Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.
Identity

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

userBy userJuly 18, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 18, 2025Ravi LakshmananMonitoring/Mobile Security

Cybersecurity researchers shed light on a mobile forensic tool used by Chinese law enforcement, called Massistant, and collect information from seized mobile devices.

The hacking tool considered to be the successor to MFSocket is SDIC Intelligence Xiamen Information Co., Ltd, formerly known as Meiya Pico. It was developed by a Chinese company named. Specializes in the research, development and sales of electronic data forensics and network information security technology products.

According to a report published by Lookout, Massistant works in conjunction with corresponding desktop software, allowing you to access your device’s GPS location data, SMS messages, images, audio, contacts and phone services.

Cybersecurity

“Meiya Pico maintains partnerships with national and international law enforcement partners as a surveillance hardware and software provider and through our law enforcement training program,” said security researcher Kristina Balaam.

Massistant requires physical access to the device to install applications. This means that it can be used to collect data from devices confiscated from individuals when stopped at border checkpoints.

Lookout said that between mid-2019 and early 2023, they had taken a huge sample and signed an Android Signing Certificate referencing Meiya Pico.

Both obesity and its predecessor, MFSocket works in the same way in that it requires you to connect to a desktop computer running forensic software to extract data from the device. When launched on a phone, the tool will prompt the user to grant IT permissions to access sensitive data, and then no further interaction is required.

“When a user tries to quit an application, they receive a notification that the application is in ‘Get Data’ mode and when they exit, an error occurs,” explained Balaam. “This message is translated only into two languages: Chinese (simplified characters) and English: “We.” ”

The application is designed to be automatically uninstalled from the device when it is disconnected from USB. Massistant extends the capabilities of MFSocket by including the ability to connect to your phone using Android Debug Bridge (ADB) over Wi-Fi and download additional files to your device.

Another new feature built into large scale is to collect data from third-party messaging apps beyond Telegram to include Signal and Letstalk, a Taiwanese chat application with over 100,000 downloads on Android.

While Lookout’s analysis focuses primarily on the Android version of Massistant, images shared on the website suggest that there is an iOS equivalent to displaying an iPhone connected to a Forensic Hardware device and pulling data from an Apple device.

The fact that Meiya Pico may also be focused on iOS devices comes from various patents filed by companies related to collecting evidence from Android and iOS devices, including VoicePrint in Internet-related cases.

“The VoicePrint function is one of the important biological features of the human body, allowing you to independently determine your user identity,” according to one patent. “After the VoicePrint library is built, multiple police species can be directly provided, effectively improving the efficiency and ability to detect and resolve cases in related organizations.”

Cybersecurity

The involvement of digital forensic companies in the surveillance space is nothing new. In December 2017, the Wall Street Journal reported that the company had partnered with police officers from Yurmki, the capital of the New Jiang Uyghur Autonomous Region in northwestern China, to scan its smartphones by plugging in terrorist content into handald devices.

Four years later, the US Treasury Department’s Office of Foreign Assets Management (OFAC) approved Meija Pico to enable “biometric surveillance and tracking of Chinese ethnic and religious minorities, particularly the Muslim Uyghur minority in New Jiang.”

“Traveling to mainland China has the potential for tourists, business travelers and interested parties to obtain confidential mobile data as part of a legal interception initiative by the state police,” Lookout said.

This disclosure comes months after Lookout unearthed another spyware called Eaglemsgspy, which is suspected to be used as a legal intercept tool to gather a wide range of information from mobile devices.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign
Next Article Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025

Ivanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

Ivanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.