A Chinese iOS trojan known as “Xsser mRAT” appears to be targeting protesters in China, but the exact scope of its use is still unclear, according to mobile security company Lacoon.

Xsser mRAT can extract address book data, call logs, SMS messages, location data, pictures, operating system data, and information from a popular Chinese messaging app by Tencent, according to a Tuesday post.

Additionally, passwords and other authentication data in the iOS keychains used by device accounts – such as Apple ID and mail – and GSM identities are also at risk, the post indicates.

Although researchers have been unable to determine the method or vector of attack, Lacoon has determined that infection can only occur if the iOS device is jailbroken.