Discussion posts on local Chinese forums have revealed a new forensics tool utilized by Chinese border officials. Although detection and removal is easy, it is almost impossible to avoid as all travelers must grant access to their phones even without a search warrant. The damage is often done upon seizure.
I’m curious to see whether there is any defense against these attacks (besides bringing a burner phone).
Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more.
On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.
Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn’t know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means both Chinese residents, as well as travelers to China, should be aware of the tool’s existence and the risks it poses.