Categories: Cyber Security News

Google Unveils Ransomware Detection and File Recovery for Google Drive

Google has officially moved its advanced ransomware detection and file restoration features for Google Drive out of beta, making them generally available to organizations and individual users worldwide.

Originally launched for beta testing in September 2025, these security enhancements are designed to minimize the destructive impact of ransomware and malware attacks on both personal and corporate endpoints.

The Admin console setting for ransomware detection (Source: Google)

AI-Powered Threat Detection

The general availability release brings a major upgrade to Google’s threat detection engine. Powered by an updated AI model, the system now identifies 14 times more infections than the previous beta version, recognizes a much wider variety of modern ransomware encryption methods, and detects malicious behavior significantly faster.

The Admin console setting for Drive file restoration  (Source: Google)

Throughout the testing phase, thousands of users successfully verified the file restoration process, proving the architecture is highly scalable and reliable during critical incident response scenarios.

Alert detail on the ransomware detection (Source: Google)

Google’s updated security suite introduces three primary mechanisms to halt active attacks and recover compromised data:

  • Automated Ransomware Detection: When malicious encryption behavior is identified on a machine running Google Drive for desktop, the application immediately pauses file syncing to prevent corrupted files from overwriting clean cloud backups.
  • Dual Notification System: The system triggers an immediate local desktop warning for the end user while simultaneously sending email notifications and logging a detailed alert in the Admin console security center.
  • Bulk File Restoration: Victims can roll back their impacted Google Drive to a previous, unencrypted state. Users can select multiple affected files and restore them to the exact versions that existed right before the malware infection occurred, eliminating the need to pay ransom demands.

For IT and security teams, deploying these defenses requires minimal overhead. Both ransomware detection and file restoration are enabled by default across the organization.

Administrators maintain granular control and can toggle these protections on or off at the Organizational Unit (OU) level through the Google Workspace Admin console.

To ensure complete functionality, organizations must deploy Google Drive for desktop version 114 or later; older client versions will still pause file syncing during an attack, but will not display endpoint warning notifications to end users.

Access to these security tools depends on the subscription tier. The bulk file restoration capability is universally available to all Google Workspace customers, Workspace Individual subscribers, and standard personal Google account users.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google

The post Google Unveils Ransomware Detection and File Recovery for Google Drive appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Hackers Abuse Middle East Telecom Networks for Large-Scale Command-and-Control Operations

Hackers are using telecom networks and hosting providers across the Middle East as a foundation…

2 hours ago

World Cup Phishing Campaign Nearly Triples With 203 Unique IP Addresses

A large-scale phishing campaign targeting the 2026 FIFA World Cup has grown far beyond what…

2 hours ago

Russian Threat Groups Use RDP, VPN, Supply Chain Attacks, and Social Engineering for Initial Access

Russian state-sponsored threat groups significantly stepped up their cyber operations in 2025, using a range…

5 hours ago

Hackers Backdoor Popular art-template npm Package to Launch Watering-Hole Attacks

A widely-used JavaScript templating library called art-template has been weaponized to deliver a sophisticated iOS…

5 hours ago

Hackers Use Six-Layer Persistence to Maintain Access on Compromised FreePBX Systems

A hacker group known as INJ3CTOR3 has been running an active campaign against FreePBX systems,…

5 hours ago

Hackers Use NF-e Invoice Lures to Deliver Banana RAT Through Malicious Batch Files

A newly discovered banking trojan is targeting Brazilians by disguising itself as a legitimate electronic…

5 hours ago

This website uses cookies.