As technology advances, the line between normalcy and malicious intent becomes increasingly blurred. Cyber attackers are no longer simply breaking into systems; they are now integrating themselves, using everyday tools, trusted applications, and even AI assistants to carry out their schemes. What used to be clear-cut cases of hacking now resemble a reflection of the very systems we rely on.
This week’s discoveries reveal a common theme: precision, patience, and persuasion. The latest cyber campaigns no longer seek attention through loud tactics; instead, they operate discreetly through familiar interfaces, fake updates, and sophisticated code. The real danger lies not only in what is being exploited but in how convincingly ordinary it all appears.
ThreatsDay brings together these threads, spanning from corporate networks to consumer technology, illustrating how subtle manipulation and automation are reshaping the landscape of cyber threats. It serves as a reminder that the future of cybersecurity will not depend on stronger defenses but on heightened vigilance and awareness.
-
Exploitation of an open-source tool
Cybercriminals are exploiting an open-source monitoring tool called Nezha to gain unauthorized access to compromised hosts. Nezha, which allows administrators to monitor system health, execute commands, transfer files, and open interactive terminal sessions, has become an attractive option for threat actors. In a recent incident investigated by Ontinue, Nezha was used as a post-exploitation remote access tool through a bash script, connecting to a remote dashboard hosted on Alibaba Cloud infrastructure in Japan. Mayuresh Dani, security research manager at Qualys, commented, “The weaponization of Nezha highlights a modern attack strategy where attackers misuse legitimate software to establish persistence and move laterally, evading traditional detection methods. This tactic is part of a broader trend where attackers leverage legitimate tools to bypass detection, blend in with normal activities, and reduce development efforts.”
-
Implementation of facial scans for SIM registration
South Korea is set to introduce mandatory facial recognition for individuals registering new mobile phone numbers to combat scams and identity theft. By verifying the photo on an identification card against the actual individual in real-time, the Ministry of Science and ICT aims to prevent the activation of phones registered under false identities. This new policy, effective from March 23, will apply to major mobile carriers in South Korea, including SK Telecom, Korea Telecom, and LG Uplus. The ministry has assured that no personal data will be stored as part of this new measure, emphasizing the importance of security in light of recent hacking incidents in the country.
-
Rise in Android NFC-related threats
Recent data from ESET indicates an 87% increase in detections of NFC-abusing Android malware between the first and second halves of 2025. These NFC-based malware variants have become more sophisticated, incorporating features such as stealing contacts, bypassing biometric verification, and combining NFC attacks with remote access trojan (RAT) functionalities and Automated Transfer System (ATS) capabilities. In these instances, malicious apps like PhantomCard prompt users to hold their payment card near the phone and enter their PIN, with the captured information being sent to the attackers. ESET noted, “The evolution of NFC-based attacks demonstrates that threat actors are moving beyond traditional relay attacks, incorporating NFC exploitation with advanced functionalities like remote access and automated transfers. These scams are further facilitated by advanced social engineering techniques and technologies that can circumvent biometric security measures.”
The narratives of this week go beyond mere cyber attacks; they paint a picture of a digital realm evolving under constant pressure. Each exploit, deceptive lure, or AI manipulation serves as a test for our systems in real-time. The key takeaway here is not to succumb to panic but to cultivate a sense of awareness. The more we comprehend the evolution of these tactics, the less power they wield over us.
Cybersecurity now stands at a critical juncture, where trust and automation intersect. As AI is leveraged for defense, it also learns the art of deception. This delicate balance will shape the upcoming chapter in cybersecurity, and our readiness to confront it hinges on what we observe today.
Remain inquisitive, maintain a healthy dose of skepticism, and delve into the nuances. The most significant threats often lurk in the mundane, serving as the starting point for groundbreaking innovations in defense.

