Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

‘DKnife’ Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks

Used since at least 2019, DKnife has been targeting the desktop, mobile, and IoT devices of Chinese users.

Chinese hackers

For well over half a decade, a China-linked threat actor has been operating a gateway-monitoring and adversary-in-the-middle (AitM) framework to deliver and interact with backdoors, Cisco’s Talos researchers warn.

Dubbed DKnife, the framework consists of seven Linux-based implants designed for deep packet inspection, traffic manipulation, and malware delivery, and has been active since at least 2019.

The framework mainly targets Chinese-speaking users, delivering and interacting with backdoors such as ShadowPad and DarkNimbus on desktop, mobile, and IoT devices.

DarkNimbus, also known as DarkNights, is supplied by the Chinese firm UPSEC, which was previously associated with the Chinese APT TheWizards, the operator of the Spellbinder AitM framework.

According to Talos, there are overlaps between DKnife and Spellbinder TTPs, and the WizardNet backdoor has been distributed by DKnife, suggesting “a shared development or operational lineage”.

The same as Spellbinder, DKnife targets Chinese platforms and applications, including mail and messaging services. Its code also references Chinese media websites, Talos says.

Advertisement. Scroll to continue reading.

However, the cybersecurity firm points out that its analysis is based on configuration files from a single command-and-control (C&C) server, and that other servers could be used to target different geographies (WizardNet was used in the Philippines, Cambodia, and the UAE as well).

DKnife was built to monitor and manipulate network traffic and to interact with backdoors running on victims’ systems. It can update the backdoors, hijack DNS traffic, hijack Android application updates and downloads, and exfiltrate user activity to the C&C.

It can also hijack Windows and other binary downloads, deploy the ShadowPad and DarkNimbus backdoors, intercept and disrupt traffic associated with antivirus and PC-management products, and monitor and report on the user’s network activity.

Additionally, it can steal credentials for a major Chinese email provider (by hijacking encrypted connections to extract plaintext usernames and passwords) and can serve phishing pages for other services.

“Based on the language used in the code, configuration files and the ShadowPad malware delivered in the campaign, we assess with high confidence that China-nexus threat actors operate this tool,” Cisco notes.

Related: Cisco Patches Vulnerability Exploited by Chinese Hackers

Related: Chinese APT Mustang Panda Caught Using Kernel-Mode Rootkit

Related: Chinese APT ‘LongNosedGoblin’ Targeting Asian Governments

Related: Google Sees 5 Chinese Groups Exploiting React2Shell for Malware Delivery

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Sumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.

Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.

John Hernandez has joined BlueVoyant as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.