Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious PHP Packages Target Multiple Systems

Malicious PHP Packages Target Multiple Systems

Posted on March 4, 2026 By CWS

Cybersecurity experts have uncovered fake PHP packages on the Packagist platform, disguised as Laravel tools, that are delivering a cross-platform remote access trojan (RAT) affecting Windows, macOS, and Linux devices. These packages, identified by researchers, pose significant security threats to users.

Identified Malicious Packages

The suspicious packages, named nhattuanbl/lara-helper, nhattuanbl/simple-queue, and nhattuanbl/lara-swagger, have been flagged due to their malicious intent. Despite their harmful nature, they remain accessible on the PHP package registry and have recorded several downloads.

Researchers at Socket found that nhattuanbl/lara-swagger indirectly spreads malware by listing nhattuanbl/lara-helper as a dependency. This association leads to the installation of a RAT on the host system, presenting a critical security risk.

Technical Analysis of the Threat

The malicious packages house a PHP file, src/helper.php, which uses complex obfuscation techniques to evade static analysis. This includes encoding domain names and file paths, and using randomized identifiers, complicating detection efforts.

Once activated, the payload connects to a command-and-control (C2) server at helper.leuleu[.]net:2096, transmitting system data and awaiting further instructions. The communication utilizes TCP connections through PHP’s stream_socket_client() function.

Potential Impact and Recommendations

The RAT enables commands like ping, info, cmd, powershell, run, screenshot, download, and upload, providing comprehensive remote control over the host system. Its resilience to typical PHP security measures makes it particularly concerning.

Although the C2 server is currently inactive, the RAT is programmed to attempt reconnection every 15 seconds. Users who have installed these packages should consider their systems compromised, remove the packages, change all accessible secrets, and audit network traffic for connections to the C2 address.

In addition to the harmful packages, the threat actors have also released other seemingly benign libraries to gain user trust. These include nhattuanbl/lara-media, nhattuanbl/snooze, and nhattuanbl/syslog. Users are urged to remain vigilant and cautious when installing any packages.

In conclusion, any Laravel application that has incorporated lara-helper or simple-queue faces a persistent security threat, with the potential for unauthorized access and data exposure. It is imperative for users to take immediate action to secure their systems and prevent further compromise.

The Hacker News Tags:application security, cross-platform, cyber threat, Cybersecurity, Laravel, Packagist, PHP, RAT, remote access trojan, threat intelligence

Post navigation

Previous Post: Critical Flaw in IPVanish VPN for macOS Exposes Systems
Next Post: 6G Network Security Principles Unveiled by Global Coalition

Related Posts

Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally Over 17,000 Fake News Websites Caught Fueling Investment Fraud Globally The Hacker News
What is Identity Dark Matter? What is Identity Dark Matter? The Hacker News
FedRAMP at Startup Speed: Lessons Learned FedRAMP at Startup Speed: Lessons Learned The Hacker News
Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code Critical 10-Year-Old Roundcube Webmail Bug Allows Authenticated Users Run Malicious Code The Hacker News
Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data The Hacker News
Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Flaw in Perplexity’s Comet Browser Exploited
  • JetStream Debuts with $34M to Enhance AI Security
  • New RFP Guide Enhances AI Governance and Security
  • China-Linked Silver Dragon Uses Google Drive in Cyberattacks
  • Risks of Pirated Software in Corporate Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Flaw in Perplexity’s Comet Browser Exploited
  • JetStream Debuts with $34M to Enhance AI Security
  • New RFP Guide Enhances AI Governance and Security
  • China-Linked Silver Dragon Uses Google Drive in Cyberattacks
  • Risks of Pirated Software in Corporate Environments

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News