The Sharp Taste of Mimo'lette: Analyzing Mimoโs Latest Campaign targeting Craft CMS
Analysis of the CVE-2025-32432 compromise chain by Mimo: exploitation, loader, crypto miner, proxyware, and detection opportunities.
Sekoia has identified Mimo, a threat actor that exploits a recently patched Craft CMS zero-day to deploy its own loader, cryptominers, and residential proxyware on hacked websites
The operators appear to be based in the Middle East
blog.sekoia.io/the-sharp-ta...
27.05.2025 16:32
๐ 3
๐ 2
๐ฌ 1
๐ 0
#ClearFake variant is now spreading #Rhadamanthys Stealer via #Emmenhtal Loader.
cc @plebourhis.bsky.social @sekoia.io
1. ClearFake framework is injected on compromised WordPress and relies on EtherHiding
2. The #ClickFix lure uses a fake Cloudflare Turnstile with unusual web traffic
โฌ๏ธ
06.03.2025 10:50
๐ 3
๐ 2
๐ฌ 2
๐ 0
Image of disassembly showing a new macOS backdoor using the deprecated CLI tool 'SetFile'.
This #macOS backdoor uses /usr/bin/SetFile to hide itself in the Finder. SetFile was deprecated in Xcode 6 (that's 2014 to humans)...not sure why it makes sense to declare smth 'deprecated' then leave it in the OS for 10+ years. ๐คทโโ๏ธ #apple #malware
SHA1: 609088c54b99432aab212f35cfe74030b52f0320
20.01.2025 15:53
๐ 24
๐ 8
๐ฌ 2
๐ 0
Proud to share an insightful article on ransomware-driven data exfiltration techniques, written by my colleagues at Sekoia.io! ๐๐
28.11.2024 08:14
๐ 4
๐ 0
๐ฌ 0
๐ 0