HomeCyber SecurityChina's Massistant Software Secretly Extracts SMS, GPS Information, and Photographs From Confiscated...

China’s Massistant Software Secretly Extracts SMS, GPS Information, and Photographs From Confiscated Telephones


Jul 18, 2025Ravie LakshmananSurveillance / Cell Safety

China’s Massistant Software Secretly Extracts SMS, GPS Information, and Photographs From Confiscated Telephones

Cybersecurity researchers have make clear a cellular forensics device known as Massistant that is utilized by legislation enforcement authorities in China to collect info from seized cellular gadgets.

The hacking device, believed to be a successor of MFSocket, is developed by a Chinese language firm named SDIC Intelligence Xiamen Info Co., Ltd., which was previously often known as Meiya Pico. It specializes within the analysis, improvement, and sale of digital knowledge forensics and community info safety know-how merchandise.

In keeping with a report revealed by Lookout, Massistant works together with a corresponding desktop software program, permitting for entry to the machine’s GPS location knowledge, SMS messages, pictures, audio, contacts, and telephone companies.

Cybersecurity

“Meiya Pico maintains partnerships with home and worldwide legislation enforcement companions, each as a surveillance {hardware} and software program supplier, in addition to via coaching packages for legislation enforcement personnel,” safety researcher Kristina Balaam mentioned.

Massistant requires bodily entry to the machine with the intention to set up the applying, that means it may be used to gather knowledge from confiscated gadgets from people when stopped at border checkpoints.

Lookout mentioned it obtained Massistant samples between mid-2019 and early 2023 and that they had been signed with an Android signing certificates referencing Meiya Pico.

Each Massistant and its predecessor, MFSocket, work equally in that they must be related to a desktop pc operating forensics software program to extract the information from the machine. As soon as launched on the telephone, the device prompts the customers to grant it permissions to entry delicate knowledge, after which no additional interplay is required.

“If the person makes an attempt to exit the applying they obtain a discover that the applying is in ‘get knowledge’ mode and exiting would end in some error,” Balaam defined. “This message is translated to solely two languages: Chinese language (Simplified characters) and ‘US’ English.”

The appliance is designed such that it is routinely uninstalled from the machine when it’s disconnected from a USB. Massistant additionally expands on MFSocket’s options by together with the flexibility to connect with a telephone utilizing the Android Debug Bridge (ADB) over Wi-Fi and to obtain extra information to the machine.

One other new performance included into Massistant is to gather knowledge from third-party messaging apps past Telegram to incorporate Sign and Letstalk, a Taiwanese chat utility with greater than 100,000 downloads on Android.

Whereas Lookout’s evaluation focuses primarily on the Android model of Massistant, pictures shared on its web site present iPhones related to its forensic {hardware} machine, suggesting that there’s an iOS equal to tug knowledge from Apple gadgets.

The truth that Meiya Pico can also be targeted on iOS gadgets stems from the numerous patents filed by the corporate associated to gathering proof from Android and iOS gadgets, together with voiceprints for internet-related circumstances.

“Voiceprint options are one of many vital organic options of the human physique, and might uniquely decide the identification of a person,” in accordance to at least one patent. “After the voiceprint library is constructed, a plurality of police seeds may be straight served, and the effectivity and the potential of detecting and fixing a case of a associated group may be successfully improved.”

Cybersecurity

The digital forensics agency’s involvement within the surveillance house shouldn’t be new. In December 2017, The Wall Avenue Journal reported that the corporate labored with police officers in Ürümqi, the capital of Xinjiang Uyghur Autonomous Area in Northwestern China, to scan smartphones for terrorism-related content material by plugging them right into a handheld machine.

4 years later, the U.S. Division of the Treasury’s Workplace of Overseas Property Management (OFAC) sanctioned Meiya Pico for enabling the “biometric surveillance and monitoring of ethnic and non secular minorities in China, significantly the predominantly Muslim Uyghur minority in Xinjiang.”

“Journey to and inside mainland China carries with it the potential for vacationers, enterprise vacationers, and individuals of curiosity to have their confidential cellular knowledge acquired as a part of lawful intercept initiatives by state police,” Lookout mentioned.

The disclosure comes a few months after Lookout unearthed one other spy ware known as EagleMsgSpy that is suspected for use by Chinese language police departments as a lawful intercept device to collect a variety of knowledge from cellular gadgets.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments