Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io

Made with 💙 by Wiz

Last Updated: April 3, 2025

Cloud Threat Landscape
/Incidents
Incidents
/
Mimo Exploits Craft CMS RCE to Deploy Cryptominer and Proxyware in Coordinated Campaign

Mimo Exploits Craft CMS RCE to Deploy Cryptominer and Proxyware in Coordinated Campaign

Type
Campaign
Actors
📝Mimo operator
Pub. date
May 27, 2025
Initial access
1-day vulnerability
Impact
Resource hijacking
Observed techniques
Vulnerability exploitationWebshell deployment
Observed tools
MimoXMRigIPRoyal
Targeted technologies
CraftCMS
References
https://blog.sekoia.io/the-sharp-taste-of-mimolette-analyzing-mimos-latest-campaign-targeting-craft-cms/
Status
Finalized
Last edited
May 28, 2025 12:43 PM

Between February and May 2025, the intrusion set known as Mimo exploited CVE-2025-32432, a critical unauthenticated RCE in Craft CMS, to deploy a multi-stage infection chain observed via honeypots. The attack began by injecting a PHP webshell through a crafted GET request, followed by a POST request exploiting a deserialization flaw to activate the webshell and run arbitrary commands. The webshell downloaded a remote shell script (4l4md4r.sh), which deployed a Go-based loader. This loader fetched and executed two payloads: XMRig for cryptomining and IPRoyal, a residential proxyware that monetizes the victim's bandwidth.

To evade detection, Mimo used LD_PRELOAD hijacking via a malicious shared object (alamdar.so) to conceal malware processes and files. They also implemented process-killing routines to remove competing cryptominers. The group, active since 2022, has recently diversified operations to include Minus Ransomware, further enhancing monetization. Multiple identifiers, including the recurring use of names like 4l4md4r, alamdar, and social media links (e.g., TikTok user @EtxArny) helped attribute this campaign to Mimo. Indicators suggest the operator may reside in Turkey and holds ideological as well as financial motivations. However, the overarching driver appears to be financial gain through system exploitation.