Google and Partners Dismantle Chinese Espionage Campaign (UNC2814) Targeting Global Telecoms

Google Leads Takedown of Chinese State-Sponsored Group UNC2814 After Global Cyber-Espionage Campaign

HIGH
February 28, 2026
March 15, 2026
5m read
Threat ActorThreat IntelligenceCyberattack

Related Entities(initial)

Threat Actors

UNC2814

Organizations

Products & Tech

Google Sheets

Other

Full Report(when first published)

Executive Summary

Google's Threat Intelligence Group (GTIG), in collaboration with Mandiant and other partners, has taken significant action to disrupt a long-running, global cyber-espionage campaign attributed to the Chinese state-affiliated threat actor UNC2814. The campaign, active since at least 2017, has compromised a minimum of 53 organizations, primarily in the telecommunications and government sectors, across 42 countries. The group's primary objective is believed to be intelligence gathering. The disruption efforts included sinkholing the actor's command-and-control (C2) domains and disabling their abuse of Google Sheets as a covert C2 channel. Google has notified the identified victims and publicly shared IOCs to aid in broader defense efforts.


Threat Overview

UNC2814 is a sophisticated threat actor with a clear focus on strategic intelligence collection. Their targeting of telecommunication providers is a classic espionage tactic, as it provides access to a vast amount of communications data and a potential pathway into the networks of the providers' high-value customers.

  • Scale: The campaign's known scope is extensive, with 53 confirmed victim organizations in 42 countries spanning Central and South America, Africa, Europe, and Asia.
  • Targets: The primary targets are telecommunication companies and government entities.
  • Motive: Cyber-espionage, focused on monitoring communications and exfiltrating sensitive data.
  • TTPs: The group is notable for its use of legitimate cloud services for C2, a technique known as 'living off the cloud,' which helps their traffic blend in with normal enterprise activity.

Technical Analysis

The use of Google Sheets for C2 is a key technical aspect of this campaign, demonstrating the actor's efforts to evade network-based detection.

Attack Chain & TTPs

  1. Initial Access: The specific initial access vectors were not detailed in the reports, but for this type of actor, they typically include exploiting public-facing applications (T1190 - Exploit Public-Facing Application) or spearphishing (T1566 - Phishing).
  2. Execution & Persistence: Once inside a network, the actor deploys malware that establishes persistence on the compromised systems.
  3. Command and Control (T1102 - Web Service): The actor's malware used the Google Sheets API as its C2 channel. The malware would periodically connect to a specific, attacker-controlled Google Sheet to receive new commands and exfiltrate stolen data. This traffic is encrypted via HTTPS and directed to a legitimate Google domain (sheets.googleapis.com), making it extremely difficult to distinguish from legitimate business traffic without deep packet inspection or endpoint analysis.
  4. Collection (T1119 - Automated Collection): The malware would execute commands to collect data from compromised hosts and networks.
  5. Exfiltration (T1041 - Exfiltration Over C2 Channel): Collected data was likely sent back to the attackers through the same Google Sheets channel.

Disruption Efforts

  • Infrastructure Takedown: Google and its partners sinkholed the custom domains used by UNC2814 for other operational tasks.
  • C2 Disruption: Google blocked the attacker-controlled Google Sheets API and their associated C2 traffic, effectively severing the connection between the malware and its operators.
  • Victim Notification: Google directly notified the 53 identified victim organizations.
  • Intelligence Sharing: IOCs were publicly released to the security community.

Impact Assessment

The long-running nature of this campaign suggests a significant intelligence loss for the affected organizations and nations.

  • Strategic Espionage: The compromise of national telecommunication providers and government bodies can lead to the loss of state secrets, economic data, and sensitive diplomatic communications.
  • Widespread Surveillance: By compromising telecoms, UNC2814 could potentially monitor the communications of millions of individuals and businesses.
  • Long-Term Persistence: An actor with a seven-year operational history likely established deep and resilient access within victim networks, making full remediation a complex and costly challenge.

