BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
PARTNERSHIPGoogle / Alphabet2026-03-01

Google Disrupts GRIDTIDE: China-Linked Cyber Espionage Campaign Hit 42 Countries

Key Takeaways

  • ▸Google disrupted a China-linked espionage campaign (UNC2814/GRIDTIDE) that compromised 53 victims across 42 countries, targeting telecom and government sectors
  • ▸The GRIDTIDE backdoor abused legitimate Google Sheets API for command-and-control, demonstrating advanced techniques to blend malicious traffic with normal cloud activity
  • ▸Google terminated attacker-controlled cloud projects, disabled infrastructure, and revoked API access while releasing IOCs for threat actor activity since 2023
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign↗

Summary

Google's Threat Intelligence Group (GTIG) and Mandiant have successfully disrupted a sophisticated global cyber espionage campaign attributed to UNC2814, a suspected Chinese state-sponsored threat actor tracked since 2017. The campaign, dubbed GRIDTIDE, targeted telecommunications providers and government organizations across 42 countries on four continents, with confirmed intrusions affecting 53 victims and suspected infections in at least 20 additional countries.

The attackers employed a novel backdoor called GRIDTIDE that abused legitimate Google Sheets API functionality for command-and-control communications, allowing malicious traffic to masquerade as benign cloud application activity. This technique represents a growing trend where threat actors exploit properly functioning cloud services rather than security vulnerabilities to maintain stealth. Google's disruption efforts included terminating all attacker-controlled Google Cloud Projects, disabling UNC2814 infrastructure, revoking API access used for C2 purposes, and releasing indicators of compromise (IOCs) dating back to 2023.

The investigation was accelerated by Mandiant Threat Defense's discovery of the GRIDTIDE backdoor during a customer engagement, where suspicious activity on a CentOS server revealed the attacker's reconnaissance techniques and privilege escalation to root access. Google emphasized that this campaign is distinct from the previously reported "Salt Typhoon" operations, with UNC2814 demonstrating different tactics, techniques, and procedures while targeting different victim profiles. While the initial access vector remains undetermined, UNC2814 has historically compromised organizations by exploiting web servers and edge systems.

  • This campaign is separate from "Salt Typhoon" operations and was detected through Mandiant's continuous monitoring using Google Security Operations platform
CybersecurityGovernment & Defense

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google DeepMind Launches Gemini 3.5 Flash: New Lightweight AI Model

2026-05-20
Google / AlphabetGoogle / Alphabet
PARTNERSHIP

Singapore Inks AI Deals with Google

2026-05-20
Google / AlphabetGoogle / Alphabet
UPDATE

Google Overhauls Workspace App Icons with Gradient Design to Emphasize AI Integration

2026-05-20

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Advanced AI Models Bring Government to 'Reflection Point,' CIA Official Says

2026-05-20
Google / AlphabetGoogle / Alphabet
PARTNERSHIP

Singapore Inks AI Deals with Google

2026-05-20
NVIDIANVIDIA
POLICY & REGULATION

China Bans Nvidia RTX 5090D V2 During CEO Huang's Visit, Escalating AI Hardware Trade War

2026-05-20
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us