Latest news with #Lookout

Miami Herald
16-07-2025
- Miami Herald
New software makes it easy for Chinese police to extract phone data
July 16 (UPI) -- Mobile security company Lookout has found a new system that police departments in China use to extract data from confiscated phones. The software is called Massistant, created by Chinese company Xiamen Meiya Pico, and it specializes in extracting different types of data, including private communications, multimedia files, geographical tracking records, voice recordings and contact databases. It can even extract messages on Signal. "It's a big concern," said Kristina Balaam, the researcher for Lookout who performed the malware analysis. "I think anybody who's traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that's on it could be collected." She found several posts on local Chinese forums in which people said they found the malware installed on their devices after interacting with the police. "It seems to be pretty broadly used, especially from what I've seen in the rumblings on these Chinese forums," Balaam said. The malware must get installed on an unlocked device and works with a hardware tower connected to a desktop computer, according to a description and pictures of the system on Xiamen Meiya Pico's website. Chinese law on cell phone confiscation has expanded. Since 2024, Chinese security staff can examine electronic devices without a warrant or active criminal case. This is especially the case with border crossings. "If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it," Balaam said. Massistant leaves traces of its installation on the seized devices, so users can potentially detect and remove it by finding it on their devices or using Android Debug Bridge to remove the software. But Balaam warned that by the time Massistant is installed, it's already too late and authorities have access to the user's data. She said that Massistant is just one of many spyware/malware created by Chinese surveillance tech companies, something she called "a big ecosystem." Copyright 2025 UPI News Corporation. All Rights Reserved.


UPI
16-07-2025
- UPI
New software makes it easy for Chinese police to extract phone data
A real estate agent runs out of her office while talking on her cellphone in Beijing in 2011. Mobile security firm Lookout has discovered malware used by Chinese police to extract data from cellphones. "It's a big concern," said one security analyst. File Photo by Stephen Shaver/UPI | License Photo July 16 (UPI) -- Mobile security company Lookout has found a new system that police departments in China use to extract data from confiscated phones. The software is called Massistant, created by Chinese company Xiamen Meiya Pico, and it specializes in extracting different types of data, including private communications, multimedia files, geographical tracking records, voice recordings and contact databases. It can even extract messages on Signal. "It's a big concern," said Kristina Balaam, the researcher for Lookout who performed the malware analysis. "I think anybody who's traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that's on it could be collected." She found several posts on local Chinese forums in which people said they found the malware installed on their devices after interacting with the police. "It seems to be pretty broadly used, especially from what I've seen in the rumblings on these Chinese forums," Balaam said. The malware must get installed on an unlocked device and works with a hardware tower connected to a desktop computer, according to a description and pictures of the system on Xiamen Meiya Pico's website. Chinese law on cell phone confiscation has expanded. Since 2024, Chinese security staff can examine electronic devices without a warrant or active criminal case. This is especially the case with border crossings. "If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it," Balaam said. Massistant leaves traces of its installation on the seized devices, so users can potentially detect and remove it by finding it on their devices or using Android Debug Bridge to remove the software. But Balaam warned that by the time Massistant is installed, it's already too late and authorities have access to the user's data. She said that Massistant is just one of many spyware/malware created by Chinese surveillance tech companies, something she called "a big ecosystem."


