Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware

Posted on July 23, 2025July 23, 2025 By CWS

Jul 23, 2025Ravie LakshmananMalware / Cryptocurrency
The risk actor behind the exploitation of susceptible Craft Content material Administration System (CMS) cases has shifted its techniques to focus on Magento CMS and misconfigured Docker cases.
The exercise has been attributed to a risk actor tracked as Mimo (aka Hezb), which has an extended historical past of leveraging N-day safety flaws in numerous net purposes to deploy cryptocurrency miners.
“Though Mimo’s major motivation stays monetary, by means of cryptocurrency mining and bandwidth monetization, the sophistication of their current operations suggests potential preparation for extra profitable prison actions,” Datadog Safety Labs mentioned in a report printed this week.
Mimo’s exploitation of CVE-2025-32432, a vital safety flaw in Craft CMS, for cryptojacking and proxyjacking was documented by Sekoia in Could 2025.

Newly noticed assault chains related to the risk actor contain the abuse of undetermined PHP-FPM vulnerabilities in Magento e-commerce installations to acquire preliminary entry, after which utilizing it to drop GSocket, a legit open-source penetration testing device, to ascertain persistent entry to the host by way of a reverse shell.
“The preliminary entry vector is PHP-FPM command injection by way of a Magento CMS plugin, indicating that Mimo possesses a number of exploit capabilities past beforehand noticed adversarial tradecraft,” researchers Ryan Simon, Greg Foss, and Matt Muir mentioned.
In an try to sidestep detection, the GSocket binary masquerades as a legit or kernel-managed thread in order that it blends in with different processes which may be operating on the system.
One other notable approach employed by the attackers is the usage of in-memory payloads utilizing memfd_create() in order to launch an ELF binary loader known as “4l4md4r” with out leaving any hint on disk. The loader is then liable for deploying the IPRoyal proxyware and the XMRig miner on the compromised machine however not earlier than modifying the “/and so on/ld.so.preload” file to inject a rootkit to hide the presence of those artifacts.

The distribution of a miner and proxyware underscores a two-pronged method adopted by Mimo to maximise monetary achieve. The distinct income technology streams be sure that compromised machines’ CPU assets are hijacked to mine cryptocurrency, whereas the victims’ unused web bandwidth is monetized for illicit residential proxy providers.
“Moreover, the usage of proxyware, which usually consumes minimal CPU, allows stealthy operation that forestalls detection of the extra monetization even when the crypto miner’s useful resource utilization is throttled,” the researchers mentioned. “This multi-layered monetization additionally enhances resilience: even when the crypto miner is detected and eliminated, the proxy part might stay unnoticed, guaranteeing continued income for the risk actor.”

Datadog mentioned it additionally noticed the risk actors abusing misconfigured Docker cases which can be publicly accessible to spawn a brand new container, inside which a malicious command is executed to fetch an extra payload from an exterior server and execute it.
Written in Go, the modular malware comes fitted with capabilities to realize persistence, conduct file system I/O operations, terminate processes, carry out in-memory execution. It additionally serves as a dropper for GSocket and IPRoyal, and makes an attempt to propagate to different programs by way of SSH brute-force assaults.
“This demonstrates the risk actor’s willingness to compromise a various vary of providers – not simply CMS suppliers – to realize their aims,” Datadog mentioned.

The Hacker News Tags:Actor, Crypto, Deploy, Docker, Magento, Mimo, Miners, Proxyware, Targets, Threat

Post navigation

Previous Post: How Businesses Prevent Credential Theft with Early Phishing Detection
Next Post: Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years

Related Posts

Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure The Hacker News
How to Detect Phishing Attacks Faster: Tycoon2FA Example The Hacker News
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown The Hacker News
Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors The Hacker News
DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft The Hacker News
Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 160,000 Impacted by Wayne Memorial Hospital Data Breach
  • Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
  • Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
  • New Malware Campaigns Highlight Rising AI and Phishing Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 160,000 Impacted by Wayne Memorial Hospital Data Breach
  • Chinese Salt Typhoon and UNC4841 Hackers Teamed Up to Attack Government and Corporate Infrastructure
  • [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
  • Threat Actor Connected to Play, RansomHub and DragonForce Ransomware Operations
  • New Malware Campaigns Highlight Rising AI and Phishing Risks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News