china hack


San Francisco | July 16, 2025


Chinese authorities are reportedly using a new surveillance tool called Massistant to extract sensitive data from confiscated Android phones, raising alarms among cybersecurity experts and travelers alike.

Core Facts:

  • Developer Identified: U.S. cybersecurity firm Lookout says the malware was developed by Chinese tech company Xiamen Meiya Pico, a major supplier of forensic tools to law enforcement in China.
  • How It Works: Massistant requires physical access and an unlocked phone to function, working with a desktop-connected hardware tower to extract data.
  • Data Collected: The tool can pull text messages (including from encrypted apps like Signal), photos, audio recordings, call logs, contacts, and location history.
  • Widespread Use Suspected: Forum posts in China suggest the malware is commonly installed during police interactions, particularly at checkpoints.
  • No iOS Version Found Yet: While Lookout did not detect an iPhone version, promotional images on Meiya Pico’s website show iPhones connected to its forensic hardware.
  • Legal Environment: Since 2024, Chinese police can search phones and computers without a warrant or investigation. Travelers may be compelled to unlock devices at borders.
  • Forensic Trace: The malware leaves traces behind, meaning users can sometimes detect and remove it—though by then, data has already been exfiltrated.
  • Background: Massistant is seen as the successor to MSSocket, another forensic tool previously analyzed. Meiya Pico holds a 40% share of China’s digital forensics market and was sanctioned by the U.S. in 2021.
  • Ongoing Concern: Lookout tracks over 15 surveillance malware families linked to Chinese firms, calling it part of a “large ecosystem” of domestic spyware.

Context
The revelation underscores growing concerns about data privacy and surveillance in China, particularly for journalists, activists, and foreign travelers carrying personal devices.

Leave a Reply

Your email address will not be published. Required fields are marked *