This document discusses how over 30,000 Android devices have their Android Debug Bridge (ADB) exposed to the internet, allowing them to be compromised. It provides details on the most exposed Android versions and device models, most impacted countries, and how attackers are using exposed ADB access to run commands, access data like emails and contacts, take screenshots, and install malware like cryptominers. It encourages users and vendors not to expose ADB to the internet for security and lists examples of malware that have used exposed ADB as an infection vector.