Malware & RansomwareHIGH

Google Drive Ransomware Detection - Now Default for Users

Featured image for Google Drive Ransomware Detection - Now Default for Users
BCBleepingComputer
Google Driveransomware detectionAIfile restorationGoogle Workspace
🎯

Basically, Google Drive now automatically checks for ransomware to protect your files.

Quick Summary

Google Drive has rolled out its AI-powered ransomware detection feature for paying users. This means enhanced protection against ransomware attacks. Users can quickly restore files after an incident, minimizing data loss. Stay secure with this new default setting.

What Happened

On April 1, 2026, Google announced that its AI-powered ransomware detection feature for Google Drive is now enabled by default for all paying users. This feature, which was initially announced in September 2025, aims to protect users from ransomware attacks by pausing file syncing when suspicious activity is detected. The system alerts both users and IT administrators about potential breaches, significantly reducing the impact of such incidents.

The ransomware detection works by scanning files as they are synced from desktop computers to Google Drive. If ransomware-encrypted files are detected, syncing is paused, and users receive immediate notifications via email and the Google Drive interface. This proactive approach helps to safeguard documents stored in Google Drive, allowing for quick restoration once the malware infection is resolved.

Who's Affected

This feature is now available to all users within organizations that hold business, enterprise, education, and frontline licenses. Notably, the file restoration capabilities are accessible to all Google Workspace customers, individual subscribers, and even users with personal Google accounts. This broad availability means that a significant number of users can benefit from enhanced protection against ransomware attacks.

Although the feature is enabled by default, administrators have the option to disable it through the Admin console. To ensure effective detection, admins must also install the latest version of Google Drive for desktop (v.114 or later) across all endpoints. This ensures that even if the detection feature is turned off, file syncing will still be paused on older versions, providing a layer of security.

What Data Was Exposed

While the ransomware detection feature does not prevent files on the compromised computer from being encrypted, it protects the documents stored in Google Drive. In the event of an attack, users can utilize the Drive restoration tool to undo any changes made by the ransomware. Google has reported that its latest AI model can detect 14 times more infections than before, providing a more comprehensive safety net for users.

This means that even if files are compromised locally, the data stored in the cloud remains secure, allowing users to recover their work without significant loss. This feature is crucial for businesses and individuals who rely on cloud storage for important documents and files.

How to Protect Yourself

To maximize the benefits of this new feature, users should ensure they are using the latest version of Google Drive for desktop. Regular updates will not only enable the ransomware detection feature but also improve overall security. Users should also familiarize themselves with the restoration process in case of an attack, as knowing how to quickly recover files can save valuable time and resources.

Additionally, organizations should educate their employees about the importance of cybersecurity practices, such as recognizing phishing attempts and maintaining strong passwords. By combining these strategies with Google Drive's new ransomware detection capabilities, users can significantly enhance their protection against potential cyber threats.

🔒 Pro insight: Google's proactive ransomware detection aligns with industry trends, emphasizing the need for AI-driven security measures in cloud services.

Original article from

BCBleepingComputer· Sergiu Gatlan
Read Full Article

Related Pings

HIGHMalware & Ransomware

Claude Code Leak - Infostealer Malware Delivered via GitHub

A recent leak of Claude Code's source code is being exploited by hackers to distribute Vidar malware through fake GitHub repositories. Users searching for the leak are at high risk of infection. Stay informed and cautious to avoid downloading malicious software.

BleepingComputer·
HIGHMalware & Ransomware

CrystalRAT - New Malware-as-a-Service Offers Remote Access

A new malware-as-a-service called CrystalRAT has emerged, offering remote access and prank features. It targets popular applications and browsers, posing significant risks to users. Cybersecurity experts warn of its potential for widespread exploitation.

SC Media·
HIGHMalware & Ransomware

NoVoice Android Malware - Steals WhatsApp Data via Apps

NoVoice malware has infiltrated Google Play, stealing WhatsApp data from millions. Users are at risk of account cloning. Immediate action is necessary to secure devices.

SC Media·
HIGHMalware & Ransomware

WhatsApp Alerts Users About Spyware in Fake iPhone App

WhatsApp warns of a fake iPhone app containing spyware affecting around 200 users. The company is taking action against the creators and urges users to uninstall the malicious app immediately.

SC Media·
HIGHMalware & Ransomware

Ransomware Attackers Exploit Legitimate IT Tools to Bypass Antivirus

Ransomware attackers are using legitimate IT tools to bypass antivirus systems. This trend poses a significant risk to organizations, making detection difficult. Staying informed and proactive is crucial for defense.

SC Media·
HIGHMalware & Ransomware

Phishing Campaign - Delivers Casbaneiro and Horabot Trojans

A new phishing campaign is targeting Spanish-speaking users, delivering the Casbaneiro and Horabot banking trojans. This sophisticated attack poses serious risks, as it exploits various methods to trick victims. Stay alert and protect your sensitive information.

SC Media·