Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户的要求是直接写描述,不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章主要讲的是Google威胁情报组(GTIG)和合作伙伴破坏了一个与中国有关的网络间谍组织UNC2814。这个组织已经活跃了至少六年,攻击了53个组织,分布在42个国家。他们使用了一种名为GRIDTIDE的后门程序,通过Google Sheets进行命令控制,隐藏恶意流量。 接下来,我需要提取关键点:Google和合作伙伴的行动、目标组织的数量和分布、攻击手法GRIDTIDE以及利用云服务进行隐藏。然后把这些信息浓缩成简洁的句子。 确保不超过100字,同时保持信息准确。可能需要调整句子结构,去掉不必要的细节。比如,“破坏”可以代替“disrupted”,“攻击”可以代替“breached”。 最后检查字数是否符合要求,并确保内容连贯、准确传达原文的核心信息。 </think> Google与合作伙伴破坏了一个疑似中国关联的网络间谍组织UNC2814的基础设施。该组织自2017年起活跃,针对全球42个国家的53个政府和电信机构发动攻击。其利用GRIDTIDE后门程序通过Google Sheets API隐藏恶意活动,并窃取个人信息及通信数据。此次行动终止了其全球攻击活动。 2026-2-26 08:29:3 Author: securityaffairs.com(查看原文) 阅读量:16 收藏

Google GTIG disrupted China-linked APT UNC2814 halting attacks on 53 orgs in 42 countries

Pierluigi Paganini February 26, 2026

Google and partners disrupted UNC2814, a suspected China-linked group that hacked 53 organizations across 42 countries.

Google, with industry partners, disrupted the infrastructure of UNC2814, a suspected China-linked cyber espionage group that breached at least 53 organizations in 42 countries. The group has been active since at least 2017, and was spotted targeting governments and global telecoms across Africa, Asia, and the Americas, making it a highly prolific and elusive threat. UNC2814 is likely linked to additional infections in more than 20 other nations.

“Last week, Google Threat Intelligence Group (GTIG), Mandiant, and partners took action to disrupt a global espionage campaign targeting telecommunications and government organizations in dozens of nations across four continents.” reads the GTIG’s report. “The threat actor, UNC2814, is a suspected People’s Republic of China (PRC)-nexus cyber espionage group that GTIG has tracked since 2017. “

UNC2814 used API calls to SaaS apps as command-and-control (C2) infrastructure, disguising malicious traffic as legitimate activity. Rather than exploiting product flaws, the group leveraged legitimate Google Sheets API functions through a novel backdoor called GRIDTIDE.

The group’s operations target different victims than other campaigns, such as “Salt Typhoon,” using unique techniques and TTPs.

Mandiant, using Google SecOps, detected suspicious activity on a CentOS server where the binary /var/tmp/xapt launched a root shell and ran id to confirm root access, showing the attacker had escalated privileges. The researchers reported that the payload mimicked a legacy Debian tool to avoid detection.

Post-compromise, the actor moved laterally via SSH, used living-off-the-land binaries for reconnaissance, and installed the GRIDTIDE backdoor for persistence via a systemd service. Attackers executed GRIDTIDE with nohup ./xapt to keep it running after session closure, and deployed SoftEther VPN Bridge to create an encrypted outbound connection.

UNC2814 targeted endpoints containing personally identifiable information (names, phone numbers, dates of birth, and national IDs) consistent with telecom-focused cyber espionage. While no direct exfiltration was observed, UNC2814 could leverage such access to monitor communications, including call records and SMS messages, for surveillance and intelligence-gathering purposes.

GRIDTIDE is a sophisticated C-based backdoor used by UNC2814 that can execute shell commands, upload and download files. The malware uses Google Sheets as a command-and-control (C2) channel, hiding malicious traffic within legitimate API requests. While it currently uses Google Sheets, other cloud-based spreadsheet platforms could be exploited in a similar way.

The backdoor requires a 16-byte cryptographic key on the host to decrypt its Google Drive configuration, which contains service account credentials, spreadsheet IDs, and private keys.

“When executed, GRIDTIDE sanitizes its Google Sheet. It does this by deleting the first 1000 rows, across columns A to Z in the spreadsheet, by using the Google Sheets API batchClear method. This prevents previous commands or file data stored in the Sheet from interfering with the threat actor’s current session.” continues the report. “Once the Sheet is prepared, the backdoor conducts host-based reconnaissance. It fingerprints the endpoint by collecting the victim’s username, endpoint name, OS details, local IP address, and environmental data such as the current working directory, language settings, and local time zone.”

Commands from the attacker follow a structured syntax, allowing execution of Bash commands, file uploads, and downloads, with status responses returned to cell A1. Data transfer occurs via cells A2 to An, and the malware uses URL-safe Base64 encoding to evade detection.

UNC2814 has leveraged GRIDTIDE since at least 2017 to target telecommunications and government organizations worldwide.

Google Threat Intelligence Group (GTIG) and its partners terminated all attacker-controlled Google Cloud Projects and accounts, disabled the UNC2814 infrastructure, and revoked access to Google Sheets API calls.

GTIG took coordinated action to disrupt UNC2814 and protect affected organizations. They terminated all attacker-controlled Cloud Projects, disabling GRIDTIDE backdoor access, and took down known UNC2814 infrastructure, including current and historical domains. Attacker accounts and Google Sheets access were revoked, and victim organizations were formally notified and supported. GTIG also refined detection signatures to block GRIDTIDE activity and released indicators of compromise (IOCs) used by UNC2814 since 2023, helping organizations worldwide identify and defend against this threat.

“The global scope of UNC2814’s activity, evidenced by confirmed or suspected operations in over 70 countries, underscores the serious threat facing telecommunications and government sectors, and the capacity for these intrusions to evade detection by defenders.” concludes the report. “Prolific intrusions of this scale are generally the result of years of focused effort and will not be easily re-established. We expect that UNC2814 will work hard to re-establish their global footprint.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, China)




文章来源: https://securityaffairs.com/188521/apt/google-gtig-disrupted-china-linked-apt-unc2814-halting-attacks-on-53-orgs-in-42-countries.html
如有侵权请联系:admin#unsafe.sh