    DKnife’s seven components and their functionality
    Source: Cisco Talos

    Researchers couldn’t determine how the network equipment is compromised, but found that DKnife delivers and interacts with the ShadowPad and DarkNimbus backdoors, both associated with Chinese threat actors.

    DKnife consists of seven modules, each responsible for specific activities related to communication with the C2 servers, relaying or altering traffic, and hiding the malicious traffic origin:

    • dknife.bin – responible for packet inspection and attack logics, it also reports attack status, user activities, and sends collected data
    • postapi.bin – relay component between DKnife.bin and C2 servers
    • sslmm.bin – custom reverse proxy server derived from HAProxy
    • yitiji.bin – creates a virtual Ethernet interface (TAP) on the router and bridges it into the LAN to route the attacker’s traffic
    • remote.bin – peer-to-peer VPN client using the n2n VPN software
    • mmdown.bin – malware downloader and updater for Android APK files
    • dkupdate.bin – DKnife download, deploy, and update component

    “Its [DKnife’s] key capabilities include serving update C2 for the backdoors, DNS hijacking, hijacking Android application updates and binary downloads, delivering ShadowPad and DarkNimbus backdoors, selectively disrupting security-product traffic and exfiltrating user activity to remote C2 servers,” the researchers said in a report this week.

    Once installed, DKnife uses its yitiji.bin component to create a bridged TAP interface (virtual network device) on the router at the private IP address 10.3.3.3. This allows the threat actor to intercept and rewrite network packets in their transit to the intended host.

    This way, DKnife can be used to deliver malicious APK files to mobile devices or Windows systems on the network.

    Cisco researchers observed DKnife dropping the ShadowPad backdoor for Windows signed with a Chinese firm’s certificate. This action was followed by the deployment of the DarkNimbus backdoor. On Android devices, the backdoor is delivered directly by DKnife.

    DKnife payload delivery mechanism
    Source: Cisco Talos

    On the same infrastructure associated with the DKnife framework activity, the researchers also found that it was hosting the WizardNet backdoor, which ESET researchers previously linked to the Spellbinder AitM framework.

    Apart from payload delivery, DKnife is also capable of:

    • DNS hijacking
    • hijacking Android app updates
    • hijacking Windows binaries
    • Credential harvesting via POP3/IMAP decryption
    • Phishing page hosting
    • Anti-virus traffic disruption
    • monitoring user activity, including messaging app use (WeChat and Signal), maps app use, news consumption, calling activity, ride-hailing, and shopping

    WeChat activities are tracked more analytically, Cisco Talos says, with DKnife monitoring for voice and video calls, text messages, images sent and received, and articles read on the platform.

    DKnife’s Android update hijacking mechanism
    Source: Cisco Talos

    The user’s activity events are first routed internally between DKnife’s components and then exfiltrated via HTTP POST requests to specific command-and-control (C2) API endpoints.

    Because DKnife sits on gateway devices and reports events as packets pass through, it allows monitoring user activity and collecting data in real time.

    As of January 2026, the DKnife C2 servers are still active, the researchers say. Cisco Talos has published the full set of indicators of compromise (IoCs) associated with this activity.


    The future of IT infrastructure is here

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleCISA warns of SmarterMail RCE flaw used in ransomware attacks
    Next Article The Alexa app is so bad I’m using Siri again
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Forget AGI, business leaders are still trying to figure out how to make AI work

    February 7, 2026

    From chaos to clarity: How AI is redefining construction at scale

    February 7, 2026

    VMware vSphere 8 end-of-support challenges

    February 7, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025657 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025245 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025148 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 7, 2026

    Forget AGI, business leaders are still trying to figure out how to make AI work

    Forget AGI, business leaders are still trying to figure out how to make AI work…

    From chaos to clarity: How AI is redefining construction at scale

    VMware vSphere 8 end-of-support challenges

    2026 is the year we must get serious about being a data nation

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Forget AGI, business leaders are still trying to figure out how to make AI work

    February 7, 20260 Views

    From chaos to clarity: How AI is redefining construction at scale

    February 7, 20260 Views

    VMware vSphere 8 end-of-support challenges

    February 7, 20260 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.