Chinese Authorities Using New Malware to Extract Data from Phones
Security researchers have discovered that Chinese authorities are utilizing a new type of malware to extract data from seized phones. This malware, known as Massistant, allows them to access text messages, images, location histories, audio recordings, contacts, and more, including data from chat apps such as Signal.
Awareness of Risks for Chinese Residents and Travelers
With the widespread assumption of the use of Massistant by Chinese police agencies, it is essential for Chinese residents and travelers to be aware of the tool’s existence and the potential risks it poses. Physical access to the devices is required for the authorities to utilize Massistant, putting personal data at risk of extraction.
Potential for Detection and Removal of Malware
Despite the invasive nature of Massistant, there is some hope for users to potentially identify and delete the malware from their seized devices. The hacking tool leaves evidence of compromise, which can be detected using tools like the Android Debug Bridge. However, once the malware is installed, the damage is already done, and authorities have access to the individual’s data.
