Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Dismantles Chinese Cyber Espionage Network

Google Dismantles Chinese Cyber Espionage Network

Posted on February 26, 2026 By CWS

A group of hackers believed to be associated with the Chinese state has been implicated in a massive cyber espionage campaign, targeting telecom providers and government bodies across multiple continents for approximately ten years. Google has now intervened to dismantle this operation, severing the group’s ongoing access and providing threat intelligence to assist affected organizations in responding effectively.

Google’s Coordinated Response

The Google Threat Intelligence Group (GTIG), in collaboration with Mandiant, has taken decisive action against a global espionage campaign linked to a threat actor known as UNC2814, which is suspected of being connected to the People’s Republic of China (PRC). Since 2017, GTIG has been monitoring this group, and by February 18, 2026, they confirmed breaches affecting 53 victims across 42 countries, with further infections suspected in at least 20 more nations spanning Africa, Asia, and the Americas.

Unmasking the GRIDTIDE Backdoor

The campaign revolved around a previously undocumented backdoor referred to as GRIDTIDE. Unconventionally, GRIDTIDE utilized Google Sheets’ infrastructure as a communication conduit between attackers and compromised devices, disguising malicious activity as normal cloud operations and eluding typical network defenses.

Unlike the publicly known Salt Typhoon group, UNC2814 targets entirely different victims using unique strategies. Google Cloud analysts discovered GRIDTIDE following a Mandiant Threat Defense investigation that detected suspicious activity on a customer’s CentOS Linux server. This led to the identification of a binary named /var/tmp/xapt, which was crafted to mimic a standard system tool but was used to gain complete machine control.

UNC2814’s Methods and Impact

Though the initial access method remains unclear, UNC2814 is known for infiltrating systems via compromised web servers and edge network devices. Once inside, they employ legitimate system tools to move laterally, a technique known as “living off the land,” to avoid detection. Systems targeted include those containing sensitive personal data, aligning with PRC intelligence objectives.

To maintain persistence, UNC2814 embedded GRIDTIDE as a systemd service and used SoftEther VPN Bridge for encrypted communications. GRIDTIDE’s capabilities include executing shell commands and exfiltrating data, using encrypted Google Drive configurations for command-and-control access.

Mitigation and Future Precautions

Organizations are advised to monitor outbound HTTPS connections to Google Sheets API endpoints and check for unauthorized system services and VPN components on Linux servers. Applying GTIG’s YARA rules and cross-referencing internal logs with published Indicators of Compromise (IOCs) will help determine any residual exposure from this campaign.

Google’s intervention highlights the importance of proactive threat intelligence sharing and collaboration in combatting sophisticated cyber threats. The incident underscores the ongoing need for vigilance and robust cybersecurity measures to protect critical infrastructure worldwide.

Cyber Security News Tags:Chinese hackers, cyber attack, Cybersecurity, data breach, Espionage, Google, Government, GridTide, GTIG, hacking group, internet security, Mandiant, network security, Telecom, UNC2814

Post navigation

Previous Post: Critical Cisco SD-WAN Vulnerability Exploited Since 2023
Next Post: Cisco Resolves Critical SD-WAN Vulnerability Exploited by Hackers

Related Posts

Firefox Releases Security Update to Fix Multiple Vulnerabilities Allowing Arbitrary Code Execution Firefox Releases Security Update to Fix Multiple Vulnerabilities Allowing Arbitrary Code Execution Cyber Security News
Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild Cyber Security News
Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges Microsoft Desktop Windows Manager Out-Of-Bounds Vulnerability Let Attackers Escalate Privileges Cyber Security News
Telegram-Based ResokerRAT Threatens Windows Security Telegram-Based ResokerRAT Threatens Windows Security Cyber Security News
International Criminal Court Hit by New Sophisticated Cyber Attack International Criminal Court Hit by New Sophisticated Cyber Attack Cyber Security News
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Adobe Reader Flaw Patched After Months of Exploitation
  • Critical Adobe Acrobat Reader Flaw Patched Amid Exploitation
  • CPUID Breach: STX RAT Spread via Compromised Downloads
  • OpenAI Urges macOS Users to Update Apps Amid Security Threat
  • Google Enhances Gmail with Mobile End-to-End Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark