A recent report has revealed that a financially motivated threat actor has been exploiting a critical remote code execution vulnerability in the Craft Content Management System (CMS). This vulnerability, known as CVE-2025-32432, was patched in versions 3.9.15, 4.14.15, and 5.6.17. The threat actor has been deploying various payloads using this flaw, including a cryptocurrency miner, a loader called Mimo Loader, and residential proxyware.
According to Sekoia, the threat actors behind this campaign have been leveraging CVE-2025-32432 to gain unauthorized access to target systems and deploy a web shell for persistent remote access. The web shell is used to download and execute a shell script from a remote server, with the attacker using Python with an unusual naming convention to import the urllib2 library.
The shell script is designed to check for prior infections, remove any existing cryptocurrency miners, terminate active mining processes, and launch an ELF binary named “4l4md4r” using the Mimo Loader. This loader conceals the presence of the malware process and deploys proxyware and the XMRig miner on the compromised host, allowing the threat actor to exploit system resources for illicit cryptocurrency mining.
The threat actor’s activities have been linked to an intrusion set known as Mimo, which has been active since March 2022. This group has previously exploited vulnerabilities in various software to deploy cryptocurrency miners. The recent exploitation efforts have been traced back to a Turkish IP address, indicating the physical location of the threat actor.
Sekoia emphasized the agility and responsiveness of the Mimo intrusion set, noting the quick adoption of newly disclosed vulnerabilities like CVE-2025-32432. The threat actor’s ability to exploit vulnerabilities promptly underscores the importance of proactive cybersecurity measures to prevent such attacks.
Source link
