By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
Computing

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

News Room
Last updated: 2026/02/25 at 1:46 PM
News Room Published 25 February 2026
Share
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
SHARE

Ravie LakshmananFeb 25, 2026Cyber Espionage / Network Security

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus cyber espionage group tracked as UNC2814 that breached at least 53 organizations across 42 countries.

“This prolific, elusive actor has a long history of targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas,” Google Threat Intelligence Group (GTIG) and Mandiant said in a report published today.

UNC2814 is also suspected to be linked to additional infections in more than 20 other nations. The tech giant, which has been tracking the threat actor since 2017, has been observed using API calls to communicate with software-as-a-service (SaaS) apps as command-and-control (C2) infrastructure. The idea, it added, is to disguise their malicious traffic as benign.

Central to the hacking group’s operations is a novel backdoor dubbed GRIDTIDE that abuses Google Sheets API as a communication channel to disguise C2 traffic and facilitate the transfer of raw data and shell commands. It’s a C-based malware that supports file upload/download and the execution of arbitrary shell commands.

Exactly how UNC2814 obtains initial access remains a topic of investigation, but the group is said to have a history of exploiting and compromising web servers and edge systems.

Attacks mounted by the threat actor have leveraged a service account to move laterally within the environment via SSH. Also put to use are living-off-the-land (LotL) binaries to conduct reconnaissance, escalate privileges, and set up persistence for the backdoor.

“To achieve persistence, the threat actor created a service for the malware at /etc/systemd/system/xapt.service, and once enabled, a new instance of the malware was spawned from /usr/sbin/xapt,” Google explained.

Another noteworthy aspect is the deployment of SoftEther VPN Bridge to establish an outbound encrypted connection to an external IP address. It’s worth mentioning here that the abuse of SoftEther VPN has been linked to multiple Chinese hacking groups.

There is evidence indicating that GRIDTIDE is dropped on endpoints containing personally identifiable information (PII), an aspect that’s consistent with cyber espionage activity focused on monitoring persons of interest. Google, however, noted that it did not observe any data exfiltration taking place during the course of the campaign.

GRIDTIDE execution lifecycle

GRIDTIDE’s C2 mechanism involves a cell-based polling mechanism, where specific roles are assigned to certain spreadsheet cells to enable bidirectional communication –

  • A1, to poll for attacker commands and overwrite it with a status response (e.g., S-C-R or Server-Command-Success)
  • A2-An, to transfer data, such as command output and files
  • V1, to store system data from the victim endpoint

As part of the action, Google said it terminated all Google Cloud Projects controlled by the attacker, disabled all known UNC2814 infrastructure, and cut off access to attacker-controlled accounts and Google Sheets API calls leveraged by the actor for command-and-control (C2) purposes.

The tech giant described UNC2814 as one of the “most far-reaching, impactful campaigns” encountered in recent years, adding that it has issued formal victim notifications to each of the targets and that it is actively supporting organizations with verified compromises resulting from this threat.

The latest discovery is one of many concurrent efforts by Chinese nation-state groups to embed themselves into networks for long-term access. The development also highlights that the network edge continues to take the brunt of internet-wide exploitation attempts, with threat actors frequently exploiting vulnerabilities and misconfigurations in such appliances as a common entry point into enterprise networks.

These appliances have become attractive targets in recent years as they typically lack endpoint malware detection, yet provide direct network access or pivot points to internal services if compromised.

“The global scope of UNC2814’s activity, evidenced by confirmed or suspected operations in over 70 countries, underscores the serious threat facing telecommunications and government sectors, and the capacity for these intrusions to evade detection by defenders, Google said.

“Prolific intrusions of this scale are generally the result of years of focused effort and will not be easily re-established. We expect that UNC2814 will work hard to re-establish its global footprint.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Vast Data expands AI Operating System with global control plane, zero-trust agent framework and deeper Nvidia integration –  News Vast Data expands AI Operating System with global control plane, zero-trust agent framework and deeper Nvidia integration – News
Next Article Multiverse poaches Amazon VP to run product team – UKTN Multiverse poaches Amazon VP to run product team – UKTN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Has Take-Two Interactive Software (TTWO)’s pricing grown too much after recent stock weakness?
Has Take-Two Interactive Software (TTWO)’s pricing grown too much after recent stock weakness?
News
Tired of generic rom-coms? You need to watch these 3 modern romance movies on Paramount+ this weekend
Tired of generic rom-coms? You need to watch these 3 modern romance movies on Paramount+ this weekend
News
Family appeals to Arizona community for clues in ongoing disappearance of Nancy Guthrie
News
PinkPantheress reveals she produced ‘Tonight’ using only her MacBook keyboard
PinkPantheress reveals she produced ‘Tonight’ using only her MacBook keyboard
Software

You Might also Like

Linux 7.0-rc5 Released: Linux 7.0 “Starting To Calm Down”
Computing

Linux 7.0-rc5 Released: Linux 7.0 “Starting To Calm Down”

2 Min Read
D7VK 1.6 Overhauls Interaction With DXVK’s D3D9 Backend
Computing

D7VK 1.6 Overhauls Interaction With DXVK’s D3D9 Backend

1 Min Read
AWS at 20*: Inside the rise of Amazon’s cloud empire, and what’s at stake in the AI era
Computing

AWS at 20*: Inside the rise of Amazon’s cloud empire, and what’s at stake in the AI era

48 Min Read
Overview of Artificial Intelligence in 2026 – Chat GPT AI Hub
Computing

Overview of Artificial Intelligence in 2026 – Chat GPT AI Hub

13 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?