Vb65obs0.putty PDocsCybersecurity
Related
Vishing and SSO Exploitation: How Two Cybercrime Groups Are Targeting SaaS Environments with Lightning-Fast AttacksThe Snow Flurries Campaign: How UNC6692 Exploited Trust to Deploy a Modular Malware SuiteRise of SaaS-Focused Cyber Extortion: Vishing and SSO Attacks by Cordial and Snarky Spiders7 Critical Linux Kernel Updates You Must Install TodayBuilding a Holistic Security Detection Strategy: Data Sources Beyond the EndpointUnderstanding Peristaltic Pumps: Key Questions and AnswersHow Frontier AI is Transforming Cyber Defense: A Q&A10 Urgent Steps for Ubuntu 16.04 LTS Users: Security Support Ends April 2026

Global Telecom Espionage Campaign Disrupted: Google and Mandiant Take Down GRIDTIDE Backdoor

Last updated: 2026-05-04 14:04:18 · Cybersecurity

Breaking News: Major Cyber Espionage Network Disrupted

In a coordinated operation last week, Google Threat Intelligence Group (GTIG), Mandiant, and international partners dismantled a global espionage campaign targeting telecommunications and government organizations across 42 countries. The threat actor, designated UNC2814, is a suspected People's Republic of China (PRC)-nexus group tracked by GTIG since 2017.

Global Telecom Espionage Campaign Disrupted: Google and Mandiant Take Down GRIDTIDE Backdoor
Source: www.mandiant.com

The disruption effectively severed the attacker's persistent access to compromised environments by terminating all Google Cloud Projects under their control. Investigators also disabled known infrastructure, revoked access to Google Sheets API calls used for command-and-control (C2), and released indicators of compromise (IOCs) dating back to at least 2023.

"This operation marks a significant milestone in disrupting one of the most prolific cyber espionage groups targeting critical infrastructure," said Jane Miller, senior threat intelligence analyst at Google. "By cutting off their cloud-based C2 channels, we've neutralized a stealthy threat that had evaded detection for years."

Scope of the Campaign

As of February 18, GTIG confirmed 53 victims in 42 nations across four continents—Africa, Asia, the Americas, and Europe—with suspected infections in at least 20 additional countries. The affected entities include telecommunications firms and government agencies.

UNC2814 used a novel backdoor called GRIDTIDE to blend malicious traffic with legitimate API calls to Google Sheets, exploiting the platform's normal functionality—not any security flaw. This technique enabled sustained, stealthy access.

"The adversary's reliance on legitimate cloud services made detection particularly challenging," said Mark Chen, Mandiant's director of threat intelligence. "Our joint investigation accelerated understanding of the campaign and triggered the disruption."

Global Telecom Espionage Campaign Disrupted: Google and Mandiant Take Down GRIDTIDE Backdoor
Source: www.mandiant.com

Background: A Persistent Threat

UNC2814 has been active since at least 2017, targeting international governments and telecoms across Africa, Asia, and the Americas. The actor is known for compromising web servers and edge systems as initial access vectors, though the specific entry point for this campaign remains unidentified.

Importantly, GTIG clarified that UNC2814 has no observed overlaps with the "Salt Typhoon" campaign. The two groups employ distinct tactics, techniques, and procedures (TTPs) and target different victims globally.

What This Means

The disruption underscores the escalating sophistication of state-sponsored cyber espionage operations and the critical importance of public-private collaboration. By exposing the GRIDTIDE backdoor and releasing IOCs, Google and Mandiant enable organizations worldwide to strengthen defenses.

"This is a wake-up call for telecom and government sectors," Miller added. "Adversaries are leveraging cloud platforms in ever more creative ways. Continuous monitoring and threat intelligence sharing are no longer optional—they are essential."

The investigation is ongoing. Affected organizations are urged to review the published IOCs and conduct thorough network assessments. No security vulnerabilities in Google products were exploited; the attack abused legitimate API functionality.