Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Home/CyberSecurity News/Google Drive Gets Ransomware Detection & File Restoration
CyberSecurity News

Google Drive Gets Ransomware Detection & File Restoration

Ransomware detection and file restoration features are now generally available for Google Drive, Google announced. Originally launched in beta in September 2025, the updated security controls offer...

David kimber
David kimber
March 31, 2026 3 Min Read
0 0

Ransomware detection and file restoration features are now generally available for Google Drive, Google announced.

Originally launched in beta in September 2025, the updated security controls offer organizations enhanced defenses against malware attacks targeting local machines and cloud synchronization.

The updated artificial intelligence model driving this release features significant performance improvements. The system now detects 14 times as many infections as the beta version.

The Admin console setting for ransomware detection (Source: Google)
The Admin console setting for ransomware detection (Source: Google)

It successfully identifies a broader range of ransomware encryption signatures. It executes these detections much faster, effectively minimizing the window of opportunity for threat actors to compromise data.

The core defense mechanism relies on the Google Drive for the desktop application. When the software detects ransomware behavior on a local endpoint, it immediately pauses file synchronization.

This automated response prevents newly encrypted files from being uploaded to the Google Workspace environment and from overwriting healthy cloud data.

New Ransomware Protection Capabilities

To receive local desktop alerts during an incident, users must run the Google Drive for desktop version 114 or later.

Alert detail on the ransomware detection (Source: Google)
Alert details on the ransomware detection (Source: Google)

Older versions will still sever the synchronization connection during an attack, but they will not display the pop-up notifications.

When a detection event occurs, the platform automatically dispatches warning emails to both the affected end-user and the domain administrators.

Security teams can also track these incidents through dedicated alerts generated in the Admin console security center.

The Admin console setting for Drive file restoration  (Source: Google)
The Admin console setting for Drive file restoration  (Source: Google)

Following a contained ransomware attack, the newly introduced file restoration interface allows users to recover their data efficiently.

Victims can select multiple compromised files and revert them in bulk to their pre-infection versions.

This capability accelerates incident recovery times and provides a reliable mechanism to restore access without submitting to extortion demands.

  • AI-Powered Detection: Detects 14× more ransomware infections with faster and broader coverage.
  • Automated Threat Isolation: Instantly pauses sync to protect Google Workspace data.
  • Real-Time Alerts: Notifies users and admins via desktop popups, email, and Admin console.
  • Version-Aware Protection: Enables full alerts on Drive for desktop v114+ while older versions still stop sync.
  • Bulk File Restoration: Allows multiple files to be reverted to pre-infection versions quickly.
  • Improved Recovery Workflow: Provides a streamlined interface for faster incident response.
  • Endpoint & Cloud Integration: Secures both local machines and Google Drive simultaneously.
End user alert in Drive for desktop when ransomware is detected(Source: Google)
End-user alert in Drive for desktop when ransomware is detected(Source: Google)

Google reports that thousands of users have successfully tested this recovery tool during the beta phase.

These real-world tests demonstrated the tool’s scalability and reliability during post-incident response operations.

Deployment and Availability

Both the detection and restoration features are enabled by default for organizations.

Interface to assist with file recovery (Source: Google)
Interface to assist with file recovery (Source: Google)

Administrators can manage these configurations at the Organizational Unit level in the Google Workspace Admin console, under Drive and Docs settings.

Availability depends on the specific Google account type and licensing tier:

  • File restoration is accessible to all Google Workspace customers, Individual subscribers, and personal Google accounts.
  • Ransomware detection is supported for Business Standard and Plus editions.
  • Enterprise Starter, Standard, and Plus tiers include the automated detection capabilities.
  • Education Standard and Plus, alongside Frontline Standard and Plus, also receive the detection tools.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarePatchransomwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Hackers Deploy ResokerRAT Using Telegram for Screenshots & Persistence

Next Post

Hackers Use Windows Tools to Disable Antivirus for Ransom

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us