Exposed: Chinese Officials Deploy Malware to Hack Smartphones—Personal Data Raided
Your phone isn’t safe—especially if you’re on Beijing’s radar. New revelations confirm Chinese officials are using state-backed malware to infiltrate smartphones, extracting everything from contacts to location history.
How it works: The malware bypasses standard encryption, operates undetected, and transmits data directly to servers controlled by authorities. No warrants, no warnings—just silent extraction.
Why it matters: While Western regulators fuss over cookie policies, China’s playing a different game. (Bonus jab: At least their surveillance tech doesn’t crash like their real estate market.)
The bottom line: Digital privacy just got another nail in its coffin—hammered in by the world’s most ambitious surveillance state.
Massistant is broadly used by the Chinese police
Chinese citizens have reported multiple times on local forums about finding malware on their phones after interacting with the police. One of the posts dates back to 2020, indicating that the malware has been widely used by the Chinese police in the past five years.
In the post, the user asked if the police had installed malware in his phone. Another user named topsky replied and said, “It is likely that your information was collected when you were given an administrative penalty for illegal behavior, including your mobile phone.”
The malware poses a major threat to travelers to and within mainland China. Tourists, businessmen, and employees from multinational companies could face an order to hand in their smartphones to the Chinese authorities. Sensitive data could leak easily since the police need no warrant to seize these devices.
Lookout stated that the malware works only on unlocked devices. The security firm shared a photo showing multiple smartphones connected to a hardware tower. The hardware is then connected to an external laptop or computer.
The security firm stated that Massistant is an Android application; however, the firm could not find an equivalent version for iOS users. The illustrations obtained from Xiamen Meiya Pico show multiple iPhones connected to the hardware tower, suggesting the existence of an iOS version.
Massistant leaves a footprint on any phone or device, making it easy to delete permanently. However, once the malware is installed, it steals data, making the damage irreversible.
Lookout stated that Massistant is the successor to another tool named MSSocket, which was created by Xiamen Meiya Pico. Security researchers analyzed and exposed the threats of MSSocket in 2019.
In 2021, Xiamen Meiya Pico was sanctioned by the Office of Foreign Assets Control (OFAC). According to the designation, the Chinese company poses a significant threat to U.S. national security due to its role in developing and distributing surveillance technologies. OFAC alleges that Xiamen Meiya Pico facilitates human rights abuses and supports authoritarian surveillance efforts.
Cryptopolitan Academy: Coming Soon - A New Way to Earn Passive Income with DeFi in 2025. Learn More