radar

ONE Sentinel

securitySecurity/THREATS/HIGH

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

sourceThe Hacker News
calendar_todayFebruary 6, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

China-Linked DKnife Framework Exploits Routers for Malware Delivery

Summary

The article discusses the discovery of the DKnife framework, a sophisticated adversary-in-the-middle (AitM) tool operated by China-linked threat actors. This framework targets routers and edge devices to hijack traffic and deliver malware.

Key Points

  • DKnife is a gateway-monitoring and AitM framework linked to China-based threat actors.
  • It has been active since at least 2019.
  • The framework includes seven Linux-based implants.
  • These implants are capable of deep packet inspection and traffic manipulation.
  • DKnife primarily targets routers and edge devices.

Analysis

The DKnife framework represents a significant threat due to its ability to perform deep packet inspection and manipulate network traffic. By targeting routers and edge devices, the framework can effectively hijack traffic and deliver malware, posing a substantial risk to network security. The long-standing operation since 2019 indicates a well-established threat that requires attention from cybersecurity professionals.

Conclusion

IT professionals should prioritize securing routers and edge devices against potential AitM attacks. Regular updates and monitoring for unusual traffic patterns are recommended to mitigate risks associated with the DKnife framework.