UNC2814 Campaign Targeting Telecom and Government Networks
Summary
Hide ▲
Show ▼
A suspected Chinese threat actor, tracked as UNC2814, has conducted a global espionage campaign since at least 2017, targeting telecom and government networks. The campaign has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more. The actor deployed a new C-based backdoor named GRIDTIDE, which abuses the Google Sheets API for command-and-control (C2) operations. The initial access vector is unknown, but previous exploits involved flaws in web servers and edge systems. GRIDTIDE performs host reconnaissance and supports commands for executing bash commands, uploading, and downloading files. Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects and disabling known infrastructure. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. Google expects UNC2814 to resume activity using new infrastructure in the near future.
Timeline
-
25.02.2026 19:00 3 articles · 1d ago
UNC2814 Campaign Disrupted by Google, Mandiant, and Partners
Google’s Threat Intelligence Group (GTIG), Mandiant, and partners disrupted a global espionage campaign attributed to the suspected Chinese threat actor UNC2814. The campaign, active since at least 2017, targeted telecom and government networks, impacting 53 organizations in 42 countries. The actor deployed the GRIDTIDE backdoor, which abuses the Google Sheets API for C2 operations. The disruption involved terminating associated Google Cloud projects, disabling known infrastructure, revoking Google Sheets API access, and sinkholing current and historical domains. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. The article also notes that GRIDTIDE uses a cell-based polling mechanism for C2 communication, with specific roles assigned to certain spreadsheet cells. UNC2814 leverages living-off-the-land (LotL) binaries for reconnaissance, privilege escalation, and persistence, and deploys SoftEther VPN Bridge to establish outbound encrypted connections. GRIDTIDE is dropped on endpoints containing personally identifiable information (PII), and no data exfiltration was observed during the campaign.
Show sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
Information Snippets
-
The campaign has been active since at least 2023 and has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more.
First reported: 25.02.2026 19:003 sources, 3 articlesShow sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
The initial access vector is unknown, but the threat actor has previously exploited flaws in web servers and edge systems.
First reported: 25.02.2026 19:003 sources, 3 articlesShow sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
The GRIDTIDE backdoor authenticates to a Google Service Account using a hardcoded private key and performs host reconnaissance, collecting details such as username, hostname, OS details, local IP, locale, and timezone.
First reported: 25.02.2026 19:003 sources, 3 articlesShow sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
GRIDTIDE uses the Google Sheets API for C2 operations, with commands supported for executing bash commands, uploading, and downloading files.
First reported: 25.02.2026 19:003 sources, 3 articlesShow sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects, disabling known infrastructure, revoking Google Sheets API access, and sinkholing current and historical domains.
First reported: 25.02.2026 19:003 sources, 3 articlesShow sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
Google expects UNC2814 to resume activity using new infrastructure in the near future.
First reported: 25.02.2026 19:003 sources, 3 articlesShow sources
- Chinese cyberspies breached dozens of telecom firms, govt agencies — www.bleepingcomputer.com — 25.02.2026 19:00
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
UNC2814 has been tracked by Google since 2017.
First reported: 25.02.2026 19:462 sources, 2 articlesShow sources
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
GRIDTIDE uses a cell-based polling mechanism for C2 communication, with specific roles assigned to certain spreadsheet cells.
First reported: 25.02.2026 19:462 sources, 2 articlesShow sources
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
UNC2814 leverages living-off-the-land (LotL) binaries for reconnaissance, privilege escalation, and persistence.
First reported: 25.02.2026 19:462 sources, 2 articlesShow sources
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
The threat actor deploys SoftEther VPN Bridge to establish outbound encrypted connections.
First reported: 25.02.2026 19:462 sources, 2 articlesShow sources
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
GRIDTIDE is dropped on endpoints containing personally identifiable information (PII).
First reported: 25.02.2026 19:462 sources, 2 articlesShow sources
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
Google did not observe any data exfiltration during the campaign.
First reported: 25.02.2026 19:462 sources, 2 articlesShow sources
- Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries — thehackernews.com — 25.02.2026 19:46
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
-
UNC2814 has been active since 2017, according to Google's tracking.
First reported: 26.02.2026 14:091 source, 1 articleShow sources
- Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Global Hacking Campaign — www.infosecurity-magazine.com — 26.02.2026 14:09
Similar Happenings
Increase in Stealthy Persistence and Evasion Techniques for Data Extortion
Threat actors are increasingly favoring stealthy persistence and evasion techniques to silently exfiltrate data for extortion. According to Picus Security's Red Report 2026, attackers are blending in with legitimate traffic and operating through trusted processes to stay hidden from network defenders. Process injection remains the top malicious technique, enabling attackers to hide malicious code inside legitimate applications. Additionally, attackers are routing command-and-control (C2) traffic through high-reputation services like OpenAI and AWS to evade detection. The use of 'data encrypted for impact' has dropped by 38% annually, indicating a shift towards silent data exfiltration. The report also highlights sophisticated evasion techniques such as LummaC2 infostealer malware, which uses trigonometry to detect sandbox environments and avoid detonation. Virtualization/sandbox evasion is now the fourth most prevalent MITRE ATT&CK technique observed.
PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign
Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025. The campaign delivered the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. The campaign highlights the increasing use of mobile devices as prime targets due to their poor protection and monitoring. Additionally, the Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of new cyber attacks targeting its defense forces with malware known as PLUGGYAPE between October and December 2025. The threat actor is believed to be active since at least April 2024. The malware is written in Python and establishes communication with a remote server over WebSocket or Message Queuing Telemetry Transport (MQTT). The command-and-control (C2) addresses are retrieved from external paste services such as rentry[.]co and pastebin[.]com, where they are stored in base64-encoded form.
Flax Typhoon APT Group Exploits ArcGIS for Persistent Access
The Flax Typhoon APT group, also tracked as Ethereal Panda and RedJuliett, exploited a legitimate ArcGIS application to establish a persistent backdoor for over a year. The attack involved modifying the ArcGIS server’s Java server object extension (SOE) to function as a web shell, enabling command execution, lateral movement, and data exfiltration. The malicious SOE persisted even after remediation and patching, highlighting the need for proactive threat hunting and treating all public-facing applications as high-risk assets. The group targeted a public-facing ArcGIS server connected to an internal server, compromising a portal administrator account and deploying a malicious SOE. They used a base64-encoded payload and a hardcoded key to execute commands and upload a renamed SoftEther VPN executable for long-term access. The attack targeted IT staff workstations within the scanned subnet, demonstrating the potential for significant operational disruption and data exposure. The attackers used a public-facing ArcGIS server connected to a private, internal ArcGIS server for backend computations, a common default configuration. They sent disguised commands to the portal server, creating a hidden system directory that became Flax Typhoon's private workspace. The attackers ensured the compromised component was included in system backups, turning the organization's own recovery plan into a guaranteed method of reinfection. ReliaQuest worked with the customer organization and Esri to fully evict Flax Typhoon actors from the environment, which included rebuilding the entire server stack and deploying custom detections for the threat activity. ReliaQuest urged organizations to treat all public-facing applications as high-risk assets and recommended security teams audit and harden such applications. The researchers also highlighted the need for behavioral analytics to complement signature-based detection, as Flax Typhoon did not use any malware or known malicious files. Strong credential hygiene was emphasized, noting that a weak administrator password gave the attackers a foothold in the organization's network. ReliaQuest recommended implementing multifactor authentication and practicing the principle of least privilege to enhance security. The ArcGIS geographic information system (GIS) is developed by Esri and supports server object extensions (SOE) that can extend basic functionality. The software is used by municipalities, utilities, and infrastructure operators to manage spatial and geographic data through maps. Researchers at cybersecurity company ReliaQuest have moderate confidence that the threat actor is Flax Typhoon. The attackers used valid administrator credentials to log into a public-facing ArcGIS server linked to a private, internal ArcGIS server. The malicious SOE accepted base64-encoded commands through a REST API parameter (layer) and executed them on the internal ArcGIS server. The exchange was protected by a hardcoded secret key, ensuring only the attackers had access to this backdoor. The attackers downloaded and installed SoftEther VPN Bridge, registering it as a Windows service that started automatically. The VPN established an outbound HTTPS tunnel to the attacker's server at 172.86.113[.]142, linking the victim's internal network to the threat actor's machine. The VPN used normal HTTPS traffic on port 443, blending with legitimate traffic, and remained active even if the SOE was detected and deleted. The attackers scanned the local network, moved laterally, accessed internal hosts, dumped credentials, or exfiltrated data using the VPN connection. The attackers targeted two workstations belonging to the target organization's IT staff, attempting to dump the Security Account Manager (SAM) database, security registry keys, and LSA secrets. Flax Typhoon is known for espionage campaigns to establish long-term, stealthy access through legitimate software. The FBI linked Flax Typhoon to the massive "Raptor Train" botnet, impacting the U.S. The Treasury's Office of Foreign Assets Control (OFAC) sanctioned companies that supported the state-sponsored hackers. Esri confirmed this is the first time an SOE has been used this way and will update their documentation to warn users of the risk of malicious SOEs. The attackers used the JavaSimpleRESTSOE ArcGIS extension to invoke a REST operation to run commands on the internal server via the public portal. The attackers specifically targeted two workstations belonging to IT personnel to obtain credentials and further burrow into the network. The attackers reset the password of the administrative account.
WeepSteel Malware Deployed via Sitecore Zero-Day Exploit
Threat actors have exploited a zero-day vulnerability in Sitecore Experience Manager (XM) and Experience Platform (XP) to deliver WeepSteel malware. The flaw, tracked as CVE-2025-53690, affects versions prior to 9.0 and was exploited using a sample machine key from outdated deployment guides. The attack involved