Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

The Sharp Taste of Mimo'lette: Analyzing Mimo's Latest Campaign targeting Craft CMS

0
Medium
Published: Tue May 27 2025 (05/27/2025, 19:02:23 UTC)
Source: AlienVault OTX General

Description

The Mimo intrusion set is exploiting CVE-2024-46483, a Remote Code Execution vulnerability in Craft CMS, to deploy webshells and execute malicious payloads. The attack chain includes downloading infection scripts and deploying a loader, cryptominer (XMRig), and residential proxyware (IPRoyal) for financial gain. The group uses unique identifiers such as '4l4md4r' and 'n1tr0' and has been linked to operators 'EtxArny' and 'N1tr0'. Detection can focus on unusual processes in temporary directories and kernel module changes. The campaign targets Craft CMS installations globally, with a focus on financially motivated exploitation rather than geopolitical objectives. The threat is medium severity due to the impact on confidentiality and availability, ease of exploitation via RCE, and the scope of affected web servers. Organizations using Craft CMS should prioritize patching and monitoring for indicators of compromise.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:39:48 UTC

Technical Analysis

Between February and May 2025, the Mimo threat actor group has been observed exploiting CVE-2024-46483, a Remote Code Execution vulnerability in Craft CMS, a popular content management system. The exploitation allows attackers to deploy webshells on vulnerable servers, enabling remote control and execution of arbitrary commands. The attack chain begins with the deployment of a webshell, followed by downloading an infection script that installs multiple malicious payloads. These payloads include a loader component, the XMRig cryptominer for unauthorized cryptocurrency mining, and residential proxyware from IPRoyal, which monetizes bandwidth by routing traffic through compromised systems. The group uses distinctive identifiers such as '4l4md4r' and 'n1tr0' within their tools and infrastructure, aiding attribution. Social media analysis has identified two potential operators, 'EtxArny' and 'N1tr0', who appear financially motivated, although they have shown some interest in Middle Eastern affairs. The campaign leverages various tactics including kernel module manipulation and execution of obfuscated code, complicating detection. Detection opportunities include monitoring for anomalous processes running from temporary directories and unexpected kernel module alterations. Despite the lack of a CVSS score, the threat is significant due to the ease of exploitation, the potential for persistent control, and the financial impact of cryptomining and proxyware deployment. No known public exploits have been reported yet, but active exploitation is confirmed. The campaign highlights the importance of securing Craft CMS installations and monitoring for post-exploitation activities.

Potential Impact

This threat can have widespread impact on organizations using Craft CMS, particularly those with internet-facing web servers. Successful exploitation results in unauthorized remote code execution, leading to full system compromise. Attackers can deploy cryptominers, which degrade system performance and increase operational costs through higher power consumption. The use of residential proxyware can implicate compromised systems in illicit activities, potentially damaging organizational reputation and exposing them to legal risks. Persistent webshells enable ongoing unauthorized access, increasing the risk of data theft, further malware deployment, or lateral movement within networks. The financial motivation behind the campaign suggests a high likelihood of continued exploitation, potentially affecting a broad range of sectors including media, e-commerce, and government websites that rely on Craft CMS. The manipulation of kernel modules and obfuscated payloads complicates detection and remediation, increasing the risk of prolonged compromise. Overall, the threat undermines confidentiality, integrity, and availability of affected systems, with medium severity given the current scope and exploitation complexity.

Mitigation Recommendations

Organizations should immediately verify if their Craft CMS installations are vulnerable to CVE-2024-46483 and apply any available patches or updates from the vendor. In the absence of patches, implement virtual patching via web application firewalls (WAF) to block exploitation attempts targeting the RCE vulnerability. Conduct thorough endpoint and server monitoring focusing on unusual process execution, especially processes running from temporary directories, and monitor for unexpected kernel module loads or changes. Deploy network monitoring to detect outbound connections consistent with cryptomining pools or proxyware traffic, such as connections to known XMRig or IPRoyal infrastructure. Implement strict access controls and multi-factor authentication for CMS administrative interfaces to reduce the risk of initial compromise. Regularly audit web server file systems for unauthorized webshells or suspicious scripts. Employ threat hunting techniques using the unique identifiers '4l4md4r' and 'n1tr0' to detect related artifacts. Educate security teams on the TTPs used by Mimo, including obfuscation and kernel module manipulation, to improve incident response readiness. Finally, isolate and remediate infected systems promptly to prevent lateral movement and further damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://blog.sekoia.io/the-sharp-taste-of-mimolette-analyzing-mimos-latest-campaign-targeting-craft-cms"]
Adversary
Mimo
Pulse Id
68360c3f4169ef29b7c93f6f
Threat Score
null

Indicators of Compromise

Cve

ValueDescriptionCopy
cveCVE-2024-46483
cveCVE-2025-32432

Hash

ValueDescriptionCopy
hash03471b7a82e2001714b355aaab10c532
hashe11365871cc409651fb216d2f5253a6c
hash2b76bc5457143d069676587401cad105bfbd53f3
hashf7f2ef6f65d301e78a1cc855c22dd9395ed5e507
hash1aa4d88a38f5a27a60cfc6d6995f065da074ee340789ed00ddc29abc29ea671e
hash2e46816450ad1b4baa85e2a279031f37608657be93e1095238e2b6c36bbb3fd5
hash3a71680ffb4264e07da4aaca16a3f8831b9a30d444215268e82b2125a98b94aa
hash7868cb82440632cc4fd7a451a351c137a39e1495c84172a17894daf1d108ee9a
hashfc04f1ef05847607bce3b0ac3710c80c5ae238dcc7fd842cd15e252c18dd7a62

Ip

ValueDescriptionCopy
ip85.106.113.168

Domain

ValueDescriptionCopy
domainn1tr0.online
domainwindows.n1tro.cyou

Threat ID: 68360ed7182aa0cae2207281

Added to database: 5/27/2025, 7:13:27 PM

Last enriched: 2/26/2026, 8:39:48 AM

Last updated: 3/24/2026, 4:59:43 AM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses