Close Menu
Mirror Brief

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Joseph Lee on the Sprawlng Portrait of Aquinnah Wampanoag Identity at the Center of His New Book, ‘Nothing More of This Land’

    July 19, 2025

    ‘Still not sure’: Shane Lowry casts doubt over two-shot penalty decision at Open | The Open

    July 19, 2025

    Astronomer investigating after Coldplay concert embrace caught on video

    July 19, 2025
    Facebook X (Twitter) Instagram
    Mirror BriefMirror Brief
    Trending
    • Joseph Lee on the Sprawlng Portrait of Aquinnah Wampanoag Identity at the Center of His New Book, ‘Nothing More of This Land’
    • ‘Still not sure’: Shane Lowry casts doubt over two-shot penalty decision at Open | The Open
    • Astronomer investigating after Coldplay concert embrace caught on video
    • Apple Sues the YouTuber Who Leaked iOS 26
    • Mutant seabirds, sewer secrets and a lick of art ice-cream: Folkestone Triennial review | Folkestone Triennial
    • Bears, Durham, Kent & Hants claim T20 quarter-final spots
    • Liberia: Hundreds rally in Monrovia to protest against Joseph Boakai’s government
    • Angela Rayner tells Labour to ‘step up’ and make case for being in power | Angela Rayner
    Saturday, July 19
    • Home
    • Business
    • Health
    • Lifestyle
    • Politics
    • Science
    • Sports
    • World
    • Travel
    • Technology
    • Entertainment
    Mirror Brief
    Home»Technology»Chinese authorities are using a new tool to hack seized phones and extract data
    Technology

    Chinese authorities are using a new tool to hack seized phones and extract data

    By Emma ReynoldsJuly 16, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A border police officer answers questions from inbound passengers at Chongqing Jiangbei International Airport in southwest China's Chongqing, July 8, 2025.
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more.

    On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.

    Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn’t know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means both Chinese residents, as well as travelers to China, should be aware of the tool’s existence and the risks it poses.

    “It’s a big concern. I think anybody who’s traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that’s on it could be collected,” Kristina Balaam, a researcher at Lookout who analyzed the malware, told TechCrunch ahead of the report’s release. “I think it’s something everybody should be aware of if they’re traveling in the region.”

    Balaam found several posts on local Chinese forums where people complained about finding the malware installed on their devices after interactions with the police. 

    “It seems to be pretty broadly used, especially from what I’ve seen in the rumblings on these Chinese forums,” said Balaam.

    The malware, which must be planted on an unlocked device, and works in tandem with a hardware tower connected to a desktop computer, according to a description and pictures of the system on Xiamen Meiya Pico’s website.

    Balaam said Lookout couldn’t analyze the desktop component, nor could the researchers find a version of the malware compatible with Apple devices. In an illustration on its website, Xiamen Meiya Pico shows iPhones connected to its forensic hardware device, suggesting the company may have an iOS version of Massistant designed to extract data from Apple devices.

    Police do not need sophisticated techniques to use Massistant, such as using zero-days — flaws in software or hardware that have not yet been disclosed to the vendor — as “people just hand over their phones,” said Balaam, based on what she’s read on those Chinese forums.

    Since at least 2024, China’s state security police have had legal powers to search through phones and computers without needing a warrant or the existence of an active criminal investigation. 

    “If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it,” said Balaam. “I don’t think we see any real exploits from lawful intercept tooling space just because they don’t need to.”

    A screenshot of the Massistant mobile forensic tool’s hardware, taken from Xiamen Meiya Pico’s official Chinese website.Image Credits:Xiamen Meiya Pico

    The good news, per Balaam, is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer. 

    The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person’s data. 

    According to Lookout, Massistant is the successor of a similar mobile forensic tool, also made by Xiamen Meiya Pico, called MSSocket, which security researchers analyzed in 2019. 

    Xiamen Meiya Pico reportedly has a 40% share of the digital forensics market in China, and was sanctioned by the U.S. government in 2021 for its role in supplying its technology to the Chinese government. 

    The company did not respond to TechCrunch’s request for comment.

    Balaam said that Massistant is only one of a large number of spyware or malware made by Chinese surveillance tech makers, in what she called “a big ecosystem.” The researcher said that the company tracks at least 15 different malware families in China.

    authorities Chinese Data extract hack phones seized Tool
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticlePrice Hikes, Ad Tier, Content Slate
    Next Article Southern Water issues hosepipe ban for 1m people in Hampshire and Isle of Wight | Drought
    Emma Reynolds
    • Website

    Emma Reynolds is a senior journalist at Mirror Brief, covering world affairs, politics, and cultural trends for over eight years. She is passionate about unbiased reporting and delivering in-depth stories that matter.

    Related Posts

    Technology

    Apple Sues the YouTuber Who Leaked iOS 26

    July 19, 2025
    Technology

    Microsoft stops relying on China engineers for Pentagon cloud support

    July 19, 2025
    Technology

    Donkey Kong Bananza review – delirious destruction derby takes hammer to platforming conventions | Games

    July 18, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Medium Rectangle Ad
    Top Posts

    Eric Trump opens door to political dynasty

    June 27, 20257 Views

    Anatomy of a Comedy Cliché

    July 1, 20253 Views

    SpaceX crane collapse in Texas being investigated by OSHA

    June 27, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Technology

    Meta Wins Blockbuster AI Copyright Case—but There’s a Catch

    Emma ReynoldsJune 25, 2025
    Business

    No phone signal on your train? There may be a fix

    Emma ReynoldsJune 25, 2025
    World

    US sanctions Mexican banks, alleging connections to cartel money laundering | Crime News

    Emma ReynoldsJune 25, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Medium Rectangle Ad
    Most Popular

    Eric Trump opens door to political dynasty

    June 27, 20257 Views

    Anatomy of a Comedy Cliché

    July 1, 20253 Views

    SpaceX crane collapse in Texas being investigated by OSHA

    June 27, 20252 Views
    Our Picks

    Joseph Lee on the Sprawlng Portrait of Aquinnah Wampanoag Identity at the Center of His New Book, ‘Nothing More of This Land’

    July 19, 2025

    ‘Still not sure’: Shane Lowry casts doubt over two-shot penalty decision at Open | The Open

    July 19, 2025

    Astronomer investigating after Coldplay concert embrace caught on video

    July 19, 2025
    Recent Posts
    • Joseph Lee on the Sprawlng Portrait of Aquinnah Wampanoag Identity at the Center of His New Book, ‘Nothing More of This Land’
    • ‘Still not sure’: Shane Lowry casts doubt over two-shot penalty decision at Open | The Open
    • Astronomer investigating after Coldplay concert embrace caught on video
    • Apple Sues the YouTuber Who Leaked iOS 26
    • Mutant seabirds, sewer secrets and a lick of art ice-cream: Folkestone Triennial review | Folkestone Triennial
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy Policy
    • Terms and Conditions
    © 2025 Mirror Brief. All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.