Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Chinese Threat Actor Uses DKnife Implant for Attacks

Chinese Threat Actor Uses DKnife Implant for Attacks

Posted on February 6, 2026 By CWS

Over the past several years, a threat actor with ties to China has been actively employing a sophisticated framework designed for adversary-in-the-middle (AitM) attacks. According to researchers from Cisco’s Talos, this framework is used to monitor gateways and deliver backdoors, highlighting its significant threat potential.

DKnife Framework and Its Components

The framework, known as DKnife, comprises seven Linux-based implants. These implants are engineered for deep packet inspection, traffic manipulation, and the distribution of malware. Active since at least 2019, the framework specifically targets users who speak Chinese, making it a focused tool in the digital attack arsenal.

DKnife interacts with backdoors like ShadowPad and DarkNimbus, adapting to a variety of devices including desktop computers, mobile phones, and IoT devices. DarkNimbus, also referred to as DarkNights, is associated with UPSEC, a Chinese firm previously linked to the APT group TheWizards, which operates the Spellbinder AitM framework.

Connections and Targeting Strategies

There are notable similarities between the operational methods of DKnife and Spellbinder, with the WizardNet backdoor being a common element distributed by DKnife. This suggests a potential shared development lineage or operational strategy between these frameworks. DKnife’s primary targets are Chinese platforms and applications, including email and messaging services, with its code referencing Chinese media websites.

Despite this targeted approach, Talos researchers caution that their findings are based on data from a single command-and-control (C&C) server. It is possible that other servers could target different regions, as indicated by the use of WizardNet in countries like the Philippines, Cambodia, and the UAE.

Capabilities and Implications of DKnife

DKnife is capable of extensive network traffic monitoring and manipulation, interacting directly with backdoors on compromised systems. It can update these backdoors, hijack DNS traffic, intercept Android application updates, and exfiltrate user activity to its C&C server. Moreover, it can disrupt traffic associated with antivirus and PC management tools, as well as intercept and monitor user network activity.

In addition, DKnife can steal credentials from a major Chinese email provider by intercepting encrypted connections to extract usernames and passwords. It also serves phishing pages to capture credentials for other services. Cisco’s high-confidence assessment attributes the operation of DKnife to China-based threat actors, based on the language and configuration files observed.

The implications of such advanced cyber threats are significant, underscoring the need for heightened vigilance and robust cybersecurity measures. As these threat actors continue to evolve, organizations must remain proactive in safeguarding their networks against such sophisticated attacks.

Security Week News Tags:AitM attacks, APT TheWizards, Backdoors, Chinese threat, Cisco Talos, Cybersecurity, DarkNimbus, DKnife implant, malware delivery, network traffic, ShadowPad, UPSEC

Post navigation

Previous Post: Hackers Exploit Screensavers for Remote Access
Next Post: Spam Campaign Utilizes Fake PDFs for Remote Access

Related Posts

Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime Security Week News
China’s Salt Typhoon Hacked US National Guard China’s Salt Typhoon Hacked US National Guard Security Week News
NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to  Million NSO Ordered to Stop Hacking WhatsApp, but Damages Cut to $4 Million Security Week News
Outtake Secures M to Enhance AI Cybersecurity Solutions Outtake Secures $40M to Enhance AI Cybersecurity Solutions Security Week News
Armis Raises 5 Million in Pre-IPO Funding Round at .1 Billion Valuation Armis Raises $435 Million in Pre-IPO Funding Round at $6.1 Billion Valuation Security Week News
China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News