The Sharp Taste of Mimo'lette: Analyzing Mimo's Latest Campaign targeting Craft CMS
The Mimo intrusion set is exploiting CVE-2024-46483, a Remote Code Execution vulnerability in Craft CMS, to deploy webshells and execute malicious payloads. The attack chain includes downloading infection scripts and deploying a loader, cryptominer (XMRig), and residential proxyware (IPRoyal) for financial gain. The group uses unique identifiers such as '4l4md4r' and 'n1tr0' and has been linked to operators 'EtxArny' and 'N1tr0'. Detection can focus on unusual processes in temporary directories and kernel module changes. The campaign targets Craft CMS installations globally, with a focus on financially motivated exploitation rather than geopolitical objectives. The threat is medium severity due to the impact on confidentiality and availability, ease of exploitation via RCE, and the scope of affected web servers. Organizations using Craft CMS should prioritize patching and monitoring for indicators of compromise.
AI Analysis
Technical Summary
Between February and May 2025, the Mimo threat actor group has been observed exploiting CVE-2024-46483, a Remote Code Execution vulnerability in Craft CMS, a popular content management system. The exploitation allows attackers to deploy webshells on vulnerable servers, enabling remote control and execution of arbitrary commands. The attack chain begins with the deployment of a webshell, followed by downloading an infection script that installs multiple malicious payloads. These payloads include a loader component, the XMRig cryptominer for unauthorized cryptocurrency mining, and residential proxyware from IPRoyal, which monetizes bandwidth by routing traffic through compromised systems. The group uses distinctive identifiers such as '4l4md4r' and 'n1tr0' within their tools and infrastructure, aiding attribution. Social media analysis has identified two potential operators, 'EtxArny' and 'N1tr0', who appear financially motivated, although they have shown some interest in Middle Eastern affairs. The campaign leverages various tactics including kernel module manipulation and execution of obfuscated code, complicating detection. Detection opportunities include monitoring for anomalous processes running from temporary directories and unexpected kernel module alterations. Despite the lack of a CVSS score, the threat is significant due to the ease of exploitation, the potential for persistent control, and the financial impact of cryptomining and proxyware deployment. No known public exploits have been reported yet, but active exploitation is confirmed. The campaign highlights the importance of securing Craft CMS installations and monitoring for post-exploitation activities.
Potential Impact
This threat can have widespread impact on organizations using Craft CMS, particularly those with internet-facing web servers. Successful exploitation results in unauthorized remote code execution, leading to full system compromise. Attackers can deploy cryptominers, which degrade system performance and increase operational costs through higher power consumption. The use of residential proxyware can implicate compromised systems in illicit activities, potentially damaging organizational reputation and exposing them to legal risks. Persistent webshells enable ongoing unauthorized access, increasing the risk of data theft, further malware deployment, or lateral movement within networks. The financial motivation behind the campaign suggests a high likelihood of continued exploitation, potentially affecting a broad range of sectors including media, e-commerce, and government websites that rely on Craft CMS. The manipulation of kernel modules and obfuscated payloads complicates detection and remediation, increasing the risk of prolonged compromise. Overall, the threat undermines confidentiality, integrity, and availability of affected systems, with medium severity given the current scope and exploitation complexity.
Mitigation Recommendations
Organizations should immediately verify if their Craft CMS installations are vulnerable to CVE-2024-46483 and apply any available patches or updates from the vendor. In the absence of patches, implement virtual patching via web application firewalls (WAF) to block exploitation attempts targeting the RCE vulnerability. Conduct thorough endpoint and server monitoring focusing on unusual process execution, especially processes running from temporary directories, and monitor for unexpected kernel module loads or changes. Deploy network monitoring to detect outbound connections consistent with cryptomining pools or proxyware traffic, such as connections to known XMRig or IPRoyal infrastructure. Implement strict access controls and multi-factor authentication for CMS administrative interfaces to reduce the risk of initial compromise. Regularly audit web server file systems for unauthorized webshells or suspicious scripts. Employ threat hunting techniques using the unique identifiers '4l4md4r' and 'n1tr0' to detect related artifacts. Educate security teams on the TTPs used by Mimo, including obfuscation and kernel module manipulation, to improve incident response readiness. Finally, isolate and remediate infected systems promptly to prevent lateral movement and further damage.
Affected Countries
United States, United Kingdom, Germany, France, Netherlands, Australia, Canada, United Arab Emirates, Saudi Arabia, Israel
Indicators of Compromise
- cve: CVE-2024-46483
- cve: CVE-2025-32432
- hash: 03471b7a82e2001714b355aaab10c532
- hash: e11365871cc409651fb216d2f5253a6c
- hash: 2b76bc5457143d069676587401cad105bfbd53f3
- hash: f7f2ef6f65d301e78a1cc855c22dd9395ed5e507
- hash: 1aa4d88a38f5a27a60cfc6d6995f065da074ee340789ed00ddc29abc29ea671e
- hash: 2e46816450ad1b4baa85e2a279031f37608657be93e1095238e2b6c36bbb3fd5
- hash: 3a71680ffb4264e07da4aaca16a3f8831b9a30d444215268e82b2125a98b94aa
- hash: 7868cb82440632cc4fd7a451a351c137a39e1495c84172a17894daf1d108ee9a
- hash: fc04f1ef05847607bce3b0ac3710c80c5ae238dcc7fd842cd15e252c18dd7a62
- ip: 85.106.113.168
- domain: n1tr0.online
- domain: windows.n1tro.cyou
The Sharp Taste of Mimo'lette: Analyzing Mimo's Latest Campaign targeting Craft CMS
Description
The Mimo intrusion set is exploiting CVE-2024-46483, a Remote Code Execution vulnerability in Craft CMS, to deploy webshells and execute malicious payloads. The attack chain includes downloading infection scripts and deploying a loader, cryptominer (XMRig), and residential proxyware (IPRoyal) for financial gain. The group uses unique identifiers such as '4l4md4r' and 'n1tr0' and has been linked to operators 'EtxArny' and 'N1tr0'. Detection can focus on unusual processes in temporary directories and kernel module changes. The campaign targets Craft CMS installations globally, with a focus on financially motivated exploitation rather than geopolitical objectives. The threat is medium severity due to the impact on confidentiality and availability, ease of exploitation via RCE, and the scope of affected web servers. Organizations using Craft CMS should prioritize patching and monitoring for indicators of compromise.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Between February and May 2025, the Mimo threat actor group has been observed exploiting CVE-2024-46483, a Remote Code Execution vulnerability in Craft CMS, a popular content management system. The exploitation allows attackers to deploy webshells on vulnerable servers, enabling remote control and execution of arbitrary commands. The attack chain begins with the deployment of a webshell, followed by downloading an infection script that installs multiple malicious payloads. These payloads include a loader component, the XMRig cryptominer for unauthorized cryptocurrency mining, and residential proxyware from IPRoyal, which monetizes bandwidth by routing traffic through compromised systems. The group uses distinctive identifiers such as '4l4md4r' and 'n1tr0' within their tools and infrastructure, aiding attribution. Social media analysis has identified two potential operators, 'EtxArny' and 'N1tr0', who appear financially motivated, although they have shown some interest in Middle Eastern affairs. The campaign leverages various tactics including kernel module manipulation and execution of obfuscated code, complicating detection. Detection opportunities include monitoring for anomalous processes running from temporary directories and unexpected kernel module alterations. Despite the lack of a CVSS score, the threat is significant due to the ease of exploitation, the potential for persistent control, and the financial impact of cryptomining and proxyware deployment. No known public exploits have been reported yet, but active exploitation is confirmed. The campaign highlights the importance of securing Craft CMS installations and monitoring for post-exploitation activities.
Potential Impact
This threat can have widespread impact on organizations using Craft CMS, particularly those with internet-facing web servers. Successful exploitation results in unauthorized remote code execution, leading to full system compromise. Attackers can deploy cryptominers, which degrade system performance and increase operational costs through higher power consumption. The use of residential proxyware can implicate compromised systems in illicit activities, potentially damaging organizational reputation and exposing them to legal risks. Persistent webshells enable ongoing unauthorized access, increasing the risk of data theft, further malware deployment, or lateral movement within networks. The financial motivation behind the campaign suggests a high likelihood of continued exploitation, potentially affecting a broad range of sectors including media, e-commerce, and government websites that rely on Craft CMS. The manipulation of kernel modules and obfuscated payloads complicates detection and remediation, increasing the risk of prolonged compromise. Overall, the threat undermines confidentiality, integrity, and availability of affected systems, with medium severity given the current scope and exploitation complexity.
Mitigation Recommendations
Organizations should immediately verify if their Craft CMS installations are vulnerable to CVE-2024-46483 and apply any available patches or updates from the vendor. In the absence of patches, implement virtual patching via web application firewalls (WAF) to block exploitation attempts targeting the RCE vulnerability. Conduct thorough endpoint and server monitoring focusing on unusual process execution, especially processes running from temporary directories, and monitor for unexpected kernel module loads or changes. Deploy network monitoring to detect outbound connections consistent with cryptomining pools or proxyware traffic, such as connections to known XMRig or IPRoyal infrastructure. Implement strict access controls and multi-factor authentication for CMS administrative interfaces to reduce the risk of initial compromise. Regularly audit web server file systems for unauthorized webshells or suspicious scripts. Employ threat hunting techniques using the unique identifiers '4l4md4r' and 'n1tr0' to detect related artifacts. Educate security teams on the TTPs used by Mimo, including obfuscation and kernel module manipulation, to improve incident response readiness. Finally, isolate and remediate infected systems promptly to prevent lateral movement and further damage.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.sekoia.io/the-sharp-taste-of-mimolette-analyzing-mimos-latest-campaign-targeting-craft-cms"]
- Adversary
- Mimo
- Pulse Id
- 68360c3f4169ef29b7c93f6f
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2024-46483 | — | |
cveCVE-2025-32432 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash03471b7a82e2001714b355aaab10c532 | — | |
hashe11365871cc409651fb216d2f5253a6c | — | |
hash2b76bc5457143d069676587401cad105bfbd53f3 | — | |
hashf7f2ef6f65d301e78a1cc855c22dd9395ed5e507 | — | |
hash1aa4d88a38f5a27a60cfc6d6995f065da074ee340789ed00ddc29abc29ea671e | — | |
hash2e46816450ad1b4baa85e2a279031f37608657be93e1095238e2b6c36bbb3fd5 | — | |
hash3a71680ffb4264e07da4aaca16a3f8831b9a30d444215268e82b2125a98b94aa | — | |
hash7868cb82440632cc4fd7a451a351c137a39e1495c84172a17894daf1d108ee9a | — | |
hashfc04f1ef05847607bce3b0ac3710c80c5ae238dcc7fd842cd15e252c18dd7a62 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip85.106.113.168 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainn1tr0.online | — | |
domainwindows.n1tro.cyou | — |
Threat ID: 68360ed7182aa0cae2207281
Added to database: 5/27/2025, 7:13:27 PM
Last enriched: 2/26/2026, 8:39:48 AM
Last updated: 3/24/2026, 4:59:43 AM
Views: 146
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.