BotBeat
...
← Back

> ▌

Google / AlphabetGoogle / Alphabet
PARTNERSHIPGoogle / Alphabet2026-03-01

Google Disrupts GRIDTIDE: China-Linked Cyber Espionage Campaign Hit 42 Countries

Key Takeaways

  • ▸Google disrupted a China-linked espionage campaign (UNC2814/GRIDTIDE) that compromised 53 victims across 42 countries, targeting telecom and government sectors
  • ▸The GRIDTIDE backdoor abused legitimate Google Sheets API for command-and-control, demonstrating advanced techniques to blend malicious traffic with normal cloud activity
  • ▸Google terminated attacker-controlled cloud projects, disabled infrastructure, and revoked API access while releasing IOCs for threat actor activity since 2023
Source:
Hacker Newshttps://cloud.google.com/blog/topics/threat-intelligence/disrupting-gridtide-global-espionage-campaign↗

Summary

Google's Threat Intelligence Group (GTIG) and Mandiant have successfully disrupted a sophisticated global cyber espionage campaign attributed to UNC2814, a suspected Chinese state-sponsored threat actor tracked since 2017. The campaign, dubbed GRIDTIDE, targeted telecommunications providers and government organizations across 42 countries on four continents, with confirmed intrusions affecting 53 victims and suspected infections in at least 20 additional countries.

The attackers employed a novel backdoor called GRIDTIDE that abused legitimate Google Sheets API functionality for command-and-control communications, allowing malicious traffic to masquerade as benign cloud application activity. This technique represents a growing trend where threat actors exploit properly functioning cloud services rather than security vulnerabilities to maintain stealth. Google's disruption efforts included terminating all attacker-controlled Google Cloud Projects, disabling UNC2814 infrastructure, revoking API access used for C2 purposes, and releasing indicators of compromise (IOCs) dating back to 2023.

The investigation was accelerated by Mandiant Threat Defense's discovery of the GRIDTIDE backdoor during a customer engagement, where suspicious activity on a CentOS server revealed the attacker's reconnaissance techniques and privilege escalation to root access. Google emphasized that this campaign is distinct from the previously reported "Salt Typhoon" operations, with UNC2814 demonstrating different tactics, techniques, and procedures while targeting different victim profiles. While the initial access vector remains undetermined, UNC2814 has historically compromised organizations by exploiting web servers and edge systems.

  • This campaign is separate from "Salt Typhoon" operations and was detected through Mandiant's continuous monitoring using Google Security Operations platform
CybersecurityGovernment & Defense

More from Google / Alphabet

Google / AlphabetGoogle / Alphabet
RESEARCH

Deep Dive: Optimizing Sharded Matrix Multiplication on TPU with Pallas

2026-04-05
Google / AlphabetGoogle / Alphabet
INDUSTRY REPORT

Kaggle Hosts 37,000 AI-Generated Podcasts, Raising Questions About Content Authenticity

2026-04-04
Google / AlphabetGoogle / Alphabet
PRODUCT LAUNCH

Google Releases Gemma 4 with Client-Side WebGPU Support for On-Device Inference

2026-04-04

Comments

Suggested

AnthropicAnthropic
POLICY & REGULATION

Anthropic Explores AI's Role in Autonomous Weapons Policy with Pentagon Discussion

2026-04-05
SourceHutSourceHut
INDUSTRY REPORT

SourceHut's Git Service Disrupted by LLM Crawler Botnets

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Security Researcher Exposes Critical Infrastructure After Following Claude's Configuration Advice Without Authentication

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us