Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Hackers Target Linux Devices with Malware

China-Linked Hackers Target Linux Devices with Malware

Posted on February 6, 2026 By CWS

A newly identified cyber threat, known as the “DKnife” framework, has emerged as a significant risk to network security. This sophisticated toolset, attributed to China-linked hackers, specifically targets Linux-based routers and edge devices.

Emergence of DKnife and Its Threats

DKnife enables attackers to compromise critical network gateways, giving them a persistent presence within the targeted infrastructure. This allows for precise data monitoring and manipulation, presenting a formidable challenge to network integrity.

Operating as a comprehensive Adversary-in-the-Middle (AitM) framework, DKnife inspects network packets in real-time. Although active since at least 2019, it remained largely undetected until recently. The framework’s components work in unison to hijack legitimate user requests, such as software updates, replacing them with malicious content.

Technical Analysis and Capabilities

Researchers at Cisco Talos discovered the DKnife malware during their investigation into the distribution of the DarkNimbus backdoor. Their findings revealed that DKnife is not merely a passive monitoring tool but a potent attack platform.

The malware intercepts traffic destined for specific services, particularly those popular among Chinese-speaking users, injecting harmful payloads. This tactic underscores the shift of threat actors towards edge devices to circumvent traditional security measures.

Implications and Impact of DKnife

Once a router is compromised by DKnife, all devices connected to it become vulnerable. The malware can selectively disrupt traffic from antivirus products, preventing updates or server communications, and can also harvest sensitive data, such as credentials and device identifiers.

Central to DKnife’s offensive strategy is its capability to hijack binary downloads seamlessly. Utilizing a deep packet inspection (DPI) engine, it monitors network traffic for specific requests, such as Android updates or Windows executables, intervening before these requests reach legitimate servers.

The malware’s process involves intercepting initial update requests, checking them against a local configuration, and sending forged responses to redirect downloads to malicious URLs. This stealthy operation, managed by a component named yitiji.bin, ensures that victims unknowingly install backdoors like ShadowPad or DarkNimbus, granting attackers full control over endpoint devices.

To stay informed on the latest cybersecurity threats, follow us on Google News, LinkedIn, and X. Set TechNews as a preferred source in Google for more updates.

Cyber Security News Tags:Adversary-in-the-Middle, China hackers, Cisco Talos, Cybersecurity, DarkNimbus, Linux malware, Malware, network security, ShadowPad, traffic manipulation

Post navigation

Previous Post: China-Linked DKnife Framework Exploits Routers for Attacks
Next Post: RenEngine Loader Bypasses Security with Multi-Stage Attack

Related Posts

Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Hackers Delivering Cobalt Strike Beacon Leveraging GitHub and Social Media Cyber Security News
Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Cyber Security News
Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins Cyber Security News
Hacker Pleads Guilty For Stealing Supreme Court Documents and Leaking via Instagram Hacker Pleads Guilty For Stealing Supreme Court Documents and Leaking via Instagram Cyber Security News
LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware LLMs Tools Like GPT-3.5-Turbo and GPT-4 Fuels the Development of Fully Autonomous Malware Cyber Security News
CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks CISA Warns of Samsung Mobile Devices 0-Day RCE Vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News