TechCrunch
16-07-2025
- TechCrunch
Chinese authorities are using a new tool to hack seized phones and extract data
Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — images, location histories, audio recordings, contacts, and more. On Wednesday, mobile cybersecurity company Lookout published a new report — shared exclusively with TechCrunch — detailing the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico. Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn't know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means both Chinese residents, as well as travelers to China, should be aware of the tool's existence and the risks it poses. 'It's a big concern. I think anybody who's traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that's on it could be collected,' Kristina Balaam, a researcher at Lookout who analyzed the malware, told TechCrunch ahead of the report's release. 'I think it's something everybody should be aware of if they're traveling in the region.' Balaam found several posts on local Chinese forums where people complained about finding the malware installed on their devices after interactions with the police. 'It seems to be pretty broadly used, especially from what I've seen in the rumblings on these Chinese forums,' said Balaam. The malware, which must be planted on an unlocked device, and works in tandem with a hardware tower connected to a desktop computer, according to a description and pictures of the system on Xiamen Meiya Pico's website. Balaam said Lookout couldn't analyze the desktop component, nor could the researchers find a version of the malware compatible with Apple devices. In an illustration on its website, Xiamen Meiya Pico shows iPhones connected to its forensic hardware device, suggesting the company may have an iOS version of Massistant designed to extract data from Apple devices. Police do not need sophisticated techniques to use Massistant, such as using zero-days — flaws in software or hardware that have not yet been disclosed to the vendor — as 'people just hand over their phones,' said Balaam, based on what she's read on those Chinese forums. Since at least 2024, China's state security police have had legal powers to search through phones and computers without needing a warrant or the existence of an active criminal investigation. 'If somebody is moving through a border checkpoint and their device is confiscated, they have to grant access to it,' said Balaam. 'I don't think we see any real exploits from lawful intercept tooling space just because they don't need to.' A screenshot of the Massistant mobile forensic tool's hardware, taken from Xiamen Meiya Pico's official Chinese website. Image Credits:Xiamen Meiya Pico The good news, per Balaam, is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer. The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person's data. According to Lookout, Massistant is the successor of a similar mobile forensic tool, also made by Xiamen Meiya Pico, called MSSocket, which security researchers analyzed in 2019. Xiamen Meiya Pico reportedly has a 40% share of the digital forensics market in China, and was sanctioned by the U.S. government in 2021 for its role in supplying its technology to the Chinese government. The company did not respond to TechCrunch's request for comment. Balaam said that Massistant is only one of a large number of spyware or malware made by Chinese surveillance tech makers, in what she called 'a big ecosystem.' The researcher said that the company tracks at least 15 different malware families in China.


Business Wire
10-07-2025
- Business
- Business Wire
Lookout Survey Reveals Critical Gaps in Security Leaders' Confidence and the Actual Vulnerability of Their Organizations
BOSTON--(BUSINESS WIRE)--A new global survey by Lookout, Inc., the leader in mobile endpoint security, today unveiled concerning insights into the state of mobile cybersecurity preparedness, revealing a significant gap between security leaders' confidence and the actual vulnerability of their organizations. The survey of more than 700 security leaders globally exposes a pervasive overconfidence in employees' ability to detect modern mobile-centric threats, leaving businesses significantly more exposed than they realize. The survey's most critical insights include: 58% of companies have experienced incidents due to executive impersonation scams via text or voice, highlighting the severe impact of sophisticated social engineering tactics. 77% of respondents have experienced one or more mobile phishing attacks in the past six months, underscoring the ubiquity of these threats. 51% admit to having inconsistent visibility of social engineering attempts, creating massive security blind spots. Despite these alarming statistics, the survey revealed pervasive overconfidence: 96% of leaders are confident their employees can spot a phishing attempt that comes via their mobile devices. Yet, over half reported incidents where employees fell victim to executive impersonation scams, leading to financial loss or sensitive data exposure. Furthermore, even with widespread security training efforts, "lack of training" remains the top reason cited for employees clicking suspicious links, suggesting current education may not be keeping pace with the rapidly evolving modern threat landscape. "Today's threat actors are increasingly sophisticated, and they understand that mobile endpoints have historically been an afterthought in many enterprise security strategies," said Jim Dolce, CEO of Lookout. "This survey clearly demonstrates that this oversight is creating a dangerous vulnerability. Attackers are aggressively targeting employees on their iOS and Android devices, using highly effective social engineering tactics delivered via SMS, voice, and messaging apps to compromise credentials and gain quiet access to enterprise data." These findings highlight core issues: A dangerous overconfidence gap: Organizations feel ready for threats but are demonstrably underprepared, leading to successful attacks. Inadequate visibility: Traditional security solutions often lack visibility into mobile-centric social engineering attempts, meaning many manipulative efforts go unnoticed until it's too late. Outdated training: Security awareness training isn't evolving fast enough to truly prepare employees for today's sophisticated, mobile-focused threats. To address these pressing challenges, Lookout emphasizes a multi-faceted approach to secure the "front line" – employees and their mobile devices. This includes: Implementing an AI-first social engineering and human risk solution: This provides baseline protection against today's Modern Kill Chain. Integrating Mobile Endpoint Detection and Response (EDR): Gaining strategic mobile security data points, such as vulnerable assets and web traffic analysis, by integrating EDR into existing SIEM, SOAR, EDR, or XDR solutions. Sophisticated and ongoing security awareness training: Training specifically designed for mobile-centric threats, including simulated phishing and social engineering exercises that reflect current malicious tactics, fostering a culture of vigilance and easy, judgment-free reporting. About the Survey The data presented in this report is sourced from the independent research company Censuswide, which conducted the survey in June 2025. More than 700 security leaders globally were polled across various industries. Censuswide is a member of the British Polling Council and abides by and employs members of the Market Research Society and follows the MRS code of conduct and ESOMAR principles. About Lookout Lookout, Inc. is a globally recognized cybersecurity leader delivering advanced protection for the most vulnerable element of any enterprise security strategy — human error and manipulation. Cloud-native by design, the Lookout platform offers rapid, scalable deployment and simplified security operations, defending the frontline of human-centric attacks—the mobile device. Attackers now target the human element more than ever, with mobile devices providing the most direct path to their victims. Using social engineering techniques that exploit basic human instincts like trust, curiosity, and urgency, they deceive users into revealing sensitive credentials, allowing them to slip past legacy security solutions. Lookout Endpoint Detection and Response (EDR) continuously monitors mobile endpoints for signs of human-centric attacks, as well as traditional malware, software vulnerabilities, and other anomalous activity. It uses advanced threat detection techniques, including artificial intelligence (AI) and behavioral analysis, to identify threats before they escalate across the enterprise. Learn more at and follow us on the Lookout Blog, LinkedIn, and X © 2025 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® and the Lookout multi-color/multi-shaded Wingspan Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, and the 4 Bar Shield Design.


