Executive Summary
In February 2026, cybersecurity researchers uncovered 'DKnife,' a sophisticated adversary-in-the-middle (AitM) framework operated by China-linked threat actors since at least 2019. This Linux-based toolkit comprises seven implants designed for deep packet inspection, traffic manipulation, and malware delivery via compromised routers and edge devices. DKnife primarily targets Chinese-speaking users by hijacking binary downloads and Android application updates to deploy backdoors like ShadowPad and DarkNimbus. (thehackernews.com) The discovery of DKnife underscores the escalating threat posed by AitM attacks leveraging compromised network infrastructure. This incident highlights the need for enhanced security measures to protect routers and edge devices from sophisticated exploitation techniques. (thehackernews.com)
Why This Matters Now
The emergence of DKnife highlights the increasing sophistication of adversary-in-the-middle attacks targeting network infrastructure. Organizations must prioritize securing routers and edge devices to prevent such exploitation. (thehackernews.com)
Attack Path Analysis
The DKnife framework initiates attacks by compromising routers and edge devices, enabling deep packet inspection and traffic manipulation. Through this access, attackers escalate privileges to intercept and decrypt secure communications, such as email credentials. They then move laterally within the network, hijacking binary downloads and application updates to deliver malware like ShadowPad and DarkNimbus. Established command and control channels allow for continuous monitoring and control over compromised devices. Exfiltration of sensitive data, including user credentials and application data, is conducted via these channels. The impact includes widespread surveillance, data theft, and potential disruption of services across various devices.
Kill Chain Progression
Initial Compromise
Description
Attackers compromise routers and edge devices to gain unauthorized access to network traffic.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Application Layer Protocol: Web Protocols
Application Layer Protocol: Mail Protocols
Application Layer Protocol: DNS
Application Layer Protocol: File Transfer Protocols
Application Layer Protocol: SSH
Application Layer Protocol: RDP
Application Layer Protocol: SMB/Windows Admin Shares
Application Layer Protocol: Other
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Change Control Processes
Control ID: 6.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Incident Handling
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
Router and edge device compromises enable deep packet inspection, traffic hijacking, and malware delivery, critically exposing network infrastructure and customer communications.
Internet
DNS hijacking, binary download replacement, and application update interception threaten web services, online platforms, and digital content delivery mechanisms.
Gambling/Casinos
Targeted by TheWizards APT group across multiple regions, facing credential harvesting, traffic manipulation, and specialized malware delivery through compromised infrastructure.
Computer/Network Security
Security products actively interfered with by DKnife framework, compromising antivirus effectiveness and enabling bypass of endpoint protection and network monitoring solutions.
Sources
- China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Deliveryhttps://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.htmlVerified
- Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM frameworkhttps://blog.talosintelligence.com/knife-cutting-the-edge/Verified
- ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Accesshttps://thehackernews.com/2025/11/shadowpad-malware-actively-exploits.htmlVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could likely reduce the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and controlled egress policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to exploit compromised routers and edge devices would likely be constrained, limiting unauthorized access to network traffic.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to intercept and decrypt secure communications would likely be constrained, reducing the scope of credential harvesting.
Control: East-West Traffic Security
Mitigation: The attacker's ability to move laterally and distribute malware would likely be constrained, reducing the spread of malicious payloads.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish and maintain command and control channels would likely be constrained, reducing remote control over compromised devices.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data would likely be constrained, reducing data loss.
The attacker's ability to cause widespread surveillance, data theft, and service disruptions would likely be constrained, reducing overall impact.
Impact at a Glance
Affected Business Functions
- Network Infrastructure Management
- User Data Security
- Software Update Integrity
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of user credentials and sensitive data from hijacked traffic.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement and limit the spread of malware within the network.
- • Deploy East-West Traffic Security measures to monitor and control internal traffic, detecting unauthorized communications.
- • Utilize Encrypted Traffic (HPE) solutions to ensure data in transit is secure, preventing interception and decryption by attackers.
- • Establish Multicloud Visibility & Control to gain comprehensive insights into network activities and detect anomalies.
- • Enforce Egress Security & Policy Enforcement to control outbound traffic, preventing unauthorized data exfiltration.



