On February 25, 2026, Google and Mandiant announced the successful disruption of a global cyber espionage campaign conducted by UNC2814, a sophisticated threat actor with suspected links to the People's Republic of China (PRC). The campaign, active since at least 2017, utilized a novel backdoor named GRIDTIDE that employed the Google Sheets API for command and control (C2), enabling it to evade detection for years. The operation compromised at least 53 organizations across 42 countries, with a primary focus on telecommunications and government entities. The joint takedown involved a coordinated effort to dismantle the actor's infrastructure, though UNC2814 is expected to attempt to rebuild its capabilities.
The threat actor, tracked as UNC2814, has demonstrated a high level of operational security and sophistication, with no observed overlap with other known Chinese APT groups. The campaign's primary goal was long-term intelligence gathering. The main targets were government and telecommunications organizations in Africa, Asia, and the Americas, suggesting a strategic focus on geopolitical and economic intelligence.
The core of the operation was the GRIDTIDE backdoor, a custom malware written in C. Its most innovative feature was its C2 mechanism. By using the legitimate Google Sheets API, attackers could issue commands and exfiltrate data without generating suspicious network traffic that would typically be flagged by security solutions. This living-off-the-trusted-land technique highlights a growing trend of adversaries abusing legitimate cloud services to mask their activities.
Initial Access: While the specific initial access vector for all intrusions remains under investigation, UNC2814 has a known history of exploiting vulnerabilities in public-facing web servers and other edge network systems, a common tactic mapped to T1190 - Exploit Public-Facing Application.
Execution & Persistence: Once inside a network, the attackers established persistence for the GRIDTIDE backdoor by creating a systemd service. This was achieved by creating a service file at /etc/systemd/system/xapt.service, a technique identified as T1543.002 - Create or Modify System Process: Systemd Service. The backdoor itself would then be executed with system-level privileges.
Command and Control: The C2 mechanism is the most notable aspect of this campaign. GRIDTIDE communicated via the Google Sheets API, a form of T1102 - Web Service.
A1 of a specific Google Sheet for new commands.V1.Lateral Movement: The threat actor used service accounts to move laterally within compromised networks via T1021.004 - Remote Services: SSH. This allowed them to pivot from the initial point of entry to other high-value systems while using legitimate credentials and protocols to evade detection.
The impact of this campaign is significant due to its longevity, scale, and the nature of the targeted organizations. By compromising telecommunications providers and government agencies for years, UNC2814 likely gained access to vast amounts of sensitive data, including communications records, government documents, and intellectual property. The long-term persistence within these networks suggests a deeply entrenched intelligence-gathering operation. For the 53 confirmed victim organizations, the breach represents a severe compromise of security and trust, necessitating extensive and costly incident response, forensic analysis, and system remediation efforts to ensure the complete eviction of the threat actor.
Security teams should hunt for the following patterns to detect potential GRIDTIDE or similar activity:
| Type | Value | Description |
|---|---|---|
| API Endpoint | sheets.googleapis.com |
Monitor for anomalous or high-frequency API calls from servers, especially those not expected to interact with Google Sheets. |
| User Agent | Google-API-C++ |
While potentially legitimate, look for this user agent from unexpected sources or in conjunction with other suspicious indicators. |
| File Path | /etc/systemd/system/xapt.service |
Monitor for the creation of this specific service file or other new, unrecognized systemd services. |
| Network Traffic Pattern | Outbound connections to sheets.googleapis.com on port 443 |
Scrutinize TLS traffic to this endpoint from servers, focusing on unusual data volumes or connection frequencies. |
Detecting this type of activity requires a multi-layered approach that goes beyond traditional network signatures.
Cloud API Monitoring./etc/systemd/system/) can be highly effective. This relates to D3FEND's D3-PA - Process Analysis.sheets.googleapis.com from non-standard clients.Organizations should implement the following controls to defend against this and similar threats:
D3-OTF - Outbound Traffic Filtering.Restrict access to cloud APIs and services from server environments where it is not explicitly required for business operations.
Monitor and control the usage of service accounts, especially for interactive logons and remote access like SSH.
To counter the GRIDTIDE backdoor's C2 method, implement strict outbound traffic filtering on server subnets. Specifically, create firewall rules that deny all outbound connections to sheets.googleapis.com and other non-essential Google API endpoints by default. An allowlist should be created for specific servers that have a legitimate business need to access these services. This forces adversary traffic into monitored and controlled channels, preventing backdoors like GRIDTIDE from establishing C2. This should be coupled with TLS inspection where possible to analyze the content of the API calls, further enhancing detection capabilities for malicious use of legitimate services.
To detect GRIDTIDE's persistence mechanism, deploy an EDR solution capable of deep process analysis on Linux servers. Configure detection rules to specifically monitor for and alert on the creation of new files within the /etc/systemd/system/ directory. Establish a baseline of known-good services and alert on any deviation. Furthermore, monitor for processes that make network connections to sheets.googleapis.com. A server process that has no legitimate reason to interact with Google Sheets suddenly initiating such connections is a strong indicator of compromise. This proactive monitoring directly targets the TTPs used by UNC2814 to establish a foothold.
To address UNC2814's lateral movement via SSH with service accounts, enhance account monitoring. Implement SIEM rules to alert on any interactive logon using a service account. These accounts should typically only be used by applications and services, not for remote shell access. Correlate SSH authentication logs (e.g., from /var/log/auth.log on Linux) with a list of designated service accounts. Any successful SSH login by an account on this list should trigger a high-priority security alert. This helps detect the misuse of legitimate credentials for lateral movement, a key part of the UNC2814 playbook.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats