Loading cryptocurrency prices...

Mimo Shifts Tactics: Targets Magento and Docker for Crypto Mining

Mimo Threat Group Expands Attacks to Magento CMS and Docker, Deploying Cryptominers and Proxyware for Financial Gain

  • A threat group known as Mimo is targeting e-commerce systems and cloud services to install cryptocurrency miners and proxyware.
  • The group recently shifted its attacks from Craft CMS to exploiting Magento CMS and unsecured Docker instances.
  • Mimo uses advanced tactics, such as command injection vulnerabilities and memory-only Malware loaders, to avoid detection.
  • Their methods enable two types of illegal revenue: mining cryptocurrency and selling access to compromised internet connections.
  • The attacks show a wider strategy, with attempts to spread to other systems and use multiple ways to remain hidden and profitable.

Security researchers reported that the group known as Mimo has started exploiting Magento CMS and misconfigured Docker systems in 2025. Previously, this group targeted vulnerable instances of Craft CMS. The group’s main motive is financial gain through cryptojacking and proxyware deployment, according to a recent report by Datadog Security Labs.

- Advertisement -

Researchers found that Mimo exploits certain security flaws in Magento, especially weaknesses in the PHP-FPM system used by the content management platform. After gaining access, the attackers use a tool called GSocket to control the server through a reverse shell. By disguising GSocket as a normal system process, they aim to avoid detection by security tools.

The group also uses an in-memory method to load another tool, 4l4md4r, without leaving files on disk. This loader deploys both the XMRig cryptocurrency miner and IPRoyal proxyware on infected systems. Before doing so, the attackers modify a sensitive system configuration file to help hide their presence. The proxyware lets criminals profit by quietly selling victims’ unused internet bandwidth to outside buyers, while the XMRig miner takes over the computer’s processing power to generate cryptocurrency.

According to Datadog, “This multi-layered monetization also enhances resilience: even if the crypto miner is detected and removed, the proxy component may remain unnoticed, ensuring continued revenue for the threat actor.” Mimo also attacks misconfigured Docker installations exposed to the internet. By running new containers, the group loads additional malware that can spread to other machines through SSH brute-force attacks. The malware, written in Go, can persist on systems, perform file operations, and shut down competing processes.

The recent string of attacks highlights Mimo’s ability to adapt quickly and use multiple attack methods, not just on content management systems but also widely used cloud and server technologies. Security experts believe this signals a broader trend where cybercriminals seek to maximize profits by using combined attack strategies on various digital platforms.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

North Korean Hackers Target npm, Spread Malware to Web3 Devs

North Korean Hackers uploaded over 300 malicious code packages to the public JavaScript library...

Walmart Stock Hits ATH After OpenAI Deal, Eyes $125 Target

Walmart stock rose 5.6% over the past week, reaching a record high. The company's partnership...

GitHub Suspension Sparks Concerns Over Microsoft’s Bitcoin Power

A Bitcoin developer's account was suspended by Microsoft's GitHub, raising concerns over centralized control.The...

Gold Surges to Record $4,200 as Safe-Haven Demand Soars Globally

Gold reached a record high above $4,200 per ounce, largely driven by increased demand...

Shiba Inu Price: Can SHIB Ever Reach $1 Amid Massive Supply?

Shiba Inu remains one of the most widely followed cryptocurrencies. Current market data show the...
- Advertisement -

Must Read

Top 10 Best Crypto Advertising Networks

So, you are interested in promoting your crypto-related product or service but you don’t know how to go about it. Today we are going...