On May 22, 2026, a sophisticated supply chain attack was identified targeting the Laravel-Lang project, a vital set of language translation packages for the Laravel PHP framework. The attack compromised 233 distinct version tags across three of the project's most popular repositories. The threat actor injected a multi-stage credential-stealing malware into these versions. The attack vector was particularly insidious, abusing a GitHub feature to create malicious version tags that pointed to code in a forked repository, rather than committing malicious code to the main project. This allowed the compromised packages to be distributed via the Packagist repository, appearing as legitimate updates. The Packagist team has since taken down the malicious versions.
The attack represents a significant evolution in PHP ecosystem supply chain attacks, moving beyond simple typosquatting to compromising legitimate, popular packages through advanced techniques.
The attack chain consisted of multiple stages:
Compromise: The attacker created malicious tags for the following packages:
laravel-lang/langlaravel-lang/attributeslaravel-lang/http-statusesInjection: The malicious code was added to a file named src/helpers.php. This is a classic example of T1195.001 - Compromise Software Dependencies and Development Tools.
Dropper: The injected code acted as a dropper. Upon installation via composer, it would execute, fingerprint the compromised machine (gathering system information), and send this data to a Command and Control (C2) server.
Second Stage Payload: The C2 server, located at flipboxstudio[.]info, would then deliver a second-stage payload. This payload was a large (nearly 6,000 lines) and comprehensive PHP script designed to steal a vast range of credentials, including:
.env files)This extensive credential harvesting is aligned with techniques like T1555 - Credentials from Password Stores and T1552.001 - Credentials in Files.
The impact of this attack is significant for any organization that downloaded the compromised packages. The stolen credentials could lead to a full compromise of development and production environments, data breaches, financial loss, and further supply chain attacks originating from the compromised organization. The attack's stealthy nature means many organizations may be unaware of the compromise. The quick response by the Packagist team helped limit the window of exposure, but any system that pulled the malicious versions during that window should be considered fully compromised.
flipboxstudio[.]infoSecurity teams may want to hunt for the following patterns to identify potentially compromised systems:
src/helpers.phpeval() or base64_decode() functions.flipboxstudio[.]infocomposer update laravel-lang/*vendor/laravel-lang/vendor directory, not just application code.composer.lock file to see which specific versions are installed. Compare these against the list of 233 compromised versions (if available from security providers).flipboxstudio[.]info IOC in network logs and for suspicious src/helpers.php files..env files, and any IAM roles attached to the server.composer.lock file to pin your project to specific, known-good versions of dependencies. This prevents composer update from automatically pulling in a newly published malicious version.Regularly audit 'composer.lock' files and CI/CD logs to verify the integrity and origin of all software dependencies.
Implement egress filtering to block outbound connections from servers to untrusted domains, which can prevent malware from contacting its C2 server.
Use dependency locking (e.g., composer.lock) to ensure that only specific, vetted versions of packages are used in builds, preventing automatic updates to malicious versions.
To defend against attacks like the one on Laravel-Lang, it's crucial to analyze the code you deploy, including third-party dependencies. Implement a static analysis (SAST) tool in your CI/CD pipeline that is configured to scan the entire vendor directory. The tool should be tuned to flag high-risk functions and patterns common in PHP malware, such as eval(), base64_decode(), gzuncompress(), and remote file inclusions (include 'http://...'). Specifically for this attack, a rule to inspect src/helpers.php in all dependencies for obfuscated code would be effective. This moves beyond simple vulnerability scanning (which would not find this) to active malicious code hunting within your supply chain.
Assume that a malicious package may eventually get into your system. A critical compensating control is to prevent it from communicating with its C2 server. For your PHP application servers, configure network security groups or host-based firewalls to deny all outbound traffic by default. Then, create explicit allow rules for only the essential connections required for the application to function (e.g., to a database, a payment gateway API, etc.). The malicious Laravel-Lang package's attempt to connect to flipboxstudio[.]info would have been blocked by this policy, rendering the credential-stealing payload useless. This Zero Trust network approach contains the breach and provides a high-fidelity alert when an application attempts to violate the policy.
Before promoting new or updated dependencies to production, run them in an isolated, sandboxed environment to observe their behavior. For this Laravel-Lang attack, a dynamic analysis sandbox would have detected the package attempting to make an unauthorized network connection to flipboxstudio[.]info during the composer install process. This behavioral analysis is key to catching novel attacks that static analysis might miss. Integrating an automated dependency sandbox into the CI/CD pipeline, which fails the build if any suspicious behavior (like unexpected network calls, file system access outside the project directory, or process execution) is detected, provides a powerful defense against this class of supply chain attack.
Security researchers detect and report the active supply chain attack against Laravel-Lang.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.