Security researchers say that Chinese officials are using a new type of malware to extract data from the seized phones, allowing them to receive text messages – including chat apps such as signal – images, location history, audio recording, contact, and more.
On Wednesday, the mobile cyber security company Lukout published a new report – especially shared with Techcrunch – the details of the hacking tool called Masistant, which the company said that the Chinese tech veteran was developed by Ziamen Meya Pico.
According to the lookout, Masistant, Android software is used for forensic extraction of data from mobile phones, which means that the authorities using it require physical access to devices. While the lookout does not ensure which Chinese police agencies are using the equipment, it is widely considered, meaning that both Chinese inhabitants, as well as Chinese passengers, should be aware of the existence and risks of the equipment.
This is a big concern. I think anyone traveling in this field should know that the tool they bring in the country can be confiscated very well and whatever can be collected on it, “A researcher of the lookout, who analyzed the malware, told Tekkachchan from the release of the report.” I think it’s something that they are traveling in this field that they are traveling in this field.
Balam found several posts at local Chinese forums, where people complained to finding the malware installed on their equipment after talks with the police.
Balam said, “It is being used very widely, especially what I have seen in Rumble on these Chinese forums, especially.”
Malware, which should be applied on an unlock device, and according to the system details and pictures works closely with a hardware tower connected to the desktop computer. Ziamen Meya on Pico’s website,
Balam said that the lookout cannot analyze the desktop component, nor could the researchers find a version of the compatible malware with apple devices. In a illustration on its website, Ziamen Meya Pico shows the iPhone associated with its forensic hardware device, suggests that the company may have an iOS version of the Masstant designed to extract data from Apple devices.
The police do not require sophisticated techniques to use a masistant, such as using zero-day-software or flaws in hardware that have not yet been told to the seller-“people just hand over their phones,” Balam said, on the basis of reading on those Chinese forums.
Since at least 2024, Chinese State Security Police There are legal powers to search through phone and computer without the need for warrant or active criminal investigation.
“If a border is moving through the checkpoint and their device has been confiscated, they will have to reach it.” “I don’t think we look at any real act from the legally intercept tooling space, because they do not need it.”

Good news, per Balam, is that the menstant leaves the evidence of its agreement on the seized device, which means that users can potentially identify and remove malware, either because the hacking tool appears as an app, or can be found using more sophisticated devices such Android Dibg BridgeA command line tool that allows the user to connect to the device through their computer.
The bad news is that at the time of installing the Masstant, the damage is done, and the authorities already have a person’s data.
According to the lookout, Masistant is the successor of a similar mobile forensic tool, also made by Ziamen Meya Pico, which is called called. MssocketWhich security researcher Analysis In 2019.
Ziamen Meya Pico allegedly accounts for 40% of the digital forensic market in China, and Approval was given by US government in 2021 For its role in the supply of its technology to the Chinese government.
The company did not respond to Techcrunch’s request for comments.
Balam said that Masistant is only one of a large number of spyware or malware made by Chinese monitoring technical manufacturers, called “a large ecosystem”. The researcher said that the company tracks at least 15 separate malware families in China.