A powerful backdoor and rookie has been found pre-installed on three million Android phones but was luckily found by security researchers before malicious actors:

Since BitSight and its subsidiary company Anubis Networks took possession of the two preconfigured domains, more than 2.8 million devices have attempted to connect in search of software that can be executed with unfettered “root” privileges, the researchers said. Had malicious parties obtained the addresses before BitSight did, the actors could have installed keyloggers, bugging software, and other malware that completely bypassed security protections built into the Android operating system. The almost three million devices remain vulnerable to so-called man-in-the-middle attacks because the firmware—which was developed by a Chinese company called Ragentek Group—doesn’t encrypt the communications sent and received to phones and doesn’t rely on code-signing to authenticate legitimate apps. Based on the IP addresses of the connecting devices, vulnerable phones hail from locations all over the world, with the US being the No. 1 affected country.

“The thing that scares us is a lot of these users will be unaware of the vulnerability, and they will never get an update,” BitSight CTO Stephen Boyer told Ars. “This is full system compromise. This is at the root level. [Attackers with a MitM position] can do anything.”

I wonder how many nation state actors are actively using this exploit?