One of my websites got "hacked", mailtrap credentials got compromised.
They send some emails with the subject "LARAVEL SMTP CRACK | HOST: smtp.mailtrap.io".
After searching a little I have a tool called "LARAVEL SMTP CRACK". I wonder how it works, I assume it scans for pubic .env files or it hits a URL in order to throw an exception and if the project has APP_DEBUG set to true if will throw all data from the .env file.
Has anybody got also into this issue/mistake?
Can be another way in order to access .env data?
@vladv It’s better to find out how someone managed to got your Mailtrap credentials. If someone’s gotten your Mailtrap credentials then you should consider all API keys and passwords compromised, and change them.
@snapey actually is an online (live) development environment (I know that not the right way, but it's for the client), and happens sometimes that a needed to set APP_DEBUG= true in order to do a quick fix with live data (I know this is not how the thinks should be made).
this is currently happening to me, is there a way you can email me this tool, so i can be sure that it is real and does what everything claims it does, and potentially figure out a way to fix this issue i dont see a way to PM the OP. OP if you can PM me i can give you my email and if you would send me this tool that would be a HUGE help!