Time Out
30-05-2025
- Time Out
Four local trails have been named among Australia's best winter hikes
Who says you have to stay inside during winter in Melbourne? (To be fair though, we do love nursing a vino in a cosy wine bar or enjoying a Sunday roast at a pub with a fireplace.) Well, definitely not the outdoor experts at AllTrails – according to them, winter is actually a hugely popular time to get out in nature, with the hike-mapping app reporting its highest number of navigations during the colder months. So after analysing the data and crunching some numbers, they've rounded up the ten most popular winter hikes in Australia, and four trails around Victoria have made the cut. Guess it's time to lace up your boots, pop on some layers and face the frosty conditions. We reckon these scenic tracks are well worth it. Werribee Gorge Circuit Walk, Pentland Hills This 7.6-kilometre loop features a hiking trifecta: gorgeous views, rock scrambling and, for the brave, a post-hike swimming hole (if you can brave the chill in winter!). Our favourite photo spot is the Eastern Lookout at the gorge, which offers panoramic views of the park's coolest natural wonders. Yarra Bend Park Loop, Melbourne Just a short drive from Melbourne's CBD, this relaxed 9.2-kilometre track on the traditional lands of the Wurundjeri people weaves through the city's largest natural bushland park. Look out for rainbow lorikeets, red-rumped parrots, yellow-tailed black cockatoos and possums. Highlights include Dights Falls and Studley Park Boathouse – the oldest public boathouse on the Yarra River recently underwent a huge renovation, and is a beautiful spot to refuel. Mount Lofty Loop, Wonga Park This five-kilometre mountain climb has a lot going for it – there are plenty of uphills to get the blood pumping, but you'll be rewarded with stunning views of the Yarra Valley stretching all the way to the Dandenong Ranges. You may even spot some wildlife along the way. It was also named the third most popular trail in Australia for 2024, so you know this one is a certified winner no matter what the weather conditions. Lyrebird Walk, Neuman, Paddy and Coles Ridge Loop, Melbourne Hidden in the Dandenong Ranges, this 6.6-kilometre loop offers a chance to spot the trail's namesake bird. Locals recommend walking anticlockwise to make it a little less strenuous. With lush, green scenery and giant ferns to admire, it's a particularly pretty track – keen photographers may want to bring their cameras. These are Australia's top ten winter hikes, according to AllTrails: Grand Canyon Track, Blue Mountains, NSW Werribee Gorge Circuit Walk, Pentland Hills, VIC Yarra Bend Park Loop, Melbourne, VIC Whistlepipe Gully and Lesmurdie Falls, Perth, WA Spit Bridge to Manly Walk, Sydney, NSW Mount Lofty Loop, Wonga Park, VIC Enoggera Reservoir Circuit, Brisbane, QLD Pages Pinnacle, Numinbah Valley, QLD Lyrebird Walk, Neuman, Paddy and Coles Ridge Loop, Melbourne, VIC Bondi Beach to Coogee Beach Walk, Sydney, NSW