Close Menu
Voxa News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Eight NFL teams that need preseason the most: Bears, Browns, Steelers among clubs with key questions to answer

    August 6, 2025

    ‘People were sold a lie’

    August 6, 2025

    13 Best Small Towns in California, According to Locals and Experts

    August 6, 2025
    Facebook X (Twitter) Instagram
    Voxa News
    Trending
    • Eight NFL teams that need preseason the most: Bears, Browns, Steelers among clubs with key questions to answer
    • ‘People were sold a lie’
    • 13 Best Small Towns in California, According to Locals and Experts
    • OGC Nice start season against Benfica in third qualifying round of Champions League
    • We’re being deafened by digital noise. Pause it and you hear the sound of democracy in crisis | Rafael Behr
    • Two ‘misleading’ heat pump adverts banned by UK watchdog | Energy industry
    • U.S. charges two Chinese nationals for illegally shipping Nvidia AI chips to China
    • Josh Brolin Takes Playful Jab at Stephen Colbert After Show Canceled
    Wednesday, August 6
    • Home
    • Business
    • Health
    • Lifestyle
    • Politics
    • Science
    • Sports
    • Travel
    • World
    • Entertainment
    • Technology
    Voxa News
    Home»Technology»Chinese authorities are using a new tool to hack seized phones and extract data
    Technology

    Chinese authorities are using a new tool to hack seized phones and extract data

    By Olivia CarterJuly 16, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    A border police officer answers questions from inbound passengers at Chongqing Jiangbei International Airport in southwest China's Chongqing, July 8, 2025.
    Image Credits:Huang Wei/Xinhua / Getty Images
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more.

    On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.

    Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn’t know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means both Chinese residents, as well as travelers to China, should be aware of the tool’s existence and the risks it poses.

    “It’s a big concern. I think anybody who’s traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that’s on it could be collected,” Kristina Balaam, a researcher at Lookout who analyzed the malware, told TechCrunch ahead of the report’s release. “I think it’s something everybody should be aware of if they’re traveling in the region.”

    Balaam found several posts on local Chinese forums where people complained about finding the malware installed on their devices after interactions with the police. 

    “It seems to be pretty broadly used, especially from what I’ve seen in the rumblings on these Chinese forums,” said Balaam.

    The malware, which must be planted on an unlocked device, and works in tandem with a hardware tower connected to a desktop computer, according to a description and pictures of the system on Xiamen Meiya Pico’s website.

    Balaam said Lookout couldn’t analyze the desktop component, nor could the researchers find a version of the malware compatible with Apple devices. In an illustration on its website, Xiamen Meiya Pico shows iPhones connected to its forensic hardware device, suggesting the company may have an iOS version of Massistant designed to extract data from Apple devices.

    Police do not need sophisticated techniques to use Massistant, such as using zero-days — flaws in software or hardware that have not yet been disclosed to the vendor — as “people just hand over their phones,” said Balaam, based on what she’s read on those Chinese forums.

    Since at least 2024, China’s state security police have had legal powers to search through phones and computers without needing a warrant or the existence of an active criminal investigation. 

    “If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it,” said Balaam. “I don’t think we see any real exploits from lawful intercept tooling space just because they don’t need to.”

    A screenshot of the Massistant mobile forensic tool’s hardware, taken from Xiamen Meiya Pico’s official Chinese website.Image Credits:Xiamen Meiya Pico

    The good news, per Balaam, is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer. 

    The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person’s data. 

    According to Lookout, Massistant is the successor of a similar mobile forensic tool, also made by Xiamen Meiya Pico, called MSSocket, which security researchers analyzed in 2019. 

    Xiamen Meiya Pico reportedly has a 40% share of the digital forensics market in China, and was sanctioned by the U.S. government in 2021 for its role in supplying its technology to the Chinese government. 

    The company did not respond to TechCrunch’s request for comment.

    Balaam said that Massistant is only one of a large number of spyware or malware made by Chinese surveillance tech makers, in what she called “a big ecosystem.” The researcher said that the company tracks at least 15 different malware families in China.

    authorities Chinese Data extract hack phones seized Tool
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Olivia Carter
    • Website

    Olivia Carter is a staff writer at Verda Post, covering human interest stories, lifestyle features, and community news. Her storytelling captures the voices and issues that shape everyday life.

    Related Posts

    U.S. charges two Chinese nationals for illegally shipping Nvidia AI chips to China

    August 6, 2025

    Social media battles and barbs on both sides of Atlantic over UK Online Safety Act | Internet safety

    August 6, 2025

    WhatsApp deletes over 6.8m accounts linked to scams, Meta says

    August 6, 2025

    Censorship and stolen puritanical valor

    August 6, 2025

    Clay confirms it closed $100M round at $3.1B valuation

    August 6, 2025

    US Coast Guard Report on Titan Submersible Implosion Singles Out OceanGate CEO Stockton Rush

    August 6, 2025
    Leave A Reply Cancel Reply

    Medium Rectangle Ad
    Top Posts

    27 NFL draft picks remain unsigned, including 26 second-rounders and Bengals’ Shemar Stewart

    July 17, 20251 Views

    Eight healthy babies born after IVF using DNA from three people | Science

    July 17, 20251 Views

    Massive Attack announce alliance of musicians speaking out over Gaza | Kneecap

    July 17, 20251 Views
    Don't Miss

    Eight NFL teams that need preseason the most: Bears, Browns, Steelers among clubs with key questions to answer

    August 6, 2025

    Imagn Images The 2025 NFL preseason kicked off with the Pro Football Hall of Fame…

    ‘People were sold a lie’

    August 6, 2025

    13 Best Small Towns in California, According to Locals and Experts

    August 6, 2025

    OGC Nice start season against Benfica in third qualifying round of Champions League

    August 6, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Medium Rectangle Ad
    Most Popular

    27 NFL draft picks remain unsigned, including 26 second-rounders and Bengals’ Shemar Stewart

    July 17, 20251 Views

    Eight healthy babies born after IVF using DNA from three people | Science

    July 17, 20251 Views

    Massive Attack announce alliance of musicians speaking out over Gaza | Kneecap

    July 17, 20251 Views
    Our Picks

    As a carer, I’m not special – but sometimes I need to be reminded how important my role is | Natasha Sholl

    June 27, 2025

    Anna Wintour steps back as US Vogue’s editor-in-chief

    June 27, 2025

    Elon Musk reportedly fired a key Tesla executive following another month of flagging sales

    June 27, 2025
    Recent Posts
    • Eight NFL teams that need preseason the most: Bears, Browns, Steelers among clubs with key questions to answer
    • ‘People were sold a lie’
    • 13 Best Small Towns in California, According to Locals and Experts
    • OGC Nice start season against Benfica in third qualifying round of Champions League
    • We’re being deafened by digital noise. Pause it and you hear the sound of democracy in crisis | Rafael Behr
    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions
    2025 Voxa News. All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.