Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    Cybersecurity

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    adminBy adminMarch 4, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Ravie LakshmananMar 04, 2026Threat Intelligence / Application Security

    Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems.

    The names of the packages are listed below –

    • nhattuanbl/lara-helper (37 Downloads)
    • nhattuanbl/simple-queue (29 Downloads)
    • nhattuanbl/lara-swagger (49 Downloads)

    According to Socket, the package “nhattuanbl/lara-swagger” does not directly embed malicious code, lists “nhattuanbl/lara-helper” as a Composer dependency, causing it to install the RAT. The packages are still available for download from the PHP package registry.

    Both lara-helper and simple-queue have been found to contain a PHP file named “src/helper.php,” which employs a number of tricks to complicate static analysis by making use of techniques like control flow obfuscation, encoding domain names, command names, and file paths, and randomized identifiers for variable and function names. 

    “Once loaded, the payload connects to a C2 server at helper.leuleu[.]net:2096, sends system reconnaissance data, and waits for commands — giving the operator full remote access to the host,” security researcher Kush Pandya said.

    This includes sending system information and parsing commands received from the C2 server for subsequent execution on the compromised host. The communication occurs over TCP using PHP’s stream_socket_client(). The list of supported commands is below –

    • ping, to send a heartbeat automatically every 60 seconds
    • info, to send system reconnaissance data to the C2 server
    • cmd, to run a shell command
    • powershell, to run a PowerShell command
    • run, to run a shell command in the background
    • screenshot, to capture the screen using imagegrabscreen()
    • download, to read a file from disk
    • upload, to a file on disk and grant it read, write, and execute permissions to all users
    • stop, to the socket, and exit

    “For shell execution, the RAT probes disable_functions and picks the first available method from: popen, proc_open, exec, shell_exec, system, passthru,” Pandya said. ‘This makes it resilient to common PHP hardening configurations.”

    While the C2 server is currently non-responsive, the RAT is configured such that it retries the connection every 15 seconds in a persistent loop, making it a security risk. Users who have installed the packages are advised to assume compromise, remove them, rotate all secrets accessible from the application environment, and audit outbound traffic to the C2 server.

    Besides the aforementioned three packages, the threat actor behind the operation has published three other libraries (“nhattuanbl/lara-media,” “nhattuanbl/snooze,” and “nhattuanbl/syslog”) that are clean, likely in an effort to build credibility and trick users into installing the malicious ones.

    “Any Laravel application that installed lara-helper or simple-queue is running a persistent RAT. The threat actor has full remote shell access, can read and write arbitrary files, and receives an ongoing system profile for each connected host,” Socket said.

    “Because activation happens at application boot (via service provider) or class autoloads (via simple-queue), the RAT runs in the same process as the web application with the same filesystem permissions and environment variables, including database credentials, API keys, and .env contents.”

    Deploy Fake Laravel Linux macOS Packages Packagist RAT Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Focus on Topics (Not Keywords) in Your SEO Strategy
    Next Article I have tried dozens of cloud storage apps, but I keep coming back to OneDrive due to this privacy feature
    admin
    • Website

    Related Posts

    The vulnerability that turns your AI agent against you

    March 4, 2026

    Paint maker giant AkzoNobel confirms cyberattack on U.S. site

    March 4, 2026

    VMware Aria Operations Vulnerability Exploited in the Wild

    March 4, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How I Created a Donor Leaderboard in WordPress & Got More Donations

    March 4, 2026

    I have tried dozens of cloud storage apps, but I keep coming back to OneDrive due to this privacy feature

    March 4, 2026

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    March 4, 2026

    How to Focus on Topics (Not Keywords) in Your SEO Strategy

    March 4, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (595)
    • Privacy & Online Earning (88)
    • SEO & Digital Marketing (374)
    • Tech Tools & Mobile / Apps (731)
    • WiFi / Internet & Networking (106)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How I Created a Donor Leaderboard in WordPress & Got More Donations

    March 4, 2026

    I have tried dozens of cloud storage apps, but I keep coming back to OneDrive due to this privacy feature

    March 4, 2026

    Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    March 4, 2026
    Most Popular
    • How I Created a Donor Leaderboard in WordPress & Got More Donations
    • I have tried dozens of cloud storage apps, but I keep coming back to OneDrive due to this privacy feature
    • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
    • How to Focus on Topics (Not Keywords) in Your SEO Strategy
    • The Galaxy S26 Ultra makes it clear this feature isn’t coming back
    • The vulnerability that turns your AI agent against you
    • Seraphinite Accelerator WordPress Plugin Vulnerabilities Affect 60K Sites
    • Oukitel WP63 is a phone I would stock for the apocalypse
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.