Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Dismantles Chinese Cyber Espionage Network

Google Dismantles Chinese Cyber Espionage Network

Posted on February 26, 2026 By CWS

A group of hackers believed to be associated with the Chinese state has been implicated in a massive cyber espionage campaign, targeting telecom providers and government bodies across multiple continents for approximately ten years. Google has now intervened to dismantle this operation, severing the group’s ongoing access and providing threat intelligence to assist affected organizations in responding effectively.

Google’s Coordinated Response

The Google Threat Intelligence Group (GTIG), in collaboration with Mandiant, has taken decisive action against a global espionage campaign linked to a threat actor known as UNC2814, which is suspected of being connected to the People’s Republic of China (PRC). Since 2017, GTIG has been monitoring this group, and by February 18, 2026, they confirmed breaches affecting 53 victims across 42 countries, with further infections suspected in at least 20 more nations spanning Africa, Asia, and the Americas.

Unmasking the GRIDTIDE Backdoor

The campaign revolved around a previously undocumented backdoor referred to as GRIDTIDE. Unconventionally, GRIDTIDE utilized Google Sheets’ infrastructure as a communication conduit between attackers and compromised devices, disguising malicious activity as normal cloud operations and eluding typical network defenses.

Unlike the publicly known Salt Typhoon group, UNC2814 targets entirely different victims using unique strategies. Google Cloud analysts discovered GRIDTIDE following a Mandiant Threat Defense investigation that detected suspicious activity on a customer’s CentOS Linux server. This led to the identification of a binary named /var/tmp/xapt, which was crafted to mimic a standard system tool but was used to gain complete machine control.

UNC2814’s Methods and Impact

Though the initial access method remains unclear, UNC2814 is known for infiltrating systems via compromised web servers and edge network devices. Once inside, they employ legitimate system tools to move laterally, a technique known as “living off the land,” to avoid detection. Systems targeted include those containing sensitive personal data, aligning with PRC intelligence objectives.

To maintain persistence, UNC2814 embedded GRIDTIDE as a systemd service and used SoftEther VPN Bridge for encrypted communications. GRIDTIDE’s capabilities include executing shell commands and exfiltrating data, using encrypted Google Drive configurations for command-and-control access.

Mitigation and Future Precautions

Organizations are advised to monitor outbound HTTPS connections to Google Sheets API endpoints and check for unauthorized system services and VPN components on Linux servers. Applying GTIG’s YARA rules and cross-referencing internal logs with published Indicators of Compromise (IOCs) will help determine any residual exposure from this campaign.

Google’s intervention highlights the importance of proactive threat intelligence sharing and collaboration in combatting sophisticated cyber threats. The incident underscores the ongoing need for vigilance and robust cybersecurity measures to protect critical infrastructure worldwide.

Cyber Security News Tags:Chinese hackers, cyber attack, Cybersecurity, data breach, Espionage, Google, Government, GridTide, GTIG, hacking group, internet security, Mandiant, network security, Telecom, UNC2814

Post navigation

Previous Post: Critical Cisco SD-WAN Vulnerability Exploited Since 2023
Next Post: Cisco Resolves Critical SD-WAN Vulnerability Exploited by Hackers

Related Posts

Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability Cyber Security News
Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware Cyber Security News
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Cyber Security News
New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials Cyber Security News
New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands Cyber Security News
Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability
  • Zyxel Resolves Critical Security Flaw in Multiple Devices
  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious NuGet Package Targets Financial Sector
  • Critical Telnet Flaw Exposes Root Access Vulnerability
  • Zyxel Resolves Critical Security Flaw in Multiple Devices
  • Microsoft Alerts Developers to Malicious Repos Spreading Malware
  • Claude Code Flaws Risk Remote Code Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News