Nation-State Threats

GRIDTIDE: Google Disrupts China Cyber Espionage

Picture this: Chinese hackers burrowing into telecoms worldwide, siphoning calls and secrets via innocent-looking Google Sheets. Google and Mandiant yanked the plug—hard. Your digital life just got a shield upgrade.

Digital map showing GRIDTIDE cyber intrusions across four continents with Google disruption overlay

Key Takeaways

  • Google and Mandiant disrupted GRIDTIDE, a PRC-linked espionage op hitting telecoms in 42+ countries using Google Sheets for C2.
  • No product flaws exploited—just clever API abuse, terminated via project nukes and account revokes.
  • This signals cloud providers as active cyber defenders, accelerating AI-powered threat hunting globally.

Your phone rings. You pick up, chat about dinner plans, maybe gripe about work. But lurking? A shadow network—GRIDTIDE—sniffing every byte, courtesy of a China-linked crew called UNC2814. They’ve hit telecoms and governments in 42 countries, four continents. Real people? Their calls logged, PII like voter IDs swiped. Not anymore. Google Threat Intelligence Group and Mandiant just slammed the door.

Boom. Disrupted.

This isn’t some abstract cyber skirmish. It’s your privacy on the line—PII dumped on infected boxes, national secrets funneled through what looks like legit cloud traffic. And here’s the kicker: they hid in plain sight, abusing Google Sheets APIs. No bugs exploited. Just clever misuse of tools we all use daily.

How GRIDTIDE Turned Google Sheets into a Spy Tool

Think of it like smuggling diamonds in cookie jars. UNC2814 drops GRIDTIDE backdoor—novel, nasty—then phones home via SaaS APIs. Traffic blends in, screams ‘benign spreadsheet update.’ They’ve done this since 2017, racking up intrusions across Africa, Asia, Americas. Google Cloud projects? Terminated. Attacker accounts? Revoked. Infrastructure? Disabled. IOCs released for the hunt.

Mandiant spotted it first, via Google SecOps on a CentOS box. Suspicious process: /var/tmp/xapt (masquerading as a Debian tool), spawning shell, checking root privs.

/var/tmp/xapt └── /bin/sh └── sh -c id 2>&1 └── [Output] uid=0(root) gid=0(root) groups=0(root)

That’s the tree. Root confirmed. Lateral moves via SSH, LotL binaries for recon. Persistence? Systemd service at /etc/systemd/system/xapt.service. Nohup to keep it alive. Even SoftEther VPN for encrypted outbound since 2018. And the prize? Boxes with full names, DOBs, national IDs.

Google didn’t wait. Partnership blitz: severed access, nuked projects. As of Feb 18, 53 confirmed victims, 20 more suspected. No Salt Typhoon overlap—different TTPs, victims.

But wait—energy surging here. This disruption? It’s the future peeking through. Cloud giants aren’t just hosting; they’re warriors. AI-fueled SecOps (Google’s Shared Fate model) spotting threats across fleets. Imagine: defenses evolving like immune systems, adaptive, relentless.

Why UNC2814 Picked Telecoms — And Why It Backfired

Telecoms are goldmines. Edge servers, web apps—UNC2814’s historical MO. Compromise one, pivot to governments. PII hauls suggest intel ops, voter manipulation whispers. Elusive since 2017, but Mandiant’s investigation accelerated GTIG’s hunt.

Here’s my bold call, absent from the original: this mirrors the Maginot Line’s folly. Spies built walls of stealth around cloud tools, assuming giants wouldn’t breach their own turf. Wrong. Google/Mandiant flipped the script—proactive takedowns inside enemy lines. Prediction? Nation-states pivot to on-prem shadows, but AI threat intel makes that a loser’s game. Cloud becomes the unbreakable digital fortress, shifting espionage from infiltration to exhaustion.

Post-compromise? Service accounts for SSH hops. GRIDTIDE persists, VPN bridges out. But Google’s OOB detections—curated for modern intrusions—nailed it. Customer alerted, threat contained. That’s Shared Fate: shared brains, shared wins.

No initial vector pinned yet—likely web server exploits, per history. But the C2 genius? Sheets API as cover. Legit products working perfectly, masking malice. Stealthy till disrupted.

Is Your Network Next — Or Already Safe?

Short answer: check IOCs. GTIG dropped ‘em—active since 2023. Telecoms, govs: audit Cloud projects, API logs. But wonder this: in an AI platform shift, threats like UNC2814 accelerate evolution. Defenses? Hyperscale now. Google SecOps continuously hunts, scales to billions.

Real people win. No more ghost in the Sheets. Your calls stay yours. Energy here— this is cyber’s Manhattan Project moment. State actors challenged at scale. Futurist view: AI doesn’t just compute; it guards the grid.

And the PII drop? Chilling. Full profiles for psyops? Targeted ops? Disruption halts the flow.

The Bigger Picture: Cloud Wars Heating Up

UNC2814 prolific, no overlaps with bigger names. 42 countries breached— that’s global reach. But Google’s move? Template for tomorrow. Partners worldwide, intel shared. Espionage disrupted mid-stream.

Skepticism check: PR spin? Nah, raw IOCs, process trees—journalistic gold. No hype, just action.

Wander a sec: remember Stuxnet? Precision strike. This? Broader, cloud-scale. Your ISP safer today.


🧬 Related Insights

Frequently Asked Questions

What is GRIDTIDE backdoor?

GRIDTIDE’s UNC2814’s custom malware, persisting via systemd, C2 via Google Sheets API for stealth.

How did Google disrupt UNC2814?

Terminated Cloud projects, disabled accounts/infra, revoked Sheets API access, released IOCs.

Are Chinese hackers still targeting telecoms?

UNC2814 hit 53 victims in 42 countries; disruption severed access, but check your logs—threats evolve.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What is GRIDTIDE backdoor?
GRIDTIDE's UNC2814's custom malware, persisting via systemd, C2 via Google Sheets API for stealth.
How did Google disrupt UNC2814?
Terminated Cloud projects, disabled accounts/infra, revoked Sheets API access, released IOCs.
Are Chinese hackers still targeting telecoms?
UNC2814 hit 53 victims in 42 countries; disruption severed access, but check your logs—threats evolve.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Mandiant Blog

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.