|
|
|
|
August 21, 2025
|
Hackers Infiltrate Alleged North Korean Operative’s Computer, Leak Evidence of...
|
|
August 21, 2025
|
Ecosia Proposes Unusual Stewardship Model for Google Chrome
|
|
August 21, 2025
|
OpenAI Presses Meta for Evidence on Musk’s $97 Billion Takeover Bid
|
|
August 15, 2025
|
ChatGPT Mobile App Surpasses $2 Billion in Consumer Spending, Dominating Rivals
|
|
|
Chinese Authorities Using New Malware Tool to Extract Data from Seized Phones
July 16, 2025
Security researchers have uncovered a powerful new surveillance tool used by Chinese authorities to extract sensitive data from smartphones. The malware, known as Massistant, is capable of pulling information from Android devices — including messages, location data, call records, images, contacts, and more — even from encrypted apps like Signal.
The malware was analyzed by cybersecurity firm Lookout, which attributes its development to Chinese digital forensics company Xiamen Meiya Pico, a major player in the surveillance technology sector.
Malware Designed for Physical Access
Massistant is not designed for remote hacking. Instead, it requires physical access to a target’s device, such as during border checks, police stops, or device seizures. Once installed, Massistant can silently extract large volumes of personal data. Researchers say the malware is likely used widely by Chinese authorities, although it's unclear which specific agencies are deploying it.
“Anyone traveling in the region should be aware that their phone could be taken and its data copied,” said Kristina Balaam, a Lookout researcher who analyzed the tool.
The malware reportedly leaves traces on compromised phones, making detection and removal possible after the fact. However, by the time users notice it, their data is likely already exfiltrated.
Hardware-Based Surveillance System
Massistant works in combination with a hardware tower that connects to desktop computers. A setup diagram from Xiamen Meiya Pico’s official site shows the system pulling data from both Android and iPhone devices, though researchers have so far only analyzed the Android component.
Despite the system’s advanced capabilities, its use doesn't require sophisticated hacking techniques like zero-day exploits. In most cases, individuals voluntarily unlock their phones for inspection or are required by law to hand them over. In China, authorities can inspect devices without a warrant, and compliance is mandatory at checkpoints and border crossings.
Public Reports and Prior Use
Several users in Chinese online forums have reported finding the malware installed on their phones after interactions with law enforcement. This suggests Massistant’s deployment is more common than officially acknowledged.
The tool is believed to be the successor to MSSocket, an earlier mobile data extraction system also developed by Meiya Pico and previously analyzed by researchers in 2019.
A Dominant Player in China’s Surveillance Tech Market
Xiamen Meiya Pico is reportedly responsible for about 40% of China's digital forensics market. The company was sanctioned by the U.S. government in 2021 for allegedly supporting human rights abuses through its technology.
Massistant is just one of at least 15 malware families tracked by Lookout and believed to be used across China's extensive state surveillance infrastructure.
Implications for Travelers and Residents
While Android users may be able to detect Massistant using tools like Android Debug Bridge (ADB), the tool’s installation means the damage is already done. Authorities can extract sensitive information within moments of gaining access.
This situation underscores the growing concern about mobile device privacy in high-surveillance regions and highlights the need for stronger digital hygiene practices, especially for individuals who travel internationally or handle sensitive data.
|
|
|
Sign Up to Our Newsletter!
Get the latest news in tech.
|
|
|