Google & Mandiant Dismantle Global Chinese Spy Network Using Novel "GRIDTIDE" Backdoor

Google and Mandiant Disrupt Long-Running Chinese Espionage Campaign by UNC2814 Leveraging Google Sheets for C2

HIGH
February 25, 2026
5m read
Threat ActorCyberattackThreat Intelligence

Related Entities

Threat Actors

UNC2814

Organizations

Products & Tech

Google Sheets API

Other

GRIDTIDE

Full Report

Executive Summary

On February 25, 2026, Google and Mandiant announced the successful disruption of a global cyber espionage campaign conducted by UNC2814, a sophisticated threat actor with suspected links to the People's Republic of China (PRC). The campaign, active since at least 2017, utilized a novel backdoor named GRIDTIDE that employed the Google Sheets API for command and control (C2), enabling it to evade detection for years. The operation compromised at least 53 organizations across 42 countries, with a primary focus on telecommunications and government entities. The joint takedown involved a coordinated effort to dismantle the actor's infrastructure, though UNC2814 is expected to attempt to rebuild its capabilities.

Threat Overview

The threat actor, tracked as UNC2814, has demonstrated a high level of operational security and sophistication, with no observed overlap with other known Chinese APT groups. The campaign's primary goal was long-term intelligence gathering. The main targets were government and telecommunications organizations in Africa, Asia, and the Americas, suggesting a strategic focus on geopolitical and economic intelligence.

The core of the operation was the GRIDTIDE backdoor, a custom malware written in C. Its most innovative feature was its C2 mechanism. By using the legitimate Google Sheets API, attackers could issue commands and exfiltrate data without generating suspicious network traffic that would typically be flagged by security solutions. This living-off-the-trusted-land technique highlights a growing trend of adversaries abusing legitimate cloud services to mask their activities.

Technical Analysis

Initial Access: While the specific initial access vector for all intrusions remains under investigation, UNC2814 has a known history of exploiting vulnerabilities in public-facing web servers and other edge network systems, a common tactic mapped to T1190 - Exploit Public-Facing Application.

Execution & Persistence: Once inside a network, the attackers established persistence for the GRIDTIDE backdoor by creating a systemd service. This was achieved by creating a service file at /etc/systemd/system/xapt.service, a technique identified as T1543.002 - Create or Modify System Process: Systemd Service. The backdoor itself would then be executed with system-level privileges.

Command and Control: The C2 mechanism is the most notable aspect of this campaign. GRIDTIDE communicated via the Google Sheets API, a form of T1102 - Web Service.

  1. The malware would periodically poll cell A1 of a specific Google Sheet for new commands.
  2. Victim metadata, such as hostname and user information, was written to cell V1.
  3. Other cells were used for staging data for exfiltration and receiving command output.
  4. All data transferred via the API was encoded using a URL-safe Base64 scheme to avoid detection by web filters.

Lateral Movement: The threat actor used service accounts to move laterally within compromised networks via T1021.004 - Remote Services: SSH. This allowed them to pivot from the initial point of entry to other high-value systems while using legitimate credentials and protocols to evade detection.

Impact Assessment

The impact of this campaign is significant due to its longevity, scale, and the nature of the targeted organizations. By compromising telecommunications providers and government agencies for years, UNC2814 likely gained access to vast amounts of sensitive data, including communications records, government documents, and intellectual property. The long-term persistence within these networks suggests a deeply entrenched intelligence-gathering operation. For the 53 confirmed victim organizations, the breach represents a severe compromise of security and trust, necessitating extensive and costly incident response, forensic analysis, and system remediation efforts to ensure the complete eviction of the threat actor.

Cyber Observables for Detection

Security teams should hunt for the following patterns to detect potential GRIDTIDE or similar activity:

Type Value Description
API Endpoint sheets.googleapis.com Monitor for anomalous or high-frequency API calls from servers, especially those not expected to interact with Google Sheets.
User Agent Google-API-C++ While potentially legitimate, look for this user agent from unexpected sources or in conjunction with other suspicious indicators.
File Path /etc/systemd/system/xapt.service Monitor for the creation of this specific service file or other new, unrecognized systemd services.
Network Traffic Pattern Outbound connections to sheets.googleapis.com on port 443 Scrutinize TLS traffic to this endpoint from servers, focusing on unusual data volumes or connection frequencies.

Detection & Response

Detecting this type of activity requires a multi-layered approach that goes beyond traditional network signatures.

  1. Cloud API Monitoring: Implement robust monitoring of all API traffic to and from cloud services like Google Workspace. Establish baselines for normal API usage and alert on deviations, such as servers unexpectedly communicating with the Google Sheets API. This aligns with the D3FEND technique Cloud API Monitoring.
  2. Endpoint Detection and Response (EDR): Deploy EDR solutions to monitor for suspicious process creation and persistence mechanisms. A rule to detect the creation of new systemd services (/etc/systemd/system/) can be highly effective. This relates to D3FEND's D3-PA - Process Analysis.
  3. Log Analysis: Correlate network logs with endpoint logs. Look for SSH logins using service accounts originating from unusual internal sources. Analyze web proxy and DNS logs for connections to sheets.googleapis.com from non-standard clients.

Mitigation

Organizations should implement the following controls to defend against this and similar threats:

  1. Restrict Outbound Traffic: Implement egress filtering to block or restrict access to cloud services and APIs that are not required for business operations. Deny access to personal Google accounts and other non-corporate cloud services from server segments. This is a form of D3FEND's D3-OTF - Outbound Traffic Filtering.
  2. Privileged Access Management (PAM): Strictly control the use of service accounts. Ensure they have the minimum necessary privileges and are monitored for anomalous activity. Limit where service accounts can log in from and disable interactive logon capabilities where possible.
  3. Application Control: Use application control solutions to prevent unauthorized software, including custom backdoors, from executing on servers.
  4. Patch Management: Maintain a rigorous patch management program to remediate vulnerabilities in public-facing applications, which are common initial access vectors for actors like UNC2814.

Timeline of Events

1
January 1, 2017
The UNC2814 espionage campaign is believed to have started its operations.
2
February 25, 2026
Google and Mandiant publicly announce the disruption of the UNC2814 campaign and its GRIDTIDE backdoor.
3
February 25, 2026
This article was published

MITRE ATT&CK Mitigations

Restrict access to cloud APIs and services from server environments where it is not explicitly required for business operations.

Monitor and control the usage of service accounts, especially for interactive logons and remote access like SSH.

Audit

M1047enterprise

Enable and review logs for cloud API usage, endpoint process creation, and remote service authentications.

D3FEND Defensive Countermeasures

To counter the GRIDTIDE backdoor's C2 method, implement strict outbound traffic filtering on server subnets. Specifically, create firewall rules that deny all outbound connections to sheets.googleapis.com and other non-essential Google API endpoints by default. An allowlist should be created for specific servers that have a legitimate business need to access these services. This forces adversary traffic into monitored and controlled channels, preventing backdoors like GRIDTIDE from establishing C2. This should be coupled with TLS inspection where possible to analyze the content of the API calls, further enhancing detection capabilities for malicious use of legitimate services.

To detect GRIDTIDE's persistence mechanism, deploy an EDR solution capable of deep process analysis on Linux servers. Configure detection rules to specifically monitor for and alert on the creation of new files within the /etc/systemd/system/ directory. Establish a baseline of known-good services and alert on any deviation. Furthermore, monitor for processes that make network connections to sheets.googleapis.com. A server process that has no legitimate reason to interact with Google Sheets suddenly initiating such connections is a strong indicator of compromise. This proactive monitoring directly targets the TTPs used by UNC2814 to establish a foothold.

To address UNC2814's lateral movement via SSH with service accounts, enhance account monitoring. Implement SIEM rules to alert on any interactive logon using a service account. These accounts should typically only be used by applications and services, not for remote shell access. Correlate SSH authentication logs (e.g., from /var/log/auth.log on Linux) with a list of designated service accounts. Any successful SSH login by an account on this list should trigger a high-priority security alert. This helps detect the misuse of legitimate credentials for lateral movement, a key part of the UNC2814 playbook.

Sources & References

Disrupting the GRIDTIDE Global Cyber Espionage Campaign
Google Cloud Blog (cloud.google.com) February 25, 2026
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
The Hacker News (thehackernews.com) February 25, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

UNC2814GRIDTIDECyber EspionageAPTGoogle SheetsC2Threat IntelligenceChina

📢 Share This Article

Help others stay informed about cybersecurity threats