Google's Threat Intelligence Group (GTIG), in collaboration with Mandiant and other partners, has taken significant action to disrupt a long-running, global cyber-espionage campaign attributed to the Chinese state-affiliated threat actor UNC2814. The campaign, active since at least 2017, has compromised a minimum of 53 organizations, primarily in the telecommunications and government sectors, across 42 countries. The group's primary objective is believed to be intelligence gathering. The disruption efforts included sinkholing the actor's command-and-control (C2) domains and disabling their abuse of Google Sheets as a covert C2 channel. Google has notified the identified victims and publicly shared IOCs to aid in broader defense efforts.
UNC2814 is a sophisticated threat actor with a clear focus on strategic intelligence collection. Their targeting of telecommunication providers is a classic espionage tactic, as it provides access to a vast amount of communications data and a potential pathway into the networks of the providers' high-value customers.
The use of Google Sheets for C2 is a key technical aspect of this campaign, demonstrating the actor's efforts to evade network-based detection.
T1190 - Exploit Public-Facing Application) or spearphishing (T1566 - Phishing).T1102 - Web Service): The actor's malware used the Google Sheets API as its C2 channel. The malware would periodically connect to a specific, attacker-controlled Google Sheet to receive new commands and exfiltrate stolen data. This traffic is encrypted via HTTPS and directed to a legitimate Google domain (sheets.googleapis.com), making it extremely difficult to distinguish from legitimate business traffic without deep packet inspection or endpoint analysis.T1119 - Automated Collection): The malware would execute commands to collect data from compromised hosts and networks.T1041 - Exfiltration Over C2 Channel): Collected data was likely sent back to the attackers through the same Google Sheets channel.The long-running nature of this campaign suggests a significant intelligence loss for the affected organizations and nations.
Detecting the use of legitimate services for C2 is a major challenge for defenders.
D3-OTF: Outbound Traffic Filtering): While the destination (google.com) is legitimate, the pattern of traffic may be anomalous. Monitor for servers or workstations making regular, beacon-like connections to cloud storage or spreadsheet APIs. Legitimate use by a human is typically sporadic; automated malware C2 is often periodic (e.g., every 5 minutes).svchost.exe, powershell.exe, or an unknown binary) making API calls to sheets.googleapis.com.M1021 - Restrict Web-Based Content): For servers and systems that have no business reason to access public cloud services like Google Sheets, create firewall or proxy rules to deny access to those domains and APIs. This is a key part of an egress filtering strategy.Costa Rica attributes utility hack to UNC2814, leading to diplomatic dispute with China over evidence demands.
Implement strict egress filtering policies, especially for servers, to block access to unauthorized web services and cloud APIs.
Mapped D3FEND Techniques:
Use a web proxy or CASB to control which cloud applications users and systems are permitted to access.
Deploy EDR solutions capable of behavioral analysis to detect malicious processes making legitimate network connections.
The UNC2814 campaign's use of Google Sheets for C2 highlights the critical need for strict Outbound Traffic Filtering, especially on server networks. A default-deny egress policy should be the standard for servers. This means explicitly defining which external destinations and ports a server is allowed to communicate with for its business function (e.g., to access update repositories or specific partner APIs). All other outbound traffic should be blocked. For UNC2814, this would mean creating a rule that denies connections from production telecom servers to sheets.googleapis.com. While a blanket block might not be feasible in an enterprise environment with legitimate Google Workspace users, it is highly effective in server segments. This technique forces attackers to use pre-approved channels, making their C2 traffic much easier to spot, or prevents their C2 from functioning at all.
To detect C2 over legitimate services like Google Sheets, defenders must employ sophisticated Network Traffic Analysis. This goes beyond simple port/protocol monitoring. Security teams should use NDR tools or SIEM analytics to baseline normal traffic patterns and hunt for anomalies. For the UNC2814 activity, key indicators would be 'beaconing' behavior: a host making connections to sheets.googleapis.com at highly regular intervals (e.g., every 180 seconds) with similar data packet sizes. Another indicator is the 'user agent' string; malware often uses a non-standard or fixed user agent for its API calls, which differs from that used by common web browsers. By analyzing NetFlow, proxy logs, and DNS queries, and enriching this data with endpoint context (e.g., what process is making the connection), defenders can build high-fidelity alerts to uncover this type of hidden C2 channel, even when it's encrypted and destined for a trusted provider.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats