By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
Computing

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

News Room
Last updated: 2026/03/04 at 4:56 AM
News Room Published 4 March 2026
Share
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
SHARE

Ravie LakshmananMar 04, 2026Threat Intelligence / Application Security

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for a cross-platform remote access trojan (RAT) that’s functional on Windows, macOS, and Linux systems.

The names of the packages are listed below –

  • nhattuanbl/lara-helper (37 Downloads)
  • nhattuanbl/simple-queue (29 Downloads)
  • nhattuanbl/lara-swagger (49 Downloads)

According to Socket, the package “nhattuanbl/lara-swagger” does not directly embed malicious code, lists “nhattuanbl/lara-helper” as a Composer dependency, causing it to install the RAT. The packages are still available for download from the PHP package registry.

Both lara-helper and simple-queue have been found to contain a PHP file named “src/helper.php,” which employs a number of tricks to complicate static analysis by making use of techniques like control flow obfuscation, encoding domain names, command names, and file paths, and randomized identifiers for variable and function names. 

“Once loaded, the payload connects to a C2 server at helper.leuleu[.]net:2096, sends system reconnaissance data, and waits for commands — giving the operator full remote access to the host,” security researcher Kush Pandya said.

This includes sending system information and parsing commands received from the C2 server for subsequent execution on the compromised host. The communication occurs over TCP using PHP’s stream_socket_client(). The list of supported commands is below –

  • ping, to send a heartbeat automatically every 60 seconds
  • info, to send system reconnaissance data to the C2 server
  • cmd, to run a shell command
  • powershell, to run a PowerShell command
  • run, to run a shell command in the background
  • screenshot, to capture the screen using imagegrabscreen()
  • download, to read a file from disk
  • upload, to a file on disk and grant it read, write, and execute permissions to all users
  • stop, to the socket, and exit

“For shell execution, the RAT probes disable_functions and picks the first available method from: popen, proc_open, exec, shell_exec, system, passthru,” Pandya said. ‘This makes it resilient to common PHP hardening configurations.”

While the C2 server is currently non-responsive, the RAT is configured such that it retries the connection every 15 seconds in a persistent loop, making it a security risk. Users who have installed the packages are advised to assume compromise, remove them, rotate all secrets accessible from the application environment, and audit outbound traffic to the C2 server.

Besides the aforementioned three packages, the threat actor behind the operation has published three other libraries (“nhattuanbl/lara-media,” “nhattuanbl/snooze,” and “nhattuanbl/syslog”) that are clean, likely in an effort to build credibility and trick users into installing the malicious ones.

“Any Laravel application that installed lara-helper or simple-queue is running a persistent RAT. The threat actor has full remote shell access, can read and write arbitrary files, and receives an ongoing system profile for each connected host,” Socket said.

“Because activation happens at application boot (via service provider) or class autoloads (via simple-queue), the RAT runs in the same process as the web application with the same filesystem permissions and environment variables, including database credentials, API keys, and .env contents.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Best Phones of MWC 2026 Best Phones of MWC 2026
Next Article [Video Podcast] AI Autonomy Is Redefining Architecture: Boundaries Now Matter Most [Video Podcast] AI Autonomy Is Redefining Architecture: Boundaries Now Matter Most
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Can You Pop Popcorn in an Air Fryer? Unable to Find a Straight Answer, I Went to the Source
Can You Pop Popcorn in an Air Fryer? Unable to Find a Straight Answer, I Went to the Source
News
The Algorithm of Forever | HackerNoon
The Algorithm of Forever | HackerNoon
Computing
Transnational AI regulation needed to protect human rights in the UK | Computer Weekly
Transnational AI regulation needed to protect human rights in the UK | Computer Weekly
News
Biomaterials startup seeks US expansion after £11m raise – UKTN
Biomaterials startup seeks US expansion after £11m raise – UKTN
News

You Might also Like

The Algorithm of Forever | HackerNoon
Computing

The Algorithm of Forever | HackerNoon

35 Min Read
Love in the Time of Artificial Shadows | HackerNoon
Computing

Love in the Time of Artificial Shadows | HackerNoon

23 Min Read
New RFP Template for AI Usage Control and AI Governance 
Computing

New RFP Template for AI Usage Control and AI Governance 

6 Min Read
Absa Kenya shifts to government securities as lending weakens
Computing

Absa Kenya shifts to government securities as lending weakens

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?