Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malicious PHP Packages Target Multiple Systems

Malicious PHP Packages Target Multiple Systems

Posted on March 4, 2026 By CWS

Cybersecurity experts have uncovered fake PHP packages on the Packagist platform, disguised as Laravel tools, that are delivering a cross-platform remote access trojan (RAT) affecting Windows, macOS, and Linux devices. These packages, identified by researchers, pose significant security threats to users.

Identified Malicious Packages

The suspicious packages, named nhattuanbl/lara-helper, nhattuanbl/simple-queue, and nhattuanbl/lara-swagger, have been flagged due to their malicious intent. Despite their harmful nature, they remain accessible on the PHP package registry and have recorded several downloads.

Researchers at Socket found that nhattuanbl/lara-swagger indirectly spreads malware by listing nhattuanbl/lara-helper as a dependency. This association leads to the installation of a RAT on the host system, presenting a critical security risk.

Technical Analysis of the Threat

The malicious packages house a PHP file, src/helper.php, which uses complex obfuscation techniques to evade static analysis. This includes encoding domain names and file paths, and using randomized identifiers, complicating detection efforts.

Once activated, the payload connects to a command-and-control (C2) server at helper.leuleu[.]net:2096, transmitting system data and awaiting further instructions. The communication utilizes TCP connections through PHP’s stream_socket_client() function.

Potential Impact and Recommendations

The RAT enables commands like ping, info, cmd, powershell, run, screenshot, download, and upload, providing comprehensive remote control over the host system. Its resilience to typical PHP security measures makes it particularly concerning.

Although the C2 server is currently inactive, the RAT is programmed to attempt reconnection every 15 seconds. Users who have installed these packages should consider their systems compromised, remove the packages, change all accessible secrets, and audit network traffic for connections to the C2 address.

In addition to the harmful packages, the threat actors have also released other seemingly benign libraries to gain user trust. These include nhattuanbl/lara-media, nhattuanbl/snooze, and nhattuanbl/syslog. Users are urged to remain vigilant and cautious when installing any packages.

In conclusion, any Laravel application that has incorporated lara-helper or simple-queue faces a persistent security threat, with the potential for unauthorized access and data exposure. It is imperative for users to take immediate action to secure their systems and prevent further compromise.

The Hacker News Tags:application security, cross-platform, cyber threat, Cybersecurity, Laravel, Packagist, PHP, RAT, remote access trojan, threat intelligence

Post navigation

Previous Post: Critical Flaw in IPVanish VPN for macOS Exposes Systems
Next Post: 6G Network Security Principles Unveiled by Global Coalition

Related Posts

North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews The Hacker News
CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems The Hacker News
4 Outdated Habits Destroying Your SOC’s MTTR in 2026 4 Outdated Habits Destroying Your SOC’s MTTR in 2026 The Hacker News
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks The Hacker News
GlassWorm Malware Exploits GitHub Tokens for Python Attacks GlassWorm Malware Exploits GitHub Tokens for Python Attacks The Hacker News
How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? How Can Retailers Cyber-Prepare for the Most Vulnerable Time of the Year? The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Launches Expanded Cyber Defense with GPT-5.4-Cyber
  • AI-Powered Exploit Reveals Chrome Vulnerability Risks
  • Apple Aims to Fix iPhone Bug Removing Czech Character
  • Emerging Nexcorium Botnet Exploits DVR Vulnerability
  • Tycoon 2FA Loses Ground Amid Rising Phishing Threats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark