Ravie LakshmananMay 23, 2026Supply Chain Attack / Malware

Laravel-Lang PHP Packages Compromised to Deliver Cross-Platform Credential Stealer

Cybersecurity researchers have flagged a fresh software supply chain attack campaign that has targeted multiple PHP packages belonging to Laravel-Lang to deliver a comprehensive credential-stealing framework.

The affected packages include –

  • laravel-lang/lang
  • laravel-lang/http-statuses
  • laravel-lang/attributes
  • laravel-lang/actions

“The timing and pattern of the newly published tags point to a broader compromise of the Laravel Lang organization’s release process, rather than a single malicious package version,” Socket said. “The tags were published in rapid succession on May 22 and May 23, 2026, with many versions appearing only seconds apart.”

More than 700 versions associated with these packages have been identified, indicating automated mass tagging or republishing. It’s suspected that the attacker may have managed to obtain access to organization-level credentials, repository automation, or release infrastructure.

The core malicious functionality is located in a file named “src/helpers.php” that’s embedded into the version tags. It’s mainly designed to fingerprint the infected host and contact an external server (“flipboxstudio[.]info”) to retrieve a PHP-based cross-platform payload that runs on Windows, Linux, and macOS.

According to Aikido Security, the dropper delivers a Visual Basic Script launcher on Windows and runs it via cscript. On Linux and macOS, it executes the stealer payload via exec().

Cybersecurity

“Because this file [‘src/helpers.php’] is registered in the composer.json under autoload.files, the backdoor is executed automatically on every PHP request handled by the compromised application,” Socket explained.

“The script generates a unique per-host marker (an MD5 hash combining the directory path, system architecture, and inode) to ensure the payload only triggers once per machine. This prevents redundant executions and helps the malware remain undetected after the initial run.”

The stealer is equipped to harvest a wide range of data from compromised systems and exfiltrate it to the same server. This includes –

“The fetched payload is a ~5,900 line PHP credential stealer, organised into fifteen specialist collector modules,” Aikido researcher Ilyas Makari said. “After collecting everything it can find, it encrypts the results with AES-256 and sends them to flipboxstudio[.]info/exfil. It then deletes itself from the disk to limit forensic evidence.”



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here