Google disrupts Сhina-linked cyberespionage campaign spanning dozens of countries
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读文章,理解其主要信息。 文章讲的是Google破坏了一个与中国有关的网络间谍活动,目标是全球42个国家的电信公司和政府机构。这个活动由 UNC2814 组织实施,使用了新的恶意软件 Gridtide 和 Google 表格来隐藏通信。虽然没有直接看到数据被窃取,但恶意软件安装在包含敏感信息的系统中。Google 还提到他们没有发现与另一个中国相关组织 Salt Typhoon 的联系,并且已经关闭了该组织的基础设施。 接下来,我需要将这些关键点浓缩到100字以内。要包括:Google破坏间谍活动、目标国家和机构、使用的工具、影响以及结果。 可能会遗漏一些细节,比如攻击的时间范围或具体的技术手段,但要在字数限制内抓住重点。 最后,确保语言简洁明了,不使用任何开头词如“这篇文章”或“内容总结”,直接描述即可。 </think> Google披露一个与中国相关的网络间谍活动,该活动针对全球42个国家的电信公司和政府机构。该活动由 UNC2814 组织实施,使用恶意软件 Gridtide 和 Google 表格隐藏通信。尽管未直接观察到数据窃取行为,但恶意软件安装在包含敏感个人信息的系统中。Google 已关闭相关基础设施,并未发现与 Salt Typhoon 的关联。 2026-2-26 16:35:31 Author: therecord.media(查看原文) 阅读量:6 收藏

Google has disrupted a long-running China-linked cyberespionage campaign targeting telecommunications providers and government organizations across dozens of countries.

The campaign, attributed by Google Threat Intelligence to a group tracked as UNC2814, affected at least 53 organizations across 42 countries, the company said in a report on Thursday. The group has been active since at least 2017 and has a history of targeting international governments and telcos across Africa, Asia and the Americas.

“This prolific scope is likely the result of a decade of concentrated effort,” Google said.

The attackers used a newly identified backdoor called Gridtide and abused legitimate Google Sheets functionality to conceal command-and-control communications, making malicious activity appear as normal cloud traffic.

“The actor could easily make use of other cloud-based spreadsheet platforms in the same manner,” researchers said.

The initial entry point in this campaign remains unclear, but UNC2814 has historically gained initial access by compromising web servers and edge devices.

Google said it did not directly observe data being stolen during the operation it disrupted, but in at least one case the Gridtide malware was installed on systems containing sensitive personal information, including names, phone numbers, dates and places of birth, and national or voter identification numbers.

Researchers said such targeting was consistent with broader cyberespionage operations focused on telecommunications networks, which can allow intruders to identify and track individuals or monitor communications. Similar campaigns in the past have enabled access to call data records, SMS messages and lawful interception systems used by telecom operators, according to the report.

“The access UNC2814 achieved during this campaign would likely enable clandestine efforts to similarly surveil targets,” they added.

Google said it had seen no overlap between UNC2814 and the Chinese-linked espionage group known as Salt Typhoon, describing them as distinct operations that target different victims using different methods.

Google Threat Intelligence Group, Mandiant and other partners identified and disabled all known UNC2814 infrastructure, though they expect the group “will work hard to re-establish their global footprint.”

Beijing has not publicly commented on Google’s findings. China has repeatedly denied conducting cyberespionage operations abroad.

Earlier this month, Singapore authorities said another suspected China-linked group had carried out a targeted campaign against the country’s four main telecommunications operators. The group, tracked as UNC3886, gained unauthorized access to parts of telecom networks and, in one case, reached limited portions of critical systems.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/china-cyber-espionage-google-disrupt
如有侵权请联系:admin#unsafe.sh