Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    Cybersecurity

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    adminBy adminMarch 4, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 04, 2026Threat Intelligence / Application Security

    Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems.

    The names of the packages are listed below –

    • nhattuanbl/lara-helper (37 Downloads)
    • nhattuanbl/simple-queue (29 Downloads)
    • nhattuanbl/lara-swagger (49 Downloads)

    According to Socket, the package “nhattuanbl/lara-swagger” does not directly embed malicious code, lists “nhattuanbl/lara-helper” as a Composer dependency, causing it to install the RAT. The packages are still available for download from the PHP package registry.

    Both lara-helper and simple-queue have been found to contain a PHP file named “src/helper.php,” which employs a number of tricks to complicate static analysis by making use of techniques like control flow obfuscation, encoding domain names, command names, and file paths, and randomized identifiers for variable and function names. 

    “Once loaded, the payload connects to a C2 server at helper.leuleu[.]net:2096, sends system reconnaissance data, and waits for commands — giving the operator full remote access to the host,” security researcher Kush Pandya said.

    This includes sending system information and parsing commands received from the C2 server for subsequent execution on the compromised host. The communication occurs over TCP using PHP’s stream_socket_client(). The list of supported commands is below –

    • ping, to send a heartbeat automatically every 60 seconds
    • info, to send system reconnaissance data to the C2 server
    • cmd, to run a shell command
    • powershell, to run a PowerShell command
    • run, to run a shell command in the background
    • screenshot, to capture the screen using imagegrabscreen()
    • download, to read a file from disk
    • upload, to a file on disk and grant it read, write, and execute permissions to all users
    • stop, to the socket, and exit

    “For shell execution, the RAT probes disable_functions and picks the first available method from: popen, proc_open, exec, shell_exec, system, passthru,” Pandya said. ‘This makes it resilient to common PHP hardening configurations.”

    While the C2 server is currently non-responsive, the RAT is configured such that it retries the connection every 15 seconds in a persistent loop, making it a security risk. Users who have installed the packages are advised to assume compromise, remove them, rotate all secrets accessible from the application environment, and audit outbound traffic to the C2 server.

    Besides the aforementioned three packages, the threat actor behind the operation has published three other libraries (“nhattuanbl/lara-media,” “nhattuanbl/snooze,” and “nhattuanbl/syslog”) that are clean, likely in an effort to build credibility and trick users into installing the malicious ones.

    “Any Laravel application that installed lara-helper or simple-queue is running a persistent RAT. The threat actor has full remote shell access, can read and write arbitrary files, and receives an ongoing system profile for each connected host,” Socket said.

    “Because activation happens at application boot (via service provider) or class autoloads (via simple-queue), the RAT runs in the same process as the web application with the same filesystem permissions and environment variables, including database credentials, API keys, and .env contents.”

    Deploy Fake Laravel Linux macOS Packages Packagist RAT Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Focus on Topics (Not Keywords) in Your SEO Strategy
    Next Article I have tried dozens of cloud storage apps, but I keep coming back to OneDrive due to this privacy feature
    admin
    • Website

    Related Posts

    How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

    March 4, 2026

    The vulnerability that turns your AI agent against you

    March 4, 2026

    Paint maker giant AkzoNobel confirms cyberattack on U.S. site

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Is This the Best Accounting Software for Small Business Owners?

    March 4, 2026

    I tested XGIMI’s MemoMind One and they prove smart glasses don’t need a camera to be good

    March 4, 2026

    How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

    March 4, 2026

    Inside Chrome 146’s agent-ready web preview

    March 4, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (596)
    • Privacy & Online Earning (89)
    • SEO & Digital Marketing (375)
    • Tech Tools & Mobile / Apps (732)
    • WiFi / Internet & Networking (106)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Is This the Best Accounting Software for Small Business Owners?

    March 4, 2026

    I tested XGIMI’s MemoMind One and they prove smart glasses don’t need a camera to be good

    March 4, 2026

    How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

    March 4, 2026
    Most Popular
    • Is This the Best Accounting Software for Small Business Owners?
    • I tested XGIMI’s MemoMind One and they prove smart glasses don’t need a camera to be good
    • How Pirated Software Turns Helpful Employees Into Malware Delivery Agents
    • Inside Chrome 146’s agent-ready web preview
    • How I Created a Donor Leaderboard in WordPress & Got More Donations
    • I have tried dozens of cloud storage apps, but I keep coming back to OneDrive due to this privacy feature
    • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    • How to Focus on Topics (Not Keywords) in Your SEO Strategy
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.