Mimo Targets Magento CMS to Steal Card Details and Monetize Bandwidth
The Datadog Security Research team has uncovered the Mimo threat actor also known as Mimo’lette or Hezb expanding its operations from Craft CMS to Magento CMS.
Previously documented for deploying cryptominers via public-facing vulnerabilities, Mimo now exploits undetermined PHP-FPM flaws in Magento installations to gain initial access, marking a tactical shift toward broader platform targeting.
This evolution includes sophisticated persistence and evasion mechanisms, suggesting preparation for more advanced financial crimes beyond mere resource exploitation.
Evolution of Tactics
Investigations reveal multi-day intrusions where attackers employ command injection through Magento plugins, enabling unauthorized remote access and monetization of compromised systems.
Mimo’s updated toolkit leverages the legitimate GSocket penetration testing tool for firewall and NAT bypass, establishing encrypted connections via the Global Socket Relay Network (GSRN) with end-to-end AES-256-CBC encryption and TOR support.
Persistence is achieved through systemd service units, rc.local modifications, and crontab entries that execute GSocket-based reverse shells hourly, masquerading as kernel threads like [kstrp], [watchdogd], or [kswapd0] to evade detection.
A notable evasion technique involves the memfd_create() syscall, creating anonymous in-memory files named after legitimate kernel processes (e.g., memfd:[rcu_sched]), allowing payloads to run without disk footprints.
Prior to deployment, attackers clear artifacts from .bashrc, .bash_profile, and /etc/ld.so.preload, then inject the alamdar.so rootkit to hook system calls, concealing processes such as XMRig miners and IPRoyal proxy clients.
Infrastructure Insights
Financially motivated, Mimo combines cryptojacking with proxyjacking for “profit stacking.” UPX-packed XMRig variants mine Monero on C3Pool, consuming CPU resources, while the hezb.x86_64 IPRoyal Pawns client monetizes bandwidth as residential proxies, generating passive income with minimal overhead.
This dual approach ensures resilience; even if mining is disrupted, proxy operations persist undetected.
Reverse engineering of Docker-targeted variants reveals modular Go-based malware under the alamdar/313 package, featuring file I/O, command execution, and SSH brute-forcing modules that propagate via known_hosts extraction and subnet scanning with usernames like “ec2-user,” indicating AWS focus.
Multi-tier command-and-control rotates servers (e.g., from 109.205.213.203:21 to 193.32.162.10:21), enhancing operational security.
Additional targeting of misconfigured Docker APIs spawns malicious containers, fetching payloads like cron.jpg via base64-decoded curls, parameterized for service-specific tracking.
This diversification absent from prior reports highlights Mimo’s adaptability, potentially enabling card detail theft in ecommerce environments by persisting in memory and evading forensics.
Mitigation involves auditing /etc/ld.so.preload for unauthorized entries, updating CMS platforms, blocking Monero ports (3333, 5555), and scrutinizing cron jobs for obfuscated commands.
Reviewing process inodes and killing hidden executables from clean boots is essential to eradicate rootkits and rotate credentials.
Category | IoC | Details |
---|---|---|
Network | 109.205.213.203:21 | Initial C2 (May 26, 2025) |
Network | 193.32.162.10:21 | Secondary C2 (May 28–30, 2025) |
Network | 15.188.246.198:80 | Payload hosting server (June 3, 2025) |
Network | g.gsocket.ninja | GSocket C2 |
Network | d.gsocket.ninja | Additional GSocket infrastructure |
File | gs-netcat_mini-linux-x86_64 | Covert C2 channel, SHA256: d94f75a70b5cabaf786ac57177ed841732e62bdcc9a29e06e5b41d9be567bcfa |
File | alamdar.so | LD_PRELOAD rootkit, SHA256: 7868cb82440632cc4fd7a451a351c137a39e1495c84172a17894daf1d108ee9a |
File | hezb.x86_64 | IPRoyal Pawns proxyware, SHA256: 1aa4d88a38f5a27a60cfc6d6995f065da074ee340789ed00ddc29abc29ea671e |
Process | Commands containing: sleep 1; kill -9 $PPID | Initial command injection pattern |
Process | Python imports: import urllib2 as fbi | Unique Mimo signature |
Process | Cron entries with: GS_HOST= or defunct | GSocket persistence indicators |
Process | Base64 strings starting with: L3Vzci9iaW4v… | Encodes /usr/bin/ in obfuscated commands |
Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now
Source link