Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Privacy Security Cellphones

Chinese Authorities Are Using a New Tool To Hack Seized Phones and Extract Data (techcrunch.com) 28

An anonymous reader quotes a report from TechCrunch: Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages -- including from chat apps such as Signal -- images, location histories, audio recordings, contacts, and more. In a report shared exclusively with TechCrunch, mobile cybersecurity company Lookout detailed the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.

Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn't know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means Chinese residents, as well as travelers to China, should be aware of the tool's existence and the risks it poses. [...]

The good news ... is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer. The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person's data.
"It's a big concern. I think anybody who's traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that's on it could be collected," said Kristina Balaam, a researcher at Lookout who analyzed the malware. "I think it's something everybody should be aware of if they're traveling in the region."

Chinese Authorities Are Using a New Tool To Hack Seized Phones and Extract Data

Comments Filter:
  • by Kernel Kurtz ( 182424 ) on Wednesday July 16, 2025 @06:37PM (#65525666)
    The state of the world is such nowadays that you should not take your regular electronic devices across borders. Any borders.
    • by piojo ( 995934 )

      The state of the world is such nowadays that you should not take your regular electronic devices across borders. Any borders.

      My time and convenience is worth more than the infinitesimal risk of being harassed/detained/killed by the border control agents. If you are an activist, bring burner devices. Otherwise, bring a burner if you find it titillating to use a burner during your trip.

    • by mjwx ( 966435 )

      The state of the world is such nowadays that you should not take your regular electronic devices across borders. Any borders.

      The only borders I'd be concerned about taking a sensitive phone across are those around despotic regimes like North Korea, China, Iran, Saudi Arabia and the United States. I'd take my phone over most western, Asian or South American borders without a second thought because Thailand/Germany/Australia/Canada/Dominican Republic/et al. couldn't care less about inspecting my phone unless I've become a suspect in a crime... which has never happened to anyone I know.

      The US CBP has always had a hard on against

  • I originally read the headline as "....hack seized photos...."

    Thought a minute. Re-read it.

    "Phones" does make more sense here than "photos".

  • This is why any applet keeping a log of personal contacts, is bad.

    If one is crossing a border, any applet with a built-in communication history should be uninstalled: Remove the history, remove the address book, remove the identity. Government agents have been spying on phones for 15 years. Why are people still getting caught? They're thinking it "won't happen to me". They don't want to put the time in, deleting their history and then act surprised when their history is stolen.

    • by PPH ( 736903 )

      If one is crossing a border, any applet with a built-in communication history should be uninstalled

      All they need is your phone number, user name, IMEI and they'll just fetch all that stuff from your cloud backup or telecom logs. If one is crossing a border, leave your phone at home.

  • I'd have thought the proverbial "$5 wrench" would be adequate in China to get a cell phone unlocked.
    • "The malware must be planted on an unlocked device"

      So, is some special malware needed when the police get an unlocked phone? Isn't the problem simply that the police have an unlocked phone?

    • by PPH ( 736903 )

      Well, they need a new one because the old wrench finally wore out (made of Chinesium, not that good stuff SnapOn uses).

  • So, they supposedly have a tool.

    Big f'ing deal. Even if true, no way they are anywhere close to the USA level of intrusiveness or enforcement. The USA is terrible...to the point where this tool is almost a joke, it seems.

    Actually, the way it is described is so pathetic that it makes me wonder if the report is real.

  • Buy an iPhone.:-)

  • Press Release: el Bunko, Grifter-in-Chief, has just announced a Deal to acquire Chinese Snoop Technology (with AI) that will make America Stronger!!!

    "People have been saying I am the Greatest Dealmaker Ever in the History of World. No one has ever seen anything like it!!"

Quantity is no substitute for quality, but its the only one we've got.

Working...