Chinese advanced persistent threat groups have been exploiting open-source and living-off-the-land tactics, including the use of Rakshasa and Stowaway reverse proxy programs, PlugX remote access trojan, and custom DLL files for login credential theft, as per Symantec Threat Hunter Team’s analysis.

Hacking Xiaomi Smartwatch Using Touch Point to Find Unlock PIN coordinates
Security researcher Sergei Volokitin revealed hardware vulnerabilities in Xiaomi devices, including the S3 smartwatch, at a cybersecurity conference. The event, aimed at identifying Device vulnerabilities,