Detection & Response

Detecting the use of legitimate services for C2 is a major challenge for defenders.

Detection Strategies

  • Egress Traffic Analysis (D3-OTF: Outbound Traffic Filtering): While the destination (google.com) is legitimate, the pattern of traffic may be anomalous. Monitor for servers or workstations making regular, beacon-like connections to cloud storage or spreadsheet APIs. Legitimate use by a human is typically sporadic; automated malware C2 is often periodic (e.g., every 5 minutes).
  • Endpoint Analysis: Use EDR to look for non-browser processes (e.g., svchost.exe, powershell.exe, or an unknown binary) making API calls to sheets.googleapis.com.
  • SSL/TLS Inspection: Where possible and permissible by policy, decrypt outbound SSL/TLS traffic to inspect the content of API calls to services like Google Sheets, looking for suspicious commands or data structures.

Mitigation

  • Restrict Cloud Service Access (M1021 - Restrict Web-Based Content): For servers and systems that have no business reason to access public cloud services like Google Sheets, create firewall or proxy rules to deny access to those domains and APIs. This is a key part of an egress filtering strategy.
  • Application Allowlisting: Implement application allowlisting to prevent unauthorized or unknown malware from running on endpoints and servers.
  • Assume Breach Mentality: Given the stealth of actors like UNC2814, organizations, especially in targeted sectors, should assume they are compromised and actively hunt for threats within their networks rather than just trying to keep them out.

Timeline of Events

1
January 1, 2017
The UNC2814 cyber-espionage campaign is believed to have begun.
2
February 27, 2026
Google and partners announce the disruption of the campaign's infrastructure.
3
February 28, 2026
This article was published

Article Updates

March 15, 2026

Costa Rica attributes utility hack to UNC2814, leading to diplomatic dispute with China over evidence demands.

MITRE ATT&CK Mitigations

Implement strict egress filtering policies, especially for servers, to block access to unauthorized web services and cloud APIs.

Mapped D3FEND Techniques:

Use a web proxy or CASB to control which cloud applications users and systems are permitted to access.

Deploy EDR solutions capable of behavioral analysis to detect malicious processes making legitimate network connections.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The UNC2814 campaign's use of Google Sheets for C2 highlights the critical need for strict Outbound Traffic Filtering, especially on server networks. A default-deny egress policy should be the standard for servers. This means explicitly defining which external destinations and ports a server is allowed to communicate with for its business function (e.g., to access update repositories or specific partner APIs). All other outbound traffic should be blocked. For UNC2814, this would mean creating a rule that denies connections from production telecom servers to sheets.googleapis.com. While a blanket block might not be feasible in an enterprise environment with legitimate Google Workspace users, it is highly effective in server segments. This technique forces attackers to use pre-approved channels, making their C2 traffic much easier to spot, or prevents their C2 from functioning at all.

To detect C2 over legitimate services like Google Sheets, defenders must employ sophisticated Network Traffic Analysis. This goes beyond simple port/protocol monitoring. Security teams should use NDR tools or SIEM analytics to baseline normal traffic patterns and hunt for anomalies. For the UNC2814 activity, key indicators would be 'beaconing' behavior: a host making connections to sheets.googleapis.com at highly regular intervals (e.g., every 180 seconds) with similar data packet sizes. Another indicator is the 'user agent' string; malware often uses a non-standard or fixed user agent for its API calls, which differs from that used by common web browsers. By analyzing NetFlow, proxy logs, and DNS queries, and enriching this data with endpoint context (e.g., what process is making the connection), defenders can build high-fidelity alerts to uncover this type of hidden C2 channel, even when it's encrypted and destined for a trusted provider.

Sources & References(when first published)

Suspected Chinese Cyberespionage Operation Hits 53 Telecoms
BankInfoSecurity (bankinfosecurity.com) February 27, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

cyber-espionageAPTChinaC2living off the landGoogle Sheetstelecomtakedown

📢 Share This Article

Help others stay informed about cybersecurity threats