By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Computing

China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

News Room
Last updated: 2025/07/18 at 3:36 PM
News Room Published 18 July 2025
Share
SHARE

Jul 18, 2025Ravie LakshmananSurveillance / Mobile Security

Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s used by law enforcement authorities in China to gather information from seized mobile devices.

The hacking tool, believed to be a successor of MFSocket, is developed by a Chinese company named SDIC Intelligence Xiamen Information Co., Ltd., which was formerly known as Meiya Pico. It specializes in the research, development, and sale of electronic data forensics and network information security technology products.

According to a report published by Lookout, Massistant works in conjunction with a corresponding desktop software, allowing for access to the device’s GPS location data, SMS messages, images, audio, contacts, and phone services.

Cybersecurity

“Meiya Pico maintains partnerships with domestic and international law enforcement partners, both as a surveillance hardware and software provider, as well as through training programs for law enforcement personnel,” security researcher Kristina Balaam said.

Massistant requires physical access to the device in order to install the application, meaning it can be used to collect data from confiscated devices from individuals when stopped at border checkpoints.

Lookout said it obtained Massistant samples between mid-2019 and early 2023 and that they were signed with an Android signing certificate referencing Meiya Pico.

Both Massistant and its predecessor, MFSocket, work similarly in that they need to be connected to a desktop computer running forensics software to extract the data from the device. Once launched on the phone, the tool prompts the users to grant it permissions to access sensitive data, after which no further interaction is required.

“If the user attempts to exit the application they receive a notice that the application is in ‘get data’ mode and exiting would result in some error,” Balaam explained. “This message is translated to only two languages: Chinese (Simplified characters) and ‘US’ English.”

The application is designed such that it’s automatically uninstalled from the device when it is disconnected from a USB. Massistant also expands on MFSocket’s features by including the ability to connect to a phone using the Android Debug Bridge (ADB) over Wi-Fi and to download additional files to the device.

Another new functionality incorporated into Massistant is to collect data from third-party messaging apps beyond Telegram to include Signal and Letstalk, a Taiwanese chat application with more than 100,000 downloads on Android.

While Lookout’s analysis focuses mainly on the Android version of Massistant, images shared on its website show iPhones connected to its forensic hardware device, suggesting that there is an iOS equivalent to pull data from Apple devices.

The fact that Meiya Pico may also be focused on iOS devices stems from the various patents filed by the company related to gathering evidence from Android and iOS devices, including voiceprints for internet-related cases.

“Voiceprint features are one of the important biological features of the human body, and can uniquely determine the identity of a user,” according to one patent. “After the voiceprint library is built, a plurality of police seeds can be directly served, and the efficiency and the capability of detecting and solving a case of a related organization can be effectively improved.”

Cybersecurity

The digital forensics firm’s involvement in the surveillance space is not new. In December 2017, The Wall Street Journal reported that the company worked with police officials in Ürümqi, the capital of Xinjiang Uyghur Autonomous Region in Northwestern China, to scan smartphones for terrorism-related content by plugging them into a handheld device.

Four years later, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned Meiya Pico for enabling the “biometric surveillance and tracking of ethnic and religious minorities in China, particularly the predominantly Muslim Uyghur minority in Xinjiang.”

“Travel to and within mainland China carries with it the potential for tourists, business travelers, and persons of interest to have their confidential mobile data acquired as part of lawful intercept initiatives by state police,” Lookout said.

The disclosure comes a couple of months after Lookout unearthed another spyware called EagleMsgSpy that’s suspected to be used by Chinese police departments as a lawful intercept tool to gather a wide range of information from mobile devices.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Investment in specialized models of generative AI will reach 1,100 million in 2025
Next Article Bark Phone Pro (2025) Review: A Monitored Phone Teens Will Love
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

MacBook Air vs MacBook Pro: Which model makes the most sense to buy in 2025? – 9to5Mac
News
Trump Signs the GENIUS Act, Creating a Regulatory Framework for Stablecoins
News
Arch Linux AUR Packages For Firefox & Other Browsers Removed For Containing Malware
Computing
Hurry: The Apple Watch Series 10 is under $300 at Amazon right now
News

You Might also Like

Computing

Arch Linux AUR Packages For Firefox & Other Browsers Removed For Containing Malware

2 Min Read
Computing

The HackerNoon Newsletter: 12 Lessons from My Half-assed YouTube Channel (7/18/2025) | HackerNoon

2 Min Read
Computing

Outsmarting Akamai’s Bot Detection with JA3Proxy | HackerNoon

24 Min Read
Computing

How to Compress Images With SVD and TensorFlow Core APIs | HackerNoon

25 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?