Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

Flaw in Claude code allows remote code execution and API key disclosure

The OpenClaw creator’s advice to AI builders is to be more playful and give yourself time to improve.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries
Identity

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

userBy userFebruary 25, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 25, 2026Cyber ​​espionage / network security

Google said Wednesday that it worked with industry partners to disrupt the infrastructure of a suspected China-aligned cyber espionage group tracked as UNC2814, which infiltrated at least 53 organizations in 42 countries.

“This prolific and elusive threat actor has a long history of targeting international governments and global telecommunications organizations across Africa, Asia, and the Americas,” Google Threat Intelligence Group (GTIG) and Mandiant said in a report released today.

UNC2814 is also suspected of being linked to additional infections in more than 20 other countries. The tech giant, which has been tracking threat actors since 2017, has been observed using API calls as a command-and-control (C2) infrastructure to communicate with software-as-a-service (SaaS) apps. The aim is to disguise malicious traffic as harmless, it added.

At the center of the hacking group’s efforts is a new backdoor called GRIDTIDE that exploits the Google Sheets API as a communication channel to spoof C2 traffic and facilitate the transfer of raw data and shell commands. This is a C-based malware that supports file upload/download and execution of arbitrary shell commands.

Exactly how UNC2814 gained initial access remains a subject of investigation, but the group is said to have a history of exploiting and compromising web servers and edge systems.

Attacks launched by threat actors leverage service accounts to move laterally within the environment via SSH. It also uses Living-off-the-land (LotL) binaries to perform reconnaissance, escalate privileges, and establish backdoor persistence.

“To achieve persistence, the attacker created a service for the malware in /etc/systemd/system/xapt.service, and once enabled, new instances of the malware were spawned from /usr/sbin/xapt,” Google explained.

Another highlight is the introduction of SoftEther VPN Bridge for establishing outbound encrypted connections to external IP addresses. It is worth mentioning here that multiple Chinese hacking groups are involved in the SoftEther VPN exploit.

There is evidence that GRIDTIDE was dropped on endpoints containing personally identifiable information (PII), consistent with a cyber espionage campaign focused on monitoring persons of interest. However, Google said it was not aware of any data exfiltration occurring during the campaign.

GRIDTIDE execution lifecycle

GRIDTIDE’s C2 mechanism includes a cell-based polling mechanism where specific roles are assigned to specific spreadsheet cells to enable two-way communication.

A1, polls for the attacker’s command and overwrites it with a status response (such as SCR or Server-Command-Success). A2-An transfers data such as command output and files. V1, stores system data from the victim endpoint.

As part of its actions, Google said it shut down all Google Cloud projects controlled by the attackers, disabled all known UNC2814 infrastructure, and cut off access to accounts controlled by the attackers and Google Sheets API calls that the attackers were leveraging for command and control (C2) purposes.

The tech giant described UNC2814 as one of the “most widespread and impactful campaigns” it has encountered in recent years, adding that it has issued formal victim notifications to each target and is actively supporting organizations confirmed to have been compromised by this threat.

The discovery is one of many simultaneous efforts by Chinese nation-state groups to integrate themselves into networks for long-term access. This development also highlights that the network edge continues to bear the brunt of Internet-wide exploitation attempts, with threat actors frequently exploiting vulnerabilities and misconfigurations in such appliances as common entry points into corporate networks.

These appliances have become attractive targets in recent years, as they typically lack endpoint malware detection capabilities but provide direct network access and pivot points to internal services if compromised.

“The global reach of UNC2814, evidenced by confirmed or suspected activity in more than 70 countries, highlights the serious threats facing communications and government sectors and the ability of these intrusions to evade detection by defenders,” Google said.

“Major intrusions of this magnitude are typically the result of years of intensive efforts and are not easily re-established. We look forward to working hard for UNC2814 to re-establish its global presence.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFlaw in Claude code allows remote code execution and API key disclosure
user
  • Website

Related Posts

Flaw in Claude code allows remote code execution and API key disclosure

February 25, 2026

SLH offers $500-$1,000 per call to recruit women for IT help desk vishing attack

February 25, 2026

5 ways triage failure increases business risk instead of reducing it

February 25, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Google suspends UNC2814 GRIDTIDE campaign after 53 breaches in 42 countries

Flaw in Claude code allows remote code execution and API key disclosure

The OpenClaw creator’s advice to AI builders is to be more playful and give yourself time to improve.

Approximately 12% of US teens rely on AI for emotional support and advice

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.