BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
PARTNERSHIPGoogle / Alphabet2026-02-26

Google Disrupts GRIDTIDE: China-Linked Cyber Espionage Campaign Hit 42 Countries

Key Takeaways

  • ▸Google disrupted a China-linked espionage campaign affecting 53 confirmed victims across 42 countries, primarily targeting telecom and government sectors
  • ▸The GRIDTIDE backdoor abused legitimate Google Sheets API calls for command-and-control, disguising malicious traffic as normal cloud activity without exploiting any security vulnerabilities
  • ▸UNC2814 is a distinct threat actor from "Salt Typhoon" with different tactics and targets, tracked by Google since 2017
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign↗

Summary

Google's Threat Intelligence Group (GTIG) and Mandiant have disrupted a sophisticated global cyber espionage campaign dubbed GRIDTIDE, attributed to UNC2814, a suspected Chinese state-sponsored threat actor active since 2017. The operation targeted telecommunications providers and government organizations across 42 countries on four continents, with confirmed intrusions affecting 53 victims and suspected infections in at least 20 additional nations.

The attackers employed a novel backdoor called GRIDTIDE that abused legitimate Google Sheets API functionality to disguise command-and-control traffic as benign communications with SaaS applications. This technique exploited normal cloud service behavior rather than security vulnerabilities, making detection particularly challenging. The disruption effort included terminating all Google Cloud projects controlled by the attackers, disabling UNC2814 infrastructure, revoking attacker accounts, and releasing indicators of compromise dating back to 2023.

GTIG emphasized that UNC2814 operates independently from the widely-reported "Salt Typhoon" espionage group, utilizing distinct tactics and targeting different victim profiles. The initial detection came through Mandiant's use of Google Security Operations, which flagged suspicious activity on a compromised CentOS server showing privilege escalation to root access. While the specific initial access vector remains undetermined, UNC2814 has historically gained entry by exploiting web servers and edge systems.

  • The disruption involved terminating attacker-controlled Google Cloud projects, disabling infrastructure, and releasing indicators of compromise to help organizations defend against the threat
CybersecurityGovernment & Defense

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
RESEARCH

Deep Dive: Optimizing Sharded Matrix Multiplication on TPU with Pallas

2026-04-05
Google / AlphabetGoogle / Alphabet
INDUSTRY REPORT

Kaggle Hosts 37,000 AI-Generated Podcasts, Raising Questions About Content Authenticity

2026-04-04
Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google Releases Gemma 4 with Client-Side WebGPU Support for On-Device Inference

2026-04-04

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Anthropic Explores AI's Role in Autonomous Weapons Policy with Pentagon Discussion

2026-04-05
SourceHutSourceHut
INDUSTRY REPORT

SourceHut's Git Service Disrupted by LLM Crawler Botnets

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Security Researcher Exposes Critical Infrastructure After Following Claude's Configuration Advice Without Authentication

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us