Google engineers indicted, and MuMu Player's reconnaissance commands
Contents
Two very different incidents came up in the same week: a former Google engineer allegedly transferring sensitive information abroad, and a NetEase Android emulator that was quietly reconnoitering user systems.
three former Google engineers indicted for allegedly transferring Tensor secrets to Iran
Three people, two former Google employees and the husband of one of them, were indicted by a US federal grand jury for allegedly stealing trade secrets from Google and transferring them to Iran. It is a serious example of a nation-linked insider threat targeting a tech company.
who was indicted
All three defendants are Iranian nationals living in San Jose, California:
- Samaneh Ghandali (41): former Google engineer
- Soroor Ghandali (32): Samaneh’s sister, also a former Google engineer
- Mohammadjavad Khosravi (40): Samaneh’s husband, employed at another tech company
what was allegedly taken
The secrets involved Google’s Tensor processor, the custom chip family used in Pixel phones, specifically material related to processor security, encryption, and related technologies. Samaneh is said to have transferred hundreds of files through a third-party messaging platform.
For a separate company referred to as Company 2, Samaneh allegedly took about 24 photos on a mobile device before traveling to Iran in December 2023.
the screenshot method
The most interesting part is the extraction method: instead of copying files or using removable media, the defendants allegedly photographed the screen with a phone. The goal was to bypass DLP systems and logging.
They also allegedly deleted files from devices, searched online for ways to erase communication records, and submitted false affidavits.
charges and penalties
The three defendants were charged with:
- conspiracy to steal trade secrets
- theft and attempted theft of trade secrets
- obstruction of justice
Trade secret theft can carry up to 10 years in prison and a 250,000 fine.
why screenshots defeat DLP
Enterprise security is usually focused on monitoring electronic transfers. If someone takes a physical photo of the screen, there may be nothing useful in the logs. Zero trust and DLP do not help much against a camera.
The fact that all three defendants were Iranian nationals and family members makes the case even more uncomfortable. Tensor chips are a core differentiator for Pixel, so exporting design information would be a direct competitive hit.
MuMu Player Pro ran 17 reconnaissance commands on macOS every 30 minutes
Another report claimed that NetEase’s MuMu Player Pro Android emulator was quietly collecting host-system information on macOS every 30 minutes.
what was happening
The emulator was periodically running commands such as:
network information
arp -ascutil --dnsscutil --proxy/etc/hosts
processes and software
ps auxls -laeTO -@ /Applications/mdls /Applications/*.app
system details
sysctl -alaunchctl print systemmount
Together, those commands reveal a very complete picture of the machine.
why ps aux is especially bad
ps aux is the most sensitive of the set because it exposes the full command line for every running process. That can leak VPN endpoints, development environment details, API keys passed on the command line, and security software usage.
SensorsData fingerprinting
The investigation also found that MuMu Player used SensorsData, a Chinese analytics platform, and that the fingerprint it collected included the Mac serial number.
why the privacy policy does not help
None of this behavior appears to be disclosed clearly in the privacy policy. And it is hard to justify why an Android emulator would need sysctl -a or arp -a at all.
MuMu is especially common among game players, so this was not just a niche developer issue.
what to do
There has not been a clear official statement from NetEase at the time of writing. If you want to avoid the issue, the practical choices are to uninstall MuMu Player or isolate it inside a VM.
On macOS you can check for activity with:
launchctl list | grep -i mumu
lsof -c mumu
An Android emulator runs with deep system permissions. Installing a sketchy one directly on your host OS is not much different from handing over administrator access.