bug-bounty517
xss282
rce126
bragging-post117
account-takeover104
open-source95
google85
authentication-bypass85
csrf85
facebook75
privilege-escalation74
exploit74
stored-xss74
web-security68
access-control67
ai-agents65
reflected-xss63
writeup61
microsoft59
input-validation53
ssrf52
sql-injection48
smart-contract48
defi48
tool47
cross-site-scripting47
information-disclosure45
api-security45
ethereum45
privacy44
cve43
web-application38
llm38
automation37
malware36
burp-suite36
vulnerability-disclosure36
opinion35
web334
html-injection33
smart-contract-vulnerability33
responsible-disclosure33
infrastructure32
machine-learning32
code-generation32
lfi31
apple31
authentication31
phishing31
waf-bypass31
0
3/10
Three malicious PHP packages on Packagist disguised as Laravel utilities were discovered distributing a cross-platform remote access trojan (RAT) capable of compromising Windows, macOS, and Linux systems. The packages—lara-helper, simple-queue, and lara-swagger—achieved limited distribution (29-49 downloads each) before being flagged by security researchers.
supply-chain-attack
malicious-package
packagist
php
laravel
rat
remote-access-trojan
cross-platform
malware
windows
macos
linux
Packagist
Laravel
nhattuanbl/lara-helper
nhattuanbl/simple-queue
nhattuanbl/lara-swagger
0
5/10
threat-intelligence
Kaspersky reports on Stan Ghouls (Bloody Wolf), a cybercriminal APT targeting Russia, Uzbekistan, and neighboring countries since 2023. The group uses spear-phishing emails with malicious PDF attachments containing Java-based loaders to deploy NetSupport RAT, with recent campaigns suggesting expansion into IoT-focused malware.
stan-ghouls
netsupport-rat
phishing
malicious-pdf
java-loader
spear-phishing
apt
remote-access-trojan
malware
initial-access
persistence
russia
uzbekistan
financial-sector
manufacturing
it-sector
infrastructure-analysis
ioc
cyberespionage
Stan Ghouls
Bloody Wolf
NetSupport RAT
STRRAT
Strigoi Master
Kaspersky
Securelist