
What Happened
Google released its annual ads safety report alongside a wave of new Android Play Store policy updates this week, and the numbers are staggering. In 2025 alone, Google blocked or removed 8.3 billion policy-violating ads and suspended 24.9 million advertiser accounts for fraud, misrepresentation, and policy abuse. At the same time, Google announced Android 17 will introduce tighter controls over how third-party apps access contact lists and location data — two of the most commonly abused permissions in the mobile ecosystem.
The ad enforcement figures represent a meaningful escalation over prior years, and the Android privacy changes signal that Google is responding to sustained regulatory and user pressure around data minimization and app permission abuse. The new permission framework is expected to give users more granular control over what apps can see, and when — moving closer to the model Apple introduced with iOS in recent years. You can read the full report and policy announcement via The Hacker News.
Why These Numbers Matter Operationally
8.3 billion blocked ads sounds like a Google housekeeping story — but it has direct implications for healthcare practices, tax offices, and small businesses that rely on digital advertising or whose staff interact with ad-supported websites daily.
Malicious ads — often called malvertising — are one of the most reliable delivery mechanisms for credential stealers, ransomware droppers, and fake software update prompts. Employees browsing legitimate news sites, industry publications, or even Google search results can be served weaponized ads that exploit browser vulnerabilities or trick users into downloading malware. The fact that Google had to block over 8 billion of these in a single year tells you the volume of attempts your workforce is passively exposed to every day, even on reputable platforms.
The 24.9 million suspended accounts figure is equally telling. Fraudulent advertiser accounts are frequently used to run impersonation campaigns — fake ads mimicking trusted software vendors, government portals, tax filing services, or healthcare platforms. For a CPA firm or a medical office, a staff member clicking a convincing fake ad for QuickBooks, an EHR platform, or an IRS e-filing service is a realistic and serious threat vector.
On the Android side, the contact and location permission changes in Android 17 close real gaps that threat actors have exploited through seemingly innocuous apps. Rogue apps with broad contact access can silently harvest patient lists, client rosters, or employee directories — data that carries significant HIPAA and data privacy exposure. Tightening these permissions by default is a meaningful defensive improvement for any organization that allows Android devices in a BYOD or company-issued context.
Key Takeaway
Malvertising at this scale means no website is a safe browsing environment without endpoint protection and DNS filtering in place. For businesses on Android, plan your Android 17 migration carefully — the new permission model may break app workflows that relied on broad contact or location access, and you want to discover those gaps before users do.
What Your Business Should Do Now
Deploy DNS-layer filtering and endpoint protection. Browser-based malvertising bypasses most perimeter controls. A DNS filtering solution (such as Cisco Umbrella, Cloudflare Gateway, or similar) blocks malicious ad domains before they load. Pair this with endpoint detection and response (EDR) on all workstations — this is non-negotiable for any practice handling PHI, tax data, or financial records.
Review your Android device management policy. If your organization uses Android devices — whether company-issued or employee-owned — now is the time to audit which apps have contact list and location permissions enabled. Use your MDM platform to enforce permission baselines and begin planning for Android 17 compatibility testing. Apps that currently rely on broad contact access for legitimate workflows will need to be evaluated against the new permission model.
Train staff on ad-based phishing. Most security awareness programs focus on email phishing, but malvertising through search results and display ads is an underappreciated risk. Staff should know that sponsored search results and banner ads can be malicious even on major platforms, and that unsolicited software update prompts in the browser should always be treated as suspect.
Verify advertiser identity if you run paid campaigns. If your practice or business runs Google Ads, the suspension of 24.9 million fraudulent accounts also means the ad ecosystem is actively being gamed by impersonators. Periodically search your own brand name to confirm no fraudulent ads are impersonating your business — a tactic increasingly used to redirect your prospective clients to credential-harvesting pages.
Google's enforcement actions at this scale are a reminder that the digital advertising infrastructure is a high-volume attack surface. The Android 17 privacy changes are a net positive, but protection at the organizational level still requires layered controls that don't rely on platform-level enforcement alone.
Schedule
Ready to get protected?
Schedule a free discovery call with our cybersecurity experts. No obligation.


