- Chinese law enforcement uses a forensics tool called Massistant to extract data from seized mobile devices.
- The tool can access GPS data, messages, images, contacts, audio, and third-party apps like Signal and Letstalk.
- Massistant is developed by SDIC Intelligence Xiamen Information Co., Ltd. (formerly Meiya Pico) and requires physical device access.
- Evidence suggests there are versions for both Android and iOS, and the company works with domestic and international law enforcement.
- U.S. officials have sanctioned Meiya Pico for its role in surveillance, especially regarding minority groups in China.
Chinese Cybersecurity researchers have revealed that law enforcement in China is utilizing a digital forensics tool named Massistant to collect information from confiscated mobile phones. The tool, active since at least 2019, is developed by SDIC Intelligence Xiamen Information Co., Ltd., previously known as Meiya Pico, a company focused on digital forensics and network security products.
Massistant works with a desktop application to gain access to location data, SMS messages, images, audio recordings, contacts, and phone activity on mobile devices. According to a report by Lookout, the tool needs physical access to be installed, most likely on devices collected at border checkpoints or during police stops.
Security researcher Kristina Balaam noted, “Meiya Pico maintains partnerships with domestic and international law enforcement partners, both as a surveillance hardware and software provider, as well as through training programs for law enforcement personnel.” Lookout stated that both Massistant and its predecessor, MFSocket, function only when the phone is connected to a desktop running forensic software and the user grants data access permissions.
The application is designed to uninstall itself once the phone is unplugged from USB. Newer capabilities allow Massistant to connect via Wi-Fi and target messaging apps beyond Telegram, such as Signal and Letstalk, according to Lookout’s findings. While Lookout’s analysis focused on Android, screenshots from company websites suggest an iOS version exists.
Meiya Pico is reported to have prior involvement in mobile surveillance efforts in China, including collaborations with Xinjiang police authorities to scan smartphones for prohibited content. In 2021, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Meiya Pico for supporting biometric tracking, especially against ethnic minorities.
Travelers to China, according to Lookout, face the possibility of their phone data being acquired by state police using such digital forensics tools. The disclosure follows recent reports of another spyware, EagleMsgSpy, being used by Chinese authorities for similar surveillance operations.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- India Rejects BRICS De-Dollarization, Supports US Dollar in Trade
- GMU SECSAT Lab Selects Theta EdgeCloud Hybrid for AI Research
- Bitcoin Core Patch Ends Five-Year Disk Fill Attack Bug on Nodes
- Charles Schwab Explores Launching Stablecoin, Eyes Crypto ETFs
- Critical NVIDIA Container Toolkit Flaw Threatens AI Cloud Security