Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data

Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data

Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated mobile forensics application called Massistant, deployed by Chinese law enforcement to extract comprehensive data from confiscated mobile devices.

The tool represents a significant evolution from its predecessor MFSocket, incorporating advanced capabilities to bypass device security measures and collect sensitive information including SMS messages, images, audio files, GPS location data, contacts, and messaging app content.

The discovery raises critical security concerns for international business travelers and enterprise organizations, particularly as Chinese authorities have expanded their digital surveillance capabilities under new legislation introduced by the Ministry of State Security in 2024, which permits device collection and analysis without warrants.

Anecdotal reports suggest Chinese law enforcement has been systematically collecting and analyzing devices belonging to business travelers, with some cases revealing persistent surveillance modules that continue monitoring activity even after devices are returned to their owners.

Baidu Zhidao question/answer forums 

Technical Architecture

Massistant operates as a client-side component within Meiya Pico’s broader Mobile Master forensics ecosystem, establishing communication with desktop forensics software through localhost port 10102, identical to its predecessor MFSocket.

The application requires physical device access for installation and was never distributed through official channels like Google Play Store, indicating its exclusive use by authorized law enforcement personnel.

The tool’s technical sophistication extends beyond simple data extraction. Upon installation, Massistant requests extensive permissions for accessing device GPS location data, SMS messages, images, audio files, contacts, and phone services.

The application includes multilingual support limited to Simplified Chinese and US English, suggesting its primary deployment targets both domestic Chinese users and international visitors.

When users attempt to exit the application, they receive notifications indicating the tool is in “get data” mode, effectively preventing termination during active forensics operations.

A critical advancement in Massistant involves the implementation of Accessibility Services through developer-designated “AutoClick” classes, designed to automatically bypass security prompts from device protection applications.

This capability allows the tool to circumvent security measures in applications like Miui Security Center, automatically granting necessary permissions without user intervention.

The latest version 8.5.7 introduces wireless connectivity through Android Debug Bridge over WiFi and the ability to download additional files to compromised devices via the native library libNativeUtil.so.

Corporate Background

Massistant’s development traces back to Xiamen Meiya Pico Information Co., Ltd., a publicly traded Chinese technology company controlling approximately 40% of mainland China’s digital forensics market share.

The company underwent a corporate restructuring in December 2023, changing its name to SDIC Intelligence Xiamen Information Co., Ltd., though signing certificates for both MFSocket and Massistant continue referencing the original Meiya Pico designation.

Chinese Mobile
Public documents announcing the name change from Meiya Pico to SDIC Intelligence

The forensics tool first emerged following reports by Chinese journalist Muyi Xiao in June 2019, who documented Chinese netizens discovering MFSocket installations on their devices after police encounters.

Cybersecurity researcher Baptiste Robert subsequently confirmed Meiya Pico’s involvement through analysis of signing certificates.

Chinese question-and-answer forums dating to mid-2020 contain user reports of Massistant installations, suggesting the tool’s deployment as MFSocket’s replacement coincided with Meiya Pico’s product line upgrades from V2 to V3 versions of their DC-4501, DC-4700, and FL-900 forensics systems.

Meiya Pico’s international reach extends beyond Chinese borders, with documented partnerships including Russian military contracts for forensics equipment and training programs for Belt & Road Initiative countries.

However, the company faced sanctions from the US Office of Foreign Assets Control in 2021 under the Chinese Military Companies Sanctions program, reflecting growing international concern over its surveillance capabilities.

The tool’s sophisticated self-destruction mechanism utilizing USBBroadcastReceiver attempts automatic uninstallation when devices disconnect from USB, though forum reports indicate occasional failures result in users discovering the application’s presence.

For enterprise security teams, Massistant’s existence on returned devices serves as a clear indicator of forensics compromise, even when the tool successfully removes itself.

Indicators of Compromise

SHA1 Hash
895ad87f382de53f7323117b47150eaf0550cbf4
7a6d81b19425d985270121c46368c9ac12ed1b26
14c29a0e44076c88b177193650a9d4567291d0ea
256c357f884f33c032d2352ee6ff73fe94da83a8
91a6e8769be93f625f239f9c8bad82545c936f20
ceb3b0c6dc703c76d274f4862d98b4f054536518
66ef2c18178d8988a210d09b17f3b23394306b40
4cc68d1538c372a31d2989e04f1c0726a66ebb7a
e5d4685ceedc44184ae0d249269a94018c88a4ff
0275f283ce280f717a2674d82aaf1cb562c3b90c
215bd2972c5598787addad911915b9a04932d68d
990004827ec2b08b52afd0df5750cfed502dbc1c
df4c8bccadf71d5c29a7a92d40fee4629fe7a384
93c5cd3a0bb04012927ccd29e505772492fcfbee
8659920f99a96c294c9857a761ce0729f3a8f2f7
71fc752af7d108b7aede7d17ec7dae3a9cbb3470
4b30d1d9d4a1e4571d4cd7aaeb91aee192a7a512
1c6e67c6f1c9b6a332d844b772af3ef9e5e8d8dd
f22eea7248d023f74f631a8812115bf4981df2e7
2458fa6f7b0faf662a940ab92a1f144b2c384ce4
f514f711b4b83d3cf2a4b4c602483a120b448f63
7ec4f46df0bb9fca801719b7f67f642bdd0a9e97
c17e9325a6932ff8b725b18e4ddcb6dadab99457

Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now


Source link