Google has taken one more step in cloud protection against data sequestration: its Google Drive Ransomware Detection System, powered by IA models, is already available to all payment customers and has been activated by default. This is a functionality that, when it detects suspicious activity during synchronization from a computer, interrupts that synchronization instantly and warns both the user and the administrators to contain the damage.
The central idea is simple but important: although detection does not prevent a compromised computer from going to encryption files locally, it does prevent those encrypted versions from spreading to the copies that are on Drive. This means that the cloud copy is protected and can be recovered quickly when the infected machine is healed, thanks to the Drive restoration tool that allows you to undo the changes caused by the ansomware. Google offers more technical details and administrative steps at its help center: official explanation of detection and recovery.

This function began its beta-phase deployment in October 2025 and now Google states that, with improvements in its IA model, detection covers a much greater range of malicious encryption patterns and does so more quickly. In the words of the company, the latest model detects tens of times more infections than before, resulting in wider protection for organizations. The publication on the Workspace blog provides information on the general arrival of the feature: official ad on the Google Workspace blog.
From a practical point of view, when Drive detects encrypted files during synchronization from a desktop computer, the synchronization stops automatically. The affected user receives a mail and Drive notification, and administrators see an alert on the management console, which facilitates a coordinated response. In addition, Google provides step-by-step instructions for the restoration of affected files using the Drive recovery tool, so that organizations can return to normal as soon as possible.
It is important to stress the limitations: stopping synchronization is not a substitute for protection measures in endpoints. The attack may have encrypted data on the local disk and, therefore, good practices remain essential: maintaining up-to-date systems and software, having backup off the attackers' reach, applying minimum privileges policies and using multifactor authentication. For official recommendations and guides on how to prepare for the Ransomware, the U.S. Cybersecurity Agency offers useful resources: CISA guide to Ransomware.
In terms of availability, Google has activated default detection for organizations with Business, Enterprise, Education and Frontline licenses, while the restoration functionality is accessible to Google Workspace customers, individual subscribers and users with personal accounts. Managers who consider it necessary can deactivate the protection from the management console under the Google Workspace application section in Drive and Docs settings related to malware and Ransomware. For alerts to be activated on endpoints, Google requests that the latest version of Drive for desktop (v.114 or above) be installed; even so, if the desktop client is an old version, the synchronization will continue to be paused when a threat is detected.
Google is not the only actor in this space. Other cloud storage providers have offered similar functions: Microsoft includes detection and recovery of Ransomware in OneDrive for Microsoft 365 subscribers, with resources and procedures to recover damaged files, as detailed in its supporting documentation: OneDrive - detection and recovery. Dropbox also has detection mechanisms for business customers and advanced plans; its online help explains what they offer and to whom it is addressed: Dropbox information on Ransomware detection. The convergence of these functions shows that cloud suppliers are incorporating proactive capacities to limit the extent of damage when endpoints fail.

From the IT and security perspective, the IA-driven detection arrival to services like Drive raises operational and privacy questions. What are the signs of the model? Is the content of the files evaluated or only the behavior patterns of the synchronization? Google indicates that detection is performed during synchronization and that, in the face of the suspicion of malicious encryption, the rise is blocked, administrative alert is notified and created, but prudent organizations should review privacy and retention policies, as well as coordinate with antivirus manufacturers and endpoints management providers for full coverage.
For companies, the recommendation is clear: to activate a layer defence. The Drive function adds an important barrier to the spread of the ransomware to the cloud, but does not replace off-line backup, network segmentation, user training and modern endpoint solutions. Implemented along with these measures, this AI detection can significantly reduce the impact of an incident and accelerate recovery.
In short, that Google will enable by default an IA-powered Ransomware detection on Drive for paying customers is good news for administrators and users. It represents an improvement in the protection of cloud assets and in the capacity to respond to incidents, although it will remain part of an ecosystem of controls that organizations must manage in a coordinated manner.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...