Chinese Mobile Forensic Tool Accesses SMS, Images, Audio, and GPS Data
Cybersecurity researchers at Lookout Threat Lab have uncovered a sophisticated mobile forensics application called Massistant, deployed by Chinese law enforcement to extract comprehensive data from confiscated mobile devices.
The tool represents a significant evolution from its predecessor MFSocket, incorporating advanced capabilities to bypass device security measures and collect sensitive information including SMS messages, images, audio files, GPS location data, contacts, and messaging app content.
The discovery raises critical security concerns for international business travelers and enterprise organizations, particularly as Chinese authorities have expanded their digital surveillance capabilities under new legislation introduced by the Ministry of State Security in 2024, which permits device collection and analysis without warrants.
Anecdotal reports suggest Chinese law enforcement has been systematically collecting and analyzing devices belonging to business travelers, with some cases revealing persistent surveillance modules that continue monitoring activity even after devices are returned to their owners.
Technical Architecture
Massistant operates as a client-side component within Meiya Pico’s broader Mobile Master forensics ecosystem, establishing communication with desktop forensics software through localhost port 10102, identical to its predecessor MFSocket.
The application requires physical device access for installation and was never distributed through official channels like Google Play Store, indicating its exclusive use by authorized law enforcement personnel.
The tool’s technical sophistication extends beyond simple data extraction. Upon installation, Massistant requests extensive permissions for accessing device GPS location data, SMS messages, images, audio files, contacts, and phone services.
The application includes multilingual support limited to Simplified Chinese and US English, suggesting its primary deployment targets both domestic Chinese users and international visitors.
When users attempt to exit the application, they receive notifications indicating the tool is in “get data” mode, effectively preventing termination during active forensics operations.
A critical advancement in Massistant involves the implementation of Accessibility Services through developer-designated “AutoClick” classes, designed to automatically bypass security prompts from device protection applications.
This capability allows the tool to circumvent security measures in applications like Miui Security Center, automatically granting necessary permissions without user intervention.
The latest version 8.5.7 introduces wireless connectivity through Android Debug Bridge over WiFi and the ability to download additional files to compromised devices via the native library libNativeUtil.so.
Corporate Background
Massistant’s development traces back to Xiamen Meiya Pico Information Co., Ltd., a publicly traded Chinese technology company controlling approximately 40% of mainland China’s digital forensics market share.
The company underwent a corporate restructuring in December 2023, changing its name to SDIC Intelligence Xiamen Information Co., Ltd., though signing certificates for both MFSocket and Massistant continue referencing the original Meiya Pico designation.

The forensics tool first emerged following reports by Chinese journalist Muyi Xiao in June 2019, who documented Chinese netizens discovering MFSocket installations on their devices after police encounters.
Cybersecurity researcher Baptiste Robert subsequently confirmed Meiya Pico’s involvement through analysis of signing certificates.
Chinese question-and-answer forums dating to mid-2020 contain user reports of Massistant installations, suggesting the tool’s deployment as MFSocket’s replacement coincided with Meiya Pico’s product line upgrades from V2 to V3 versions of their DC-4501, DC-4700, and FL-900 forensics systems.
Meiya Pico’s international reach extends beyond Chinese borders, with documented partnerships including Russian military contracts for forensics equipment and training programs for Belt & Road Initiative countries.
However, the company faced sanctions from the US Office of Foreign Assets Control in 2021 under the Chinese Military Companies Sanctions program, reflecting growing international concern over its surveillance capabilities.
The tool’s sophisticated self-destruction mechanism utilizing USBBroadcastReceiver attempts automatic uninstallation when devices disconnect from USB, though forum reports indicate occasional failures result in users discovering the application’s presence.
For enterprise security teams, Massistant’s existence on returned devices serves as a clear indicator of forensics compromise, even when the tool successfully removes itself.
Indicators of Compromise
SHA1 Hash |
---|
895ad87f382de53f7323117b47150eaf0550cbf4 |
7a6d81b19425d985270121c46368c9ac12ed1b26 |
14c29a0e44076c88b177193650a9d4567291d0ea |
256c357f884f33c032d2352ee6ff73fe94da83a8 |
91a6e8769be93f625f239f9c8bad82545c936f20 |
ceb3b0c6dc703c76d274f4862d98b4f054536518 |
66ef2c18178d8988a210d09b17f3b23394306b40 |
4cc68d1538c372a31d2989e04f1c0726a66ebb7a |
e5d4685ceedc44184ae0d249269a94018c88a4ff |
0275f283ce280f717a2674d82aaf1cb562c3b90c |
215bd2972c5598787addad911915b9a04932d68d |
990004827ec2b08b52afd0df5750cfed502dbc1c |
df4c8bccadf71d5c29a7a92d40fee4629fe7a384 |
93c5cd3a0bb04012927ccd29e505772492fcfbee |
8659920f99a96c294c9857a761ce0729f3a8f2f7 |
71fc752af7d108b7aede7d17ec7dae3a9cbb3470 |
4b30d1d9d4a1e4571d4cd7aaeb91aee192a7a512 |
1c6e67c6f1c9b6a332d844b772af3ef9e5e8d8dd |
f22eea7248d023f74f631a8812115bf4981df2e7 |
2458fa6f7b0faf662a940ab92a1f144b2c384ce4 |
f514f711b4b83d3cf2a4b4c602483a120b448f63 |
7ec4f46df0bb9fca801719b7f67f642bdd0a9e97 |
c17e9325a6932ff8b725b18e4ddcb6dadab99457 |
Get Free Ultimate SOC Requirements Checklist Before you build, buy, or switch your SOC for 2025 - Download Now
Source link