Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Google Disrupts Massive Chinese Espionage Campaign
Google Disrupts Massive Chinese Espionage Campaign
NEWS

Google Disrupts Massive Chinese Espionage Campaign

Google's Threat Intelligence Group dismantles UNC2814, a China-linked operation that deployed a novel backdoor called GRIDTIDE abusing Google Sheets API...

Dylan H.

News Desk

February 28, 2026
3 min read

Abusing Google Sheets as a Weapon

Google, in coordination with Mandiant and industry partners, has disrupted one of the most far-reaching cyber espionage campaigns in recent years. Attributed to a China-nexus threat actor tracked as UNC2814, the operation compromised at least 53 organizations — primarily telecommunications providers and government agencies — across 42 countries spanning Africa, Asia, and the Americas.


The GRIDTIDE Backdoor

Central to UNC2814's operations is a novel C-based backdoor dubbed GRIDTIDE, which ingeniously abuses the Google Sheets API as a command-and-control communication channel:

Spreadsheet CellPurpose
A1Command polling and status responses
A2 through AnCommand output and file transfers
V1System data harvested from victim endpoints

This approach disguises malicious traffic as benign cloud API calls, making detection extremely difficult for traditional network monitoring tools. The technique represents a growing trend of state-sponsored actors abusing legitimate SaaS platforms to evade enterprise security controls.


Eight Years of Espionage

UNC2814 has been active since at least 2017, focusing GRIDTIDE deployments on endpoints containing personally identifiable information (PII) — consistent with espionage activity aimed at monitoring persons of interest. While Google did not observe active data exfiltration during the campaign, the access achieved would have provided significant intelligence-gathering capabilities across critical infrastructure sectors.

Evidence suggests the campaign may have impacted organizations in over 70 countries total, though confirmed breaches were limited to the 53 organizations identified.


Google's Response

To disrupt the operation, Google's Threat Intelligence Group (GTIG) took several decisive actions:

  • Terminated all Google Cloud projects controlled by the attacker
  • Sinkholed current and historical domains used for C2
  • Disabled accounts used by the hackers, including Google Cloud accounts leveraged for communications
  • Severed persistent access to compromised environments

Recommendations

Organizations — especially in the telecommunications and government sectors — should:

  1. Monitor Google Sheets API usage for abnormal patterns or automated access from unexpected endpoints
  2. Review cloud service accounts for unauthorized OAuth tokens or service account keys
  3. Implement network segmentation to limit lateral movement from compromised endpoints
  4. Deploy behavioral analytics capable of detecting legitimate API abuse patterns
  5. Check IoCs published in Google's threat intelligence blog for signs of GRIDTIDE presence

The campaign underscores the challenge of detecting threats that hide within trusted cloud services — a technique likely to become more prevalent as organizations increase their cloud adoption.

Related Reading

  • Leaked Documents Reveal China
  • All Four Major Nation-State Adversaries Now Weaponizing
  • China-Linked UNC3886 Breaches All Four Singapore Telecom
#APT#Espionage#China#Google#Malware#Critical Infrastructure#Telecommunications

Related Articles

Leaked Documents Reveal China's 'Expedition Cloud' Cyber

Technical documents leaked from a malware-infected developer device expose a Chinese military-linked training platform that replicates the critical...

4 min read

All Four Major Nation-State Adversaries Now Weaponizing

Google reports that APT groups from China, Russia, Iran, and North Korea are all actively using Gemini AI for cyber operations including target...

3 min read

Russian-Linked CANFAIL Malware Targets Ukrainian Defense

Google Threat Intelligence Group attributes a previously undocumented JavaScript malware called CANFAIL to a Russian-linked threat actor targeting...

3 min read
Back to all News