Deceptive Android ads and junk PDF readers are back in the spotlight — and experts say they’re part of a much bigger Google Play security problem.
A dad, one stubborn PDF – and four random apps
Earlier today, Android Authority published a story that perfectly captures how confusing and risky Android can be for non‑technical users. [1]
The article describes a fairly normal situation:
- A dad with a mid‑range HONOR phone tries to open a PDF.
- His phone already has a built‑in office suite that supports PDFs (WPS Office).
- The file refuses to open, so he does what many people would do: he starts installing extra PDF apps from the Google Play Store.
- Before long, his phone is stuffed with random PDF readers that all look similar and don’t fix the problem.
The twist? He wasn’t actively searching the Play Store for alternatives. Instead, every attempt to open the file showed a message that looked like a system dialog:
“Unable to read file. Try updating your PDF application.”
A big “Update now” button sat underneath. Tap it, and he’d be sent to a new PDF app in the Play Store. Install. Try again. Same error. New ad. New app. Rinse, repeat. [2]
Eventually, his child (an Android journalist) discovered the truth:
- The “error message” was an advertisement shown by WPS Office’s splash screen, disguised to look like a system alert.
- Uninstalling WPS Office — and therefore removing that ad surface — made PDFs open normally again. [3]
No passwords were stolen and no banking apps were hijacked. But that’s mostly luck. The exact same UX trick — a fake “fix it” prompt pretending to be official — is also being used by banking trojans and full‑blown malware campaigns in 2025.
Why this isn’t “user error” – Android’s ad & app design set people up to fail
It’s easy to shrug and say, “He should’ve known better.” But most Android users don’t live in security blogs and Telegram channels.
A few uncomfortable realities:
- Ads can look like system messages. Google’s own ad policies say developers shouldn’t imitate system dialogs, but enforcement is patchy. Ads like the WPS PDF “update” clearly cross the line and yet still slip through. [4]
- The Play Store interface trains people to click the wrong thing. When you do land in Google Play, the first results you see are often paid placements. The “Ad” badge is tiny, and sponsored listings are styled almost exactly like real results. [5]
- The app choices are overwhelming and repetitive. Search for “PDF opener” or “PDF reader” and you’ll see pages of nearly identical apps with generic names, similar icons, and copy‑pasted descriptions. Picking the “right” one becomes a guessing game. [6]
And users are already struggling. Malwarebytes’ big “Tap, Swipe, Scam” study this year found that:
- 44% of people encounter a mobile scam every day, and
- only 15% strongly agree that they can confidently recognize a scam on their phone. [7]
Combine that with UI patterns that blur the line between ad and system alert, and it’s not surprising that someone taps the big, shiny “Update” button that appears to be “helping” them.
Today’s PDF pop‑up drama sits on top of a much bigger Play Store problem
The dad’s phone ended up full of junk PDF apps — annoying, but not catastrophic. Security researchers warn that the exact same design and ad ecosystem is also driving people toward malicious apps.
In early November, Zscaler’s 2025 Mobile, IoT & OT Threat Report highlighted a serious Play Store issue that’s still making headlines this month: [8]
- 239 malicious Android apps were found on Google Play.
- Together, they had been downloaded around 42 million times between June 2024 and May 2025.
- Mobile malware detections jumped 67% year‑over‑year, with adware, spyware, and banking trojans taking the lead.
These apps often masquerade as:
- PDF tools
- file or photo managers
- VPNs or “cleaner” utilities
- messaging or productivity apps
If that sounds exactly like the type of PDF utilities the dad kept installing, that’s the point. In 2025, the line between “annoying shovelware” and “steals your money” is thin — and you can’t reliably see it from the Play Store search screen.
Malwarebytes researchers documented a massive ad‑fraud campaign dubbed “SlopAds” this September:
- 224 malicious apps on Google Play
- More than 38 million installs
- Up to 2.3 billion ad requests per day generated by the infected devices before Google finally pulled them. [9]
Yes, Google does remove bad apps. But, as one recent analysis put it, the pipeline just “continually fills” again with fresh clones and new campaigns. [10]
From fake PDF updates to banking trojans
The “update your PDF app” trick isn’t just a nuisance. It’s already been weaponised by serious banking malware.
Anatsa: a fake PDF update that steals your bank logins
Security researchers at ThreatFabric recently documented a campaign delivering the Anatsa banking trojan through apps on the official Google Play Store:
- The malware posed as a “PDF update” or document viewer helper.
- Once installed, it waited until victims opened their real banking apps.
- Then it displayed a full‑screen overlay claiming the bank service was down for maintenance and asking for login details.
- Those credentials were sent straight to criminals, who could then drain accounts remotely. [11]
The UI doesn’t look like a monstrous skull and crossbones. It looks like a helpful message attached to the PDF or banking flow — exactly the kind of design that fooled the Android Authority writer’s dad.
N‑Gate: fake tap‑to‑pay prompts in the wild
On November 18, New York’s law enforcement community warned about a new Android malware dubbed “N‑Gate.” [12]
- Victims are lured into installing what appears to be a payment or verification app.
- When they go to pay, they see a fake tap‑to‑pay or “card validation” screen.
- Entering their PIN sends those details to criminals waiting at ATMs to cash out.
Again, the core trick is identical: abuse trust in system‑looking UI to harvest sensitive actions and data.
What Google is doing – and why it’s not enough (yet)
Google isn’t ignoring the problem. Across 2024–2025 it:
- Rolled out stricter verification for some developers and regions.
- Promoted Google Play Protect as the front‑line defense for flagging known-bad apps.
- Worked with partners to remove hundreds of malicious apps in major campaigns like SlopAds. [13]
But several issues remain obvious as of November 28, 2025:
- Ads still look too much like system UI.
Google’s policies nominally forbid ads that mimic system notifications, yet real‑world examples — like the WPS PDF “update” — are clearly violating the spirit of those rules. [14] - The Play Store still rewards clones and shovelware.
Zscaler, Malwarebytes, and others repeatedly find near‑identical utilities with minimal functionality differences, some of which are later exposed as fraud or malware. Yet they thrive on the back of search ads and recommendation algorithms. [15] - Casual users carry too much of the burden.
Malwarebytes’ research shows that two‑thirds of users say it’s hard to tell scams from legitimate messages, and only a small minority feel confident spotting scams. [16]
Designing systems that assume users will notice subtle “Ad” labels or recognise fake alerts is unrealistic. - OEM bloatware keeps creating new ad surfaces.
Many phones, especially budget models, ship with third‑party office suites, cleaners, browsers, and “toolboxes” that monetise aggressively with interstitial ads and pop‑ups. Those surfaces are prime spots for deceptive prompts like the fake PDF update. [17]
The dad’s case is mild compared to full‑blown malware, but it’s the same pipeline: confusing ads → random “fix” app → potential exposure.
How to avoid the Android PDF ad scam (and similar tricks)
Here’s a practical checklist you can follow today — and share with less‑tech‑savvy friends or parents.
1. Treat in‑app “update” pop‑ups with suspicion
If you see a message like “Unable to read file. Try updating your PDF application” with a big button inside an app:
- Assume it’s an advertisement, not a system command.
- Close it using the X or back gesture instead of tapping the action button.
- If you really think your app needs an update, open Google Play yourself, search for the app by name, and update from there. [18]
2. Prefer trustworthy PDF apps and set one default
On most Android phones, you only need one solid PDF solution:
- The built‑in viewer in Files, Google Drive, or the native office suite is often enough.
- If you want something more powerful, stick to widely known options like Adobe Acrobat Reader or your OEM’s official reader — installed directly from Play with the correct developer name. [19]
Then:
- Set that app as your default PDF opener.
- Uninstall or disable any pre‑loaded office suite you don’t plan to use — especially if it spams you with ads.
3. Make ads easier to spot
A few small habits go a long way:
- Look for tiny labels like “Ad” or “Sponsored” in Play Store results before tapping.
- Be wary of prompts that appear only when a splash screen or banner loads — genuine system dialogs usually appear in the centre of the screen with consistent Android styling.
- If a prompt uses strange fonts, mismatched icons, or is tied to a specific third‑party app’s branding, treat it as untrusted until proven otherwise. [20]
4. Use Android’s built‑in protections (and consider an ad‑blocking layer)
At minimum:
- Turn on Google Play Protect in the Play Store → Play Protect → Settings.
- Keep Android system updates and Google Play system updates installed promptly.
For extra safety — particularly on relatives’ devices — consider:
- Using Private DNS with a reputable provider to block many ad and tracking domains at the network level.
- A system‑wide ad‑blocking app or DNS‑based blocker (for example, app‑based tools that create a local VPN and block known ad hosts).
- A reputable mobile security app from a well‑known vendor for malware scanning and URL blocking. [21]
5. Regularly review apps and permissions
Once a month (set a calendar reminder if needed):
- Open Settings → Apps and uninstall anything you don’t recognise or no longer use.
- Check App permissions and revoke access to the camera, microphone, SMS, accessibility, or usage data for apps that don’t truly need it. [22]
This not only reduces the odds of malware; it also cuts down on the “noise” of junk apps that can show confusing prompts.
How to set up a safer Android phone for your parents
If you’re the “family IT support,” you can dramatically reduce risk in 15–20 minutes:
- Remove bloatware and ad‑heavy apps
- Uninstall or disable pre‑loaded office suites, cleaners, “boosters,” random browsers, and unknown tool apps. [23]
- Install and pin a few trusted essentials
- One PDF app (Drive/Files/Adobe), one browser, one messaging app, one password manager, and your chosen security app.
- Set safe defaults
- Make your trusted PDF and browser the defaults so other apps don’t hijack file or web links.
- Enable Play Protect and Private DNS
- Turn on Play Protect and configure Private DNS to a reliable provider that offers malware blocking. [24]
- Explain what a scammy prompt looks like
- Show them the difference between:
- a real system update (from Settings or Play), and
- a random “update now” or “tap to fix” prompt that appears inside a document or ad.
- Show them the difference between:
Instead of trying to make them security experts, design their phone so they have fewer dangerous choices in the first place.
If you think you’ve already tapped a fake “update PDF app” prompt
Don’t panic, but act methodically:
- Uninstall suspicious apps
- Go to Settings → Apps and remove newly installed PDF or “utility” apps you don’t fully trust.
- Scan your phone
- Run Google Play Protect.
- Use a reputable mobile security app to perform a full scan. [25]
- Check banking and payment apps
- Look for any unknown logins, transactions, or new devices.
- If something looks off, contact your bank using the number on the back of your card — never via links in texts or emails. [26]
- Report the scam
- Flag the app and ad in Google Play.
- In many countries, you can also report fraud attempts to national cybercrime hotlines or the FBI Internet Crime Complaint Center (IC3) if you’re in the U.S. [27]
Catching problems early can turn a nightmare into a minor clean‑up.
The bigger picture: platforms must stop making the wrong tap feel “official”
The story that surfaced today — a dad trying to fix a PDF and ending up with a phone full of random apps — is a small but telling snapshot of Android in late 2025. [28]
Security researchers, law enforcement, and mobile‑security vendors all agree on a few themes:
- Scams are now a daily background noise for nearly half of mobile users. [29]
- Attackers increasingly exploit interface tricks — overlays, fake updates, spoofed tap‑to‑pay screens — rather than just obvious malware installers. [30]
- Official app stores remain a major battleground, not a guaranteed safe zone. [31]
Users can (and should) learn some basic defenses. But ultimately, platforms like Android and Google Play need to:
- Ban ad creatives that imitate system UI, and actually enforce that rule.
- Make ad labels large and consistent across all listing formats.
- Penalise shovelware and near‑duplicate utilities that add risk but little value.
- Hold OEMs accountable for pre‑installed apps that abuse ads or deceptive prompts. [32]
Until then, stories like this dad’s will keep happening — and sometimes the next random “PDF update” won’t just waste storage. It’ll steal a paycheck.
References
1. www.androidauthority.com, 2. www.androidauthority.com, 3. www.androidauthority.com, 4. www.androidauthority.com, 5. www.findarticles.com, 6. www.findarticles.com, 7. www.malwarebytes.com, 8. www.bleepingcomputer.com, 9. www.malwarebytes.com, 10. www.findarticles.com, 11. thehackernews.com, 12. www.wwnytv.com, 13. www.bleepingcomputer.com, 14. www.androidauthority.com, 15. www.bleepingcomputer.com, 16. www.malwarebytes.com, 17. www.androidauthority.com, 18. www.androidauthority.com, 19. www.androidauthority.com, 20. www.findarticles.com, 21. www.androidauthority.com, 22. www.androidauthority.com, 23. www.androidauthority.com, 24. www.malwarebytes.com, 25. www.malwarebytes.com, 26. www.wwnytv.com, 27. www.malwarebytes.com, 28. www.androidauthority.com, 29. www.malwarebytes.com, 30. thehackernews.com, 31. www.bleepingcomputer.com, 32. www.findarticles.com
