Crafty Cryptojackers: Mimo’s Mischief Exploits Craft CMS Flaw for Mining Mayhem
Craft CMS vulnerability, CVE-2025-32432, is the latest playground for the Mimo threat actor. This crafty hacker uses it to deploy a cryptocurrency miner and Mimo Loader. Seems like the only thing not patched up is their sense of humor, considering they import Python’s urllib2 as “fbi.”

Hot Take:
Looks like the Mimo gang is back at it again, exploiting Craft CMS like it’s their favorite puzzle game. Who knew cryptojacking could also be a crash course in creative coding? Forget FBI most wanted, it’s F.B.I most coded!
Key Points:
- The Mimo gang is exploiting CVE-2025-32432, a critical flaw in Craft CMS, to deploy cryptominers and proxyware.
- This vulnerability was patched in Craft CMS versions 3.9.15, 4.14.15, and 5.6.17, but not before Mimo had a field day with it.
- Mimo’s toolkit includes a web shell, Mimo Loader, and a script with a cheeky Python alias nodding to the FBI.
- The group has a history of exploiting vulnerabilities in popular software like Apache Log4j and Atlassian Confluence.
- Evidence suggests Mimo operates out of Turkey, showcasing agility in adopting new exploits quickly.
Already a member? Log in here