Loading cryptocurrency prices...

Mimo Shifts Tactics: Targets Magento and Docker for Crypto Mining

Mimo Threat Group Expands Attacks to Magento CMS and Docker, Deploying Cryptominers and Proxyware for Financial Gain

  • A threat group known as Mimo is targeting e-commerce systems and cloud services to install cryptocurrency miners and proxyware.
  • The group recently shifted its attacks from Craft CMS to exploiting Magento CMS and unsecured Docker instances.
  • Mimo uses advanced tactics, such as command injection vulnerabilities and memory-only Malware loaders, to avoid detection.
  • Their methods enable two types of illegal revenue: mining cryptocurrency and selling access to compromised internet connections.
  • The attacks show a wider strategy, with attempts to spread to other systems and use multiple ways to remain hidden and profitable.

Security researchers reported that the group known as Mimo has started exploiting Magento CMS and misconfigured Docker systems in 2025. Previously, this group targeted vulnerable instances of Craft CMS. The group’s main motive is financial gain through cryptojacking and proxyware deployment, according to a recent report by Datadog Security Labs.

- Advertisement -

Researchers found that Mimo exploits certain security flaws in Magento, especially weaknesses in the PHP-FPM system used by the content management platform. After gaining access, the attackers use a tool called GSocket to control the server through a reverse shell. By disguising GSocket as a normal system process, they aim to avoid detection by security tools.

The group also uses an in-memory method to load another tool, 4l4md4r, without leaving files on disk. This loader deploys both the XMRig cryptocurrency miner and IPRoyal proxyware on infected systems. Before doing so, the attackers modify a sensitive system configuration file to help hide their presence. The proxyware lets criminals profit by quietly selling victims’ unused internet bandwidth to outside buyers, while the XMRig miner takes over the computer’s processing power to generate cryptocurrency.

According to Datadog, “This multi-layered monetization also enhances resilience: even if the crypto miner is detected and removed, the proxy component may remain unnoticed, ensuring continued revenue for the threat actor.” Mimo also attacks misconfigured Docker installations exposed to the internet. By running new containers, the group loads additional malware that can spread to other machines through SSH brute-force attacks. The malware, written in Go, can persist on systems, perform file operations, and shut down competing processes.

The recent string of attacks highlights Mimo’s ability to adapt quickly and use multiple attack methods, not just on content management systems but also widely used cloud and server technologies. Security experts believe this signals a broader trend where cybercriminals seek to maximize profits by using combined attack strategies on various digital platforms.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

IBM Unveils 120-Qubit Nighthawk Chip, Aiming for Quantum Advantage by 2026

IBM unveiled the Nighthawk and Quantum Loon quantum processors, marking significant progress toward verified...

Nvidia Eyes $200 Return Amid AI Growth and Strategic Deals

NVIDIA stock has encountered resistance near $200 but rose 5% over the last month...

JPMorgan Expands JPM Coin to Base, Eyes Retail and Multi-Currency Use

JPMorgan has launched its dollar-backed stablecoin, JPM Coin (JPMD), for institutional transfers on the...

Report: 16 Blockchains Have Built-in Fund Freezing Mechanisms

Sixteen blockchains have built-in fund freezing features, while 19 more can add this with...

Peraire-Bueno Bros Face Retrial in $25M Ethereum Fraud Case

Anton and James Peraire-Bueno face a potential retrial for alleged fraud and money laundering...
- Advertisement -

Must Read

How Cryptocurrency Works For Beginners?

Welcome to the world of cryptocurrency! If you're new to this exciting and rapidly evolving landscape, you might feel like Alice in Wonderland, exploring...