BREAKINGON

New Malware Exposed: How Chinese Authorities Access Your Data

7/16/2025
A new report reveals that Chinese authorities are using a malware called Massistant to extract sensitive data from seized phones. This poses significant risks for travelers and residents alike.
New Malware Exposed: How Chinese Authorities Access Your Data
Discover how Chinese authorities utilize the Massistant malware to access private data from phones, raising concerns for travelers and residents in China.

Chinese Authorities Employ New Malware for Data Extraction from Seized Phones

Recent findings by security researchers reveal that Chinese authorities are utilizing a sophisticated new type of malware to extract sensitive data from seized mobile phones. This malware enables the retrieval of a variety of personal information, including text messages from popular chat applications like Signal, images, location histories, audio recordings, and contact details.

Massistant: The New Forensic Tool

On Wednesday, Lookout, a mobile cybersecurity company, released an exclusive report detailing this hacking tool known as Massistant. Developed by the Chinese tech giant Xiamen Meiya Pico, Massistant is designed as Android software for the forensic extraction of data from mobile devices. For authorities to utilize this tool effectively, they must have physical access to the targeted devices.

While Lookout has not definitively identified which specific Chinese police agencies are employing Massistant, it is believed to be in widespread use. This raises significant concerns for both Chinese citizens and international travelers who may find themselves at risk of having their devices compromised. Kristina Balaam, a researcher at Lookout, emphasized the urgency of this issue: "It’s a big concern. I think anybody who’s traveling in the region needs to be aware that the device they bring into the country could very well be confiscated and anything that’s on it could be collected,” she stated in an interview with TechCrunch.

Evidence of Malware’s Presence

Balaam's research indicated that numerous posts on local Chinese forums have emerged, where users express concerns about discovering the malware on their devices after encounters with law enforcement. "It seems to be pretty broadly used," Balaam noted, reflecting on the widespread nature of the tool based on discussions within these forums.

Massistant requires installation on an unlocked device and operates alongside a hardware tower that connects to a desktop computer. According to information and illustrations from Xiamen Meiya Pico's website, the malware may also have an iOS version, although Lookout has not been able to analyze any Apple-compatible version.

Legal Framework and Usage

Chinese authorities do not need advanced techniques to deploy Massistant. In fact, users often willingly hand over their devices during interactions with law enforcement, as highlighted by Balaam. This ease of access is facilitated by a legal framework that allows state security police to search phones and computers without a warrant or active criminal investigation since 2024. Balaam explained, "If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it." This legal backing removes the need for exploiting software vulnerabilities, commonly referred to as zero-days.

Identifying and Deleting Massistant

Fortunately for users, Massistant leaves traces of its installation on compromised devices, enabling potential identification and removal of the malware. Users may find the hacking tool listed as an app or use advanced tools like the Android Debug Bridge (ADB) to connect and manage their devices. However, it is crucial to note that by the time Massistant is detected, the damage may already be done, as authorities would have accessed sensitive personal data.

The Broader Surveillance Landscape

According to Lookout, Massistant is the successor to an earlier mobile forensic tool, MSSocket, also developed by Xiamen Meiya Pico and analyzed by security researchers in 2019. Xiamen Meiya Pico holds a significant 40% share of the digital forensics market in China and was sanctioned by the U.S. government in 2021 for its involvement in providing technology to the Chinese government.

Balaam further pointed out that Massistant is just one of many spyware and malware tools developed by Chinese surveillance technology manufacturers, referring to it as part of "a big ecosystem" of digital threats. Lookout is actively monitoring at least 15 different malware families operating within China, underscoring the ongoing challenge posed by these surveillance technologies.

Breakingon.com is an independent news platform that delivers the latest news, trends, and analyses quickly and objectively. We gather and present the most important developments from around the world and local sources with accuracy and reliability. Our goal is to provide our readers with factual, unbiased, and comprehensive news content, making information easily accessible. Stay informed with us!
© Copyright 2025 BreakingOn. All rights reserved.