惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

WordPress大学
WordPress大学
阮一峰的网络日志
阮一峰的网络日志
J
Java Code Geeks
宝玉的分享
宝玉的分享
C
CXSECURITY Database RSS Feed - CXSecurity.com
P
Privacy International News Feed
The Register - Security
The Register - Security
T
Threat Research - Cisco Blogs
Recent Commits to openclaw:main
Recent Commits to openclaw:main
PCI Perspectives
PCI Perspectives
Hugging Face - Blog
Hugging Face - Blog
T
Tailwind CSS Blog
酷 壳 – CoolShell
酷 壳 – CoolShell
N
News | PayPal Newsroom
Google Online Security Blog
Google Online Security Blog
aimingoo的专栏
aimingoo的专栏
F
Full Disclosure
P
Palo Alto Networks Blog
A
About on SuperTechFans
Microsoft Azure Blog
Microsoft Azure Blog
F
Fortinet All Blogs
爱范儿
爱范儿
Recorded Future
Recorded Future
月光博客
月光博客
T
True Tiger Recordings
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
T
Tenable Blog
L
Lohrmann on Cybersecurity
博客园 - 聂微东
cs.CV updates on arXiv.org
cs.CV updates on arXiv.org
大猫的无限游戏
大猫的无限游戏
S
Security @ Cisco Blogs
CTFtime.org: upcoming CTF events
CTFtime.org: upcoming CTF events
L
LINUX DO - 热门话题
Hacker News: Ask HN
Hacker News: Ask HN
C
Check Point Blog
H
Hackread – Cybersecurity News, Data Breaches, AI and More
L
LangChain Blog
The Cloudflare Blog
Malwarebytes
Malwarebytes
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
I
InfoQ
N
Netflix TechBlog - Medium
Recent Announcements
Recent Announcements
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
SecWiki News
SecWiki News
云风的 BLOG
云风的 BLOG
T
ThreatConnect
博客园 - 叶小钗
B
Blog

Aikido Security's Blog

5 Gitleaks alternatives and why they are better Google API keys keep working after you delete them The Wild West of VS Code extensions and how a poisoned extension breached GitHub GitHub breached via a malicious VS Code extension: why developer devices are the real target Microsoft's durabletask package on PyPi Compromised. Mini Shai Hulud attacks again... again! Supply Chain Security: The Ultimate Guide to Software Composition Analysis (SCA) Tools Cloud Security Architecture: Principles, Frameworks, and Best Practices Cloud Security for DevOps: Securing CI/CD and IaC Compliance in the Cloud: Frameworks You Can’t Ignore Using Generative AI for Pentesting: What It Can (and Can’t) Do Top Cloud Security Tools for Modern Teams Top 8 Checkmarx Alternatives for SAST and Application Security Mini Shai-Hulud strikes again: npm worm compromises hundreds of @antv packages The Top 6 Best AI Tools for Coding in 2025 Top XBOW Alternatives In 2026 Top SonarQube Alternatives in 2025 Top 7 CodeRabbit Alternatives for AI Code Review in 2026 Best Orca Security Alternatives for Cloud & CNAPP Security 2026 Top 6 Wiz.io Alternatives for Cloud & Application Security in 2026 Top DevSecOps Tools to Replace GitLab Ultimate’s Security Features Top 5 GitHub Advanced Security Alternatives for DevSecOps Teams in 2026 Best 6 Veracode Alternatives for Application Security (Dev-First Tools to Consider) Top 10 Software Composition Analysis (SCA) tools in 2026 Top 10 AI-powered SAST tools in 2026 Top 12 Dynamic Application Security Testing (DAST) Tools in 2026 Penetration testing vs. red teaming: what’s the difference? Pentest GPT: How LLMs Are Reshaping Penetration Testing One year of Opengrep: What we built and what’s next Shadow AI is a fear response, and banning it makes it worse Mini Shai-Hulud Is Back: npm Worm Hits over 160 Packages, including Mistral and Tanstack Security Checklist for GitHub Actions Coinbase's layoffs signal a dangerous move into a vibe-coding security mess Securing Legacy Dependencies with Aikido and TuxCare Top OWASP scanners in 2026 for web application security Rolling out developer security in a 5,000+ engineer organization Security metamorphosis: a Mythos-ready architecture checklist for autonomous AI attacks Why browser extensions are a major security risk and what you can do about it Popular PyTorch Lightning Package Compromised by Mini Shai-Hulud Aikido integrates with AWS Kiro: Catching in review doesn't scale anymore Top CVE scanners in 2026 to identify known vulnerabilities A practical CTO security checklist to be Mythos-ready Mini Shai-Hulud Targets SAP npm Packages With a Bun-Based Secret Stealer Someone published four versions of a fake "tanstack" package in 27 minutes to steal your .env files It's time to treat browser extensions like supply chain attack vectors Introducing Safe Chain: Stopping Malicious npm Packages Before They Wreck Your Project What is a CVE? Is Shai-Hulud Back? Compromised Bitwarden CLI Contains a Self-Propagating npm Worm GPT-Proxy Backdoor in npm and PyPI turns Servers into Chinese LLM Relays Roundcube XSS chained with cookie tossing for full inbox access Introducing Endpoint Protection: Security for Developer Devices Multiple Cross-Site Scripting (XSS) Vulnerabilities in Mailcow Reliable CVE sources in the age of NIST NVD cutbacks Ship Fast, Stay Secure: Better Alternatives to Jit.io Axios CVE-2026-40175: a critical bug that’s… not exploitable Bug bounty isn’t dead, but the old model is breaking GlassWorm goes native: New Zig dropper infects every IDE on your machine Aikido Attack finds multiple 0-days in Hoppscotch The cybersecurity doomerism around Mythos doesn't match what we see on the ground Top Vibe Coding Tools for a Seamless Workflow in 2026 Top Software Security Testing Tools Top Security Monitoring Tools Top Runtime Security Tools Top IAST Tools For Interactive Application Security Testing Top GCP Security Tools For Safeguarding Google Cloud Top Docker Security Tools Top Azure Security Tools Top AI Coding Assistants Top AI Code Generators Top 8 AWS Security Tools in 2026 Top 12 ASPM Tools in 2026 Top Secret Scanning Tools Top 12 Software Supply Chain Security Tools in 2026 axios compromised on npm: maintainer account hijacked, RAT deployed Popular telnyx package compromised on PyPI by TeamPCP Top RSAC 2026 Parties, Side-Events & Security Meetups Aikido × Lovable: Vibe, Fix, Ship CanisterWorm Gets Teeth: TeamPCP's Kubernetes Wiper Targets Iran TeamPCP deploys CanisterWorm on NPM following Trivy compromise Security testing is validating software that no longer exists Aikido Recognized by Frost & Sullivan with the 2026 Customer Value Leadership Award in ASPM GlassWorm Hides a RAT Inside a Malicious Chrome Extension fast-draft Open VSX Extension Compromised by BlokTrooper npm debug and chalk packages compromised Best 6 AI Pentesting Tools in 2026 Top 9 Best AI Code Review Tools in 2026 The 6 Best Code Quality Tools for 2026 Top 18 Automated Pentesting Tools Every DevSecOps Team Should Know Glassworm Strikes Popular React Native Phone Number Packages Glassworm Is Back: A New Wave of Invisible Unicode Attacks Hits Hundreds of Repositories How Security Teams Fight Back Against AI-Powered Hackers Introducing Betterleaks, an open source secrets scanner by the author of Gitleaks Trump’s 2026 cybersecurity strategy: From compliance to consequence How does AI pentesting work with compliance? What continuous pentesting actually requires Rare Not Random: Using Token Efficiency for Secrets Scanning Persistent XSS/RCE using WebSockets in Storybook’s dev server Why Determinism Is Still a Necessity in Security WAF vs. RASP vs. ADR Introducing Aikido Infinite: A new model of self-securing software How Aikido secures AI pentesting agents by design
Supply Chain Attack Targets Laravel-Lang Packages with Credential Stealer
2026-05-23 · via Aikido Security's Blog

Published on:

May 23, 2026

On May 22, 2026, we detected an active supply chain attack against Laravel-Lang. We filed a report with the maintainers immediately. The attacker published malicious version tags across three widely used repositories, injecting credential-stealing code that loads automatically via composer’s autoloader feature.

What makes this particularly sneaky is that the malicious code was never committed to the official repos at all. GitHub allows version tags to point to commits from a fork of the same repository. The attacker exploited this to create tags pointed to commits in a malicious fork they controlled.

233 versions are currently compromised across:

  • laravel-lang/lang (7.8k stars)
  • laravel-lang/attributes
  • laravel-lang/http-statuses

We also reported the attack to Packagist, who responded immediately by taking down the malicious versions and temporarily unlisting the affected packages to prevent further installations.

Stage 1: The dropper

The attacker introduced a file called src/helpers.php into the affected version tags. On the surface it looks like a routine Laravel localization helper, defining two harmless functions: laravel_lang_locale() and laravel_lang_fallback(). Below those functions, the real work begins.

A self-executing block of code runs once on every machine it infects. It fingerprints the host using a hash of the file path, hostname and inode, then writes a marker file to the system temp directory so it only fires once. The C2 domain is hidden inside an integer array decoded at runtime to evade static scanners. It resolves to flipboxstudio[.]info.

The dropper then fetches a payload from flipboxstudio[.]info/payload using file_get_contents with a curl fallback, both with SSL verification disabled. On Windows it drops a .vbs launcher and runs the payload silently via cscript. On Linux and macOS it executes the payload in the background via exec().

Stage 2: The stealer

The fetched payload is a ~5,900 line PHP credential stealer, organised into fifteen specialist collector modules. After collecting everything it can find, it encrypts the results with AES-256 and sends them to flipboxstudio[.]info/exfil. It then deletes itself from disk to limit forensic evidence.

What it steals

Cloud credentials

  • AWS access keys, secret keys and session tokens (from environment, ~/.aws/credentials and live EC2 instance metadata)
  • GCP application default credentials, access token databases and all named CLI configurations
  • Azure access tokens, MSAL cache and service principal profiles
  • DigitalOcean, Heroku, Vercel, Netlify, Railway and Fly.io auth tokens

Infrastructure secrets

  • All kubeconfig files including /etc/kubernetes/admin.conf
  • HashiCorp Vault tokens
  • Helm repository configs
  • Docker config.json

Developer credentials

  • SSH private keys
  • All .git-credentials and .gitconfig files
  • .netrc, .npmrc, .yarnrc, .pypirc, .gem/credentials, .composer/auth.json
  • GitHub CLI, GitLab CLI and Hub CLI auth tokens
  • Shell history files (bash, zsh, psql, mysql, python, node)
  • All .env files and config files found by recursively scanning the working directory (wp-config.php, settings.py, docker-compose.yml, secrets.yaml and more)

Browsers and password managers

  • Saved passwords from 17 Chromium-based browsers: Chrome, Edge, Brave, Opera, Opera GX, Vivaldi, Chromium, Yandex and more. On Windows a bundled helper .exe is dropped to decrypt Chrome's DPAPI-protected login database
  • Firefox and Thunderbird logins.json and key4.db across all profiles
  • KeePass .kdbx and .kdb database files
  • 1Password and Bitwarden local vault files

Cryptocurrency wallets

  • Bitcoin, Ethereum, Monero, Litecoin, Dash, Dogecoin and Zcash wallet files
  • Electrum, Exodus, Atomic, Ledger Live, Trezor, Wasabi and Sparrow wallets
  • Browser extension wallets by extension ID: MetaMask, Phantom, Trust Wallet, Ronin, Keplr, Solflare and Rabby

Windows-specific

  • Windows Credential Manager and Vault entries
  • PuTTY and WinSCP saved sessions (WinSCP passwords are actively decrypted)
  • .rdp files from Desktop, Documents and Downloads
  • Outlook registry profiles, OST/PST file inventory and Credential Manager entries for Microsoft services

Communication platforms

  • Slack tokens
  • Discord bot tokens 
  • Telegram bot tokens

VPN configs

  • Config files and extracted credentials for NordVPN, ExpressVPN, ProtonVPN, CyberGhost, Private Internet Access, Windscribe, Mullvad, Surfshark, WireGuard and OpenVPN

How Aikido detects this

If you are an Aikido user, check your central feed and filter on malware issues. This will surface as a 100/100 critical issue. Aikido rescans nightly, but we recommend triggering a manual rescan now.

If you are not yet an Aikido user, you can create an account and connect your repos. Our malware coverage is included in the free plan, no credit card required.

For broader coverage across your whole team, Aikido's Endpoint Protection gives you visibility and control over the software packages installed on your team's devices. It covers browser extensions, code libraries, IDE plugins, and build dependencies, all in one place. Stop malware before it gets installed.

For future protection, consider Aikido Safe Chain (open source). Safe Chain sits in your existing workflow, intercepting npm, npx, yarn, pnpm, and pnpx commands and checking packages against Aikido Intel before install.

‍Indicators of Compromise

Network

  • flipboxstudio.info (C2 domain)
  • flipboxstudio.info/payload (dropper fetch)
  • flipboxstudio.info/exfil (exfiltration endpoint)

Files and paths

  • <tmp>/.laravel_locale/<md5_hash> (infection marker)
  • <tmp>/.laravel_locale/<12 random hex chars>.php (dropped stealer)
  • <tmp>/.laravel_locale/<8 random hex chars>.vbs (Windows launcher)

Last updated on:

May 23, 2026

4.7/5

Tired of false positives?

Try Aikido like 100k others.

Start Now

Get a personalized walkthrough

Trusted by 100k+ teams

Book Now

Scan your app for IDORs and real attack paths

Trusted by 100k+ teams

Start Scanning

See how AI pentests your app

Trusted by 100k+ teams

Start Testing

May 21, 2026

Vulnerabilities & Threats

Google API keys keep working after you delete them

Deleting a Google API key doesn't revoke it immediately. Our testing found successful authentications up to 23 minutes after deletion, and Google has declined to fix it.

#

AppSec

#

Vulnerabilities

May 20, 2026

Vulnerabilities & Threats

The Wild West of VS Code extensions and how a poisoned extension breached GitHub

A poisoned VS Code extension breached GitHub yesterday, one day after Nx Console (2.2M installs) was compromised for 18 minutes on the Visual Studio Marketplace and reached every user with auto-update on.

#

VS Code

#

Software Supply Chain Security

#

Aikido Endpoint

May 20, 2026

Vulnerabilities & Threats

GitHub breached via a malicious VS Code extension: why developer devices are the real target

GitHub confirmed a poisoned VS Code extension compromised an employee device, exposing 3,800 internal repos. Why developer workstations are now the top supply chain target.

#

Software Supply Chain Security

Get secure now

Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

No credit card required | Scan results in 32secs.