Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Compromised Laravel-Lang Packages Spread Credential Stealer

Compromised Laravel-Lang Packages Spread Credential Stealer

Posted on May 23, 2026 By CWS

In a recent cybersecurity incident, experts have uncovered a supply chain attack targeting several PHP packages from the Laravel-Lang suite. This breach has led to the dissemination of a sophisticated credential-stealing malware, marking a significant threat in the realm of software security.

Details of the Compromised Packages

The compromised packages, identified as laravel-lang/lang, laravel-lang/http-statuses, laravel-lang/attributes, and laravel-lang/actions, were flagged for their role in the malicious campaign. According to cybersecurity firm Socket, the attack seems to have compromised the release process of the entire Laravel Lang organization, rather than a single package.

On May 22 and 23, 2026, a flurry of new tags were published in quick succession, hinting at an organized and automated assault. Over 700 versions were noted, suggesting that the attackers possibly accessed organizational credentials or manipulated the release infrastructure.

How the Malware Operates

The core of the malicious activity resides in a file named “src/helpers.php,” which is embedded in the infected package versions. This file is designed to identify the host system and connect to an external server, “flipboxstudio[.]info,” to retrieve a harmful PHP payload. This payload is capable of executing across Windows, Linux, and macOS platforms.

As explained by Aikido Security, the malware delivers a Visual Basic Script on Windows, executed via cscript. For Linux and macOS, it uses the exec() function to run the stealer payload. The file is automatically executed due to its registration in the composer.json under autoload.files, initiating the backdoor with every PHP request processed by the affected application.

Data Harvesting and Exfiltration

The malware is sophisticated in its data collection capabilities, targeting a broad range of sensitive information. It gathers cloud service credentials, browser data, cryptocurrency wallet information, and more. The collected data is then sent to an external server after being encrypted with AES-256 to evade detection.

Information from cloud platforms like Google Cloud, Microsoft Azure, and Kubernetes, as well as authentication tokens for services such as DigitalOcean and Heroku, are at risk. Additionally, it targets browser history, cookies, and login data from popular browsers using a Base64-encoded Windows executable that circumvents certain encryption protections.

After collecting the data, the malware encrypts and transmits it to “flipboxstudio[.]info/exfil,” and then deletes itself to minimize forensic traces. The malware is organized into fifteen specialized modules, each focusing on different types of data, as highlighted by Aikido’s Ilyas Makari.

Conclusion and Future Outlook

This incident underscores the critical need for vigilance in software supply chains. As these attacks become more sophisticated, organizations must enhance their security measures to protect against such threats. The focus should remain on securing credentials and ensuring that release processes are robust against unauthorized access.

The Hacker News Tags:Aikido Security, Automation, credential stealer, cross-platform, Cybersecurity, data breach, data exfiltration, Laravel-Lang, Malware, PHP packages, PHP vulnerability, security threat, Socket, Software Security, supply chain attack

Post navigation

Previous Post: F5 BIG-IP Exploit Enables Network Intrusion via SSH
Next Post: New Vulnerability ‘Underminr’ Masks Malicious Networks

Related Posts

Malicious Code Detected in Node-IPC Package Versions Malicious Code Detected in Node-IPC Package Versions The Hacker News
The ROI Problem in Attack Surface Management The ROI Problem in Attack Surface Management The Hacker News
Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack The Hacker News
Russian Arrests LeakBase Admin in Major Cybercrime Bust Russian Arrests LeakBase Admin in Major Cybercrime Bust The Hacker News
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide The Hacker News
Prioritization, Validation, and Outcomes That Matter Prioritization, Validation, and Outcomes That Matter The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH
  • Drupal Core SQL Vulnerability Exploitation Reported
  • LiteSpeed Plugin Flaw Exploited for Root Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Vulnerability ‘Underminr’ Masks Malicious Networks
  • Compromised Laravel-Lang Packages Spread Credential Stealer
  • F5 BIG-IP Exploit Enables Network Intrusion via SSH
  • Drupal Core SQL Vulnerability Exploitation Reported
  • LiteSpeed Plugin Flaw Exploited for Root Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark