VulnerabilitiesHIGH

Malicious Laravel Packages Spread Cross-Platform RAT!

THThe Hacker News19h ago2 min read
LaravelRATPackagistnhattuanbl
🎯

Basically, fake Laravel tools are secretly installing malware on your computer.

Quick Summary

Malicious Laravel packages are spreading a dangerous RAT across multiple platforms. Developers using these fake tools risk exposing their systems to hackers. Immediate action is needed to uninstall and secure your systems!

What Happened

Cybersecurity researchers have uncovered a serious threat lurking in the world of PHP development. Malicious Packagist packages pretending to be Laravel? utilities have been flagged for deploying a remote access trojan (RAT)?. This RAT can infect systems running Windows, macOS, and Linux, putting countless developers and users at risk.

The identified packages include nhattuanbl/lara-helper, nhattuanbl/simple-queue, and nhattuanbl/lara-swagger. Although these packages may seem harmless, they have been downloaded dozens of times, potentially impacting unsuspecting developers. If you've downloaded any of these packages, your system could be compromised.

Why Should You Care

You might think this only affects developers, but it’s more widespread than that. If you use any software built on Laravel?, you could be at risk. Imagine downloading a seemingly innocent app, only to find it’s a backdoor for hackers. Your personal data, financial information, and even your company's secrets could be exposed.

In today’s digital landscape, where software is often shared and reused, trusting the source is crucial. Just like you wouldn’t open a package from a stranger, you should be cautious about downloading software from unverified sources. This incident serves as a reminder to always check the authenticity of the tools you use.

What's Being Done

Cybersecurity experts are actively investigating these malicious? packages. They are working to remove the harmful listings from Packagist? and alert developers about the risks. Here’s what you can do right now:

  • Uninstall any of the flagged packages immediately from your system.
  • Run a full security scan to check for any signs of infection.
  • Stay updated on cybersecurity news to be aware of similar threats in the future.

Experts are closely monitoring the situation to see if more malicious? packages emerge. They are also looking into how these packages were able to bypass security measures in the first place.

💡 Tap dotted terms for explanations

🔒 Pro insight: The emergence of these RATs highlights the need for enhanced package verification mechanisms in open-source ecosystems.

Original article from

The Hacker News

Read Full Article

Related Pings

HIGHVulnerabilities

Surge in Critical Vulnerabilities: React2Shell Takes Center Stage

December 2025 witnessed a staggering rise in critical vulnerabilities, especially with React2Shell affecting many applications. This surge poses a significant risk to users and developers alike. Immediate action is needed to secure systems against these threats.

Recorded Future Blog·Just now·2m
HIGHVulnerabilities

React2Shell Vulnerabilities Exposed: Act Now!

Two critical vulnerabilities, React2Shell, have emerged, putting many applications at risk. Developers and users alike should be concerned about potential data breaches. Immediate action is needed to secure affected systems and update libraries.

PortSwigger Blog·Just now·2m
HIGHVulnerabilities

Chrome Flaw Exposed Gemini's Camera and Mic to Extensions

A vulnerability in Chrome allowed extensions to hijack Gemini's camera and microphone. Users could have unknowingly exposed their privacy. Google has patched the flaw, but caution is still needed.

Malwarebytes Labs·Just now·2m
HIGHVulnerabilities

Qualcomm Bug Exposes Android Devices to Targeted Attacks

A critical vulnerability in Qualcomm affects many Android devices, exposing users to targeted attacks. Google has patched 129 vulnerabilities, but staying updated is crucial for your device's safety. Don't risk your personal data!

Malwarebytes Labs·Just now·2m
HIGHVulnerabilities

KubeVirt Vulnerability Hits 7.7 on CVSS Scale!

A serious vulnerability in KubeVirt has been rated 7.7 on the CVSS scale. Users are at risk of unauthorized access to sensitive data. Immediate updates and monitoring are essential to protect your systems.

AusCERT Bulletins·Just now·2m
HIGHVulnerabilities

Secure Your AI Infrastructure from the Start

A new AI claims system is facing vulnerabilities that could expose sensitive data. Companies must secure their AI infrastructure to protect customer information. Immediate action is crucial to prevent costly breaches and maintain trust.

Aqua Security Blog·Just now·2m