{"id":181004,"date":"2025-07-16T10:00:00","date_gmt":"2025-07-16T10:00:00","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/07\/16\/chinese-authorities-are-using-a-new-tool-to-hack-seized-phones-and-extract-data-techcrunch\/"},"modified":"2025-07-16T10:00:00","modified_gmt":"2025-07-16T10:00:00","slug":"chinese-authorities-are-using-a-new-tool-to-hack-seized-phones-and-extract-data-techcrunch","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2025\/07\/16\/chinese-authorities-are-using-a-new-tool-to-hack-seized-phones-and-extract-data-techcrunch\/","title":{"rendered":"Chinese authorities are using a new tool to hack seized phones and extract data | TechCrunch"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages \u2014 including from chat apps such as Signal \u2014 images, location histories, audio recordings, contacts, and more.<\/p>\n<p class=\"wp-block-paragraph\">On Wednesday, mobile cybersecurity company Lookout published a new report \u2014 shared exclusively with TechCrunch \u2014 detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.<\/p>\n<p class=\"wp-block-paragraph\">Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn\u2019t know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means both Chinese residents, as well as travelers to China, should be aware of the tool\u2019s existence and the risks it poses.<\/p>\n<p class=\"wp-block-paragraph\">\u201cIt\u2019s a big concern. I think anybody who\u2019s traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that\u2019s on it could be collected,\u201d Kristina Balaam, a researcher at Lookout who analyzed the malware, told TechCrunch ahead of the report\u2019s release. \u201cI think it\u2019s something everybody should be aware of if they\u2019re traveling in the region.\u201d<\/p>\n<p class=\"wp-block-paragraph\">Balaam found several posts on local Chinese forums where people complained about finding the malware installed on their devices after interactions with the police.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cIt seems to be pretty broadly used, especially from what I\u2019ve seen in the rumblings on these Chinese forums,\u201d said Balaam.<\/p>\n<p class=\"wp-block-paragraph\">The malware, which must be planted on an unlocked device, and works in tandem with a hardware tower connected to a desktop computer, according to a description and pictures of the system <a rel=\"nofollow noopener\" href=\"https:\/\/300188-cn.translate.goog\/news\/detail\/402.html?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp\" target=\"_blank\">on Xiamen Meiya Pico\u2019s website<\/a>.<\/p>\n<p class=\"wp-block-paragraph\">Balaam said Lookout couldn\u2019t analyze the desktop component, nor could the researchers find a version of the malware compatible with Apple devices. In an illustration on its website, Xiamen Meiya Pico shows iPhones connected to its forensic hardware device, suggesting the company may have an iOS version of Massistant designed to extract data from Apple devices.<\/p>\n<p class=\"wp-block-paragraph\">Police do not need sophisticated techniques to use Massistant, such as using <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#zero-day\" target=\"_blank\" rel=\"noopener\">zero-days<\/a> \u2014 flaws in software or hardware that have not yet been disclosed to the vendor \u2014 as \u201cpeople just hand over their phones,\u201d said Balaam, based on what she\u2019s read on those Chinese forums.<\/p>\n<p class=\"wp-block-paragraph\">Since at least 2024, <a rel=\"nofollow noopener\" href=\"https:\/\/www.rfa.org\/english\/news\/china\/security-police-check-devices-05082024130107.html\" target=\"_blank\">China\u2019s state security police<\/a> have had legal powers to search through phones and computers without needing a warrant or the existence of an active criminal investigation.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">\u201cIf somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it,\u201d said Balaam. \u201cI don\u2019t think we see any real exploits from lawful intercept tooling space just because they don\u2019t need to.\u201d<\/p>\n<figure class=\"wp-block-image alignwide size-full\"><figcaption class=\"wp-element-caption\"><span class=\"wp-element-caption__text\">A screenshot of the Massistant mobile forensic tool\u2019s hardware, taken from Xiamen Meiya Pico\u2019s official Chinese website.<\/span><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>Xiamen Meiya Pico<\/span><\/figcaption><\/figure>\n<p class=\"wp-block-paragraph\">The good news, per Balaam, is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the <a rel=\"nofollow noopener\" href=\"http:\/\/developer.android.com\/tools\/adb\" target=\"_blank\">Android Debug Bridge<\/a>, a command line tool that lets a user connect to a device through their computer.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person\u2019s data.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">According to Lookout, Massistant is the successor of a similar mobile forensic tool, also made by Xiamen Meiya Pico, called <a rel=\"nofollow noopener\" href=\"https:\/\/www.ft.com\/content\/73aebaaa-98a9-11e9-8cfb-30c211dcd229\" target=\"_blank\">MSSocket<\/a>, which security researchers <a rel=\"nofollow noopener\" href=\"https:\/\/medium.com\/@fs0c131y\/mfsocket-a-chinese-surveillance-tool-58e8850c3de4\" target=\"_blank\">analyzed<\/a> in 2019.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Xiamen Meiya Pico reportedly has a 40% share of the digital forensics market in China, and <a rel=\"nofollow noopener\" href=\"http:\/\/ofac.treasury.gov\/recent-actions\/20211216\" target=\"_blank\">was sanctioned by the U.S. government in 2021<\/a> for its role in supplying its technology to the Chinese government.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The company did not respond to TechCrunch\u2019s request for comment.<\/p>\n<p class=\"wp-block-paragraph\">Balaam said that Massistant is only one of a large number of spyware or malware made by Chinese surveillance tech makers, in what she called \u201ca big ecosystem.\u201d The researcher said that the company tracks at least 15 different malware families in China.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2025\/07\/16\/chinese-authorities-are-using-a-new-tool-to-hack-seized-phones-and-extract-data\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages \u2014 including from chat apps such as Signal \u2014 images, location histories, audio recordings, contacts, and more. On Wednesday, mobile cybersecurity company Lookout published a new report \u2014 shared exclusively with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":181005,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-181004","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/181004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=181004"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/181004\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/181005"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=181004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=181004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=181004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}