Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Facebook X (Twitter) Instagram
Monday, February 9
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Chinese-Made Malware Kit Targets Chinese-Based Edge Devices
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

Team-CWDBy Team-CWDFebruary 6, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A malware framework that remained hidden for years has been discovered by security researchers at Cisco Talos.

The researchers were hunting for samples of DarkNimbus, a backdoor linked to the MOONSHINE exploit kit which have both been known about since 2023, , when they found a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework they had never seen before.

Cisco Talos researchers have shared technical details about this framework, which they dubbed DKnife, in a new report published on February 5.

Used since at least 2019 and still active in January 2026, DKnife targets Chinese-speaking users and the Talos researchers assessed “with high confidence” that it was made by Chinese-nexus threat actors.

This assessment is based on “the language used in the code, configuration files and the ShadowPad malware delivered in the campaign.

The researchers also discovered overlaps in DKnife’s infrastructure and a campaign delivering WizardNet, a modular backdoor known to be delivered by Spellbinder, a different AiTM framework, suggesting a shared development or operational lineage.

DKnife Capabilities Explained

DKnife is a Linux-based (x86-64) framework designed for gateway-level attacks, enabling operators to monitor, manipulate and hijack network traffic on compromised routers or edge devices.

It is made up of seven executable and linkable format (ELF) binaries that operate together to carry out deep packet inspection (DPI), traffic interception and malicious payload delivery.

The framework is designed for Linux-based firmware, especially systems running CentOS or Red Hat Enterprise Linux and includes support for point-to-point protocol over ethernet (PPPoE), virtual local area network (VLAN) tagging and bridged interfaces. This makes it particularly effective for exploiting routers and similar network devices.

The framework performs several key functions including serving command and control (C2) updates for backdoors such as DarkNimbus and ShadowPad.

It also enables domain name system (DNS) hijacking and the interception of legitimate downloads for Android applications and Windows binaries to substitute them with malicious payloads.

DKnife can disrupt traffic from security products like antivirus updates and exfiltrate user activity to remote C2 servers. Its modular architecture and phishing templates allow for both covert monitoring and active in-line attacks which makes it a powerful tool for maintaining persistent access to compromised networks.

“Overall, the evidence suggests a well-integrated and evolving toolchain of AitM frameworks and backdoors, underscoring the need for continuous visibility and monitoring of routers and edge infrastructure,” the Talos researchers concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTwo Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Next Article Here’s what you should know
Team-CWD
  • Website

Related Posts

News

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

February 8, 2026
News

eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware

February 8, 2026
News

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

January 16, 2026

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.