Hackers Compromised 233 Versions of Laravel-Lang Packages by Hacking 700 GitHub Repos

A highly sophisticated supply chain attack has compromised the Laravel-Lang ecosystem, injecting credential-stealing remote code execution backdoors into 233 package versions across 700 GitHub repositories.

Discovered in May 2026 by Socket and Aikido, threat actors manipulated GitHub tags to distribute malware through Composer’s autoloader, granting complete remote access to developer environments.

The attackers bypassed direct repository commits by exploiting GitHub’s version tagging system to point legitimate tags toward a malicious fork.

When developers pulled the affected localization packages via Packagist, the malicious src/helpers.php executed automatically due to Composer’s autoload.files directive. This method effectively hid the malware from standard repository audits while inheriting full web application permissions.

The initial infection phase utilizes a stealthy dropper that masquerades as a standard Laravel localization function. It fingerprints the host system using specific hardware metrics and establishes a temporary marker file to prevent redundant executions.

Aikido observed that the payload disables SSL verification and fetches a secondary script from an obfuscated command-and-control server, launching it silently via OS-specific methods.

Payload Execution Methods

Operating SystemExecution MechanismPrivilege Level
LinuxBackground execution using exec("php ...")Application user
macOSBackground execution using exec("php ...")Application user
WindowsGenerated .vbs script running via cscriptApplication user

The fetched payload is an extensive PHP credential stealer containing 15 specialized collector modules. It systematically targets sensitive developer secrets, including cloud metadata, database credentials, and environment configuration files.

After harvesting the secrets, the malware encrypts the payload using AES-256 and exfiltrates it to the attacker’s infrastructure before deleting itself to evade forensic detection.

The malware framework systematically strips the infected machine of high-value configurations and credentials:

  • Cloud access keys for AWS, GCP, Azure, and DigitalOcean.
  • Infrastructure configurations including Kubernetes profiles, Docker tokens, and HashiCorp Vault secrets.
  • Developer assets such as SSH private keys, Git credentials, and shell history files.
  • Saved browser passwords, cryptocurrency wallets, and password manager databases.

Security researchers advise immediate rotation of all application secrets, database credentials, and API keys exposed to compromised environments.

Development teams must inspect their composer.lock files to block affected Laravel-Lang packages and audit outbound network traffic for suspicious connections.

Systems running compromised packages should be entirely rebuilt from known-good images to ensure total eradication of the persistent threat.

Indicators of Compromise

TypeIndicator
Domain (C2)flipboxstudio[.]info
URL (Payload Fetch)https://flipboxstudio[.]info/payload
URL (Exfiltration)https://flipboxstudio[.]info/exfil
File Path (Malicious)src/helpers.php
File Path (Infection Marker)<tmp>/.laravel_locale/<md5_hash>
File Path (Dropped Stealer)<tmp>/.laravel_locale/<12 random hex chars>.php
File Path (Windows Launcher)<tmp>/.laravel_locale/<8 random hex chars>.vbs
Artifact (Windows)DebugChromium.exe
IP Address169.254.169.254
Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Hackers Compromised 233 Versions of Laravel-Lang Packages by Hacking 700 GitHub Repos appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Leave a Reply

Your email address will not be published. Required fields are marked *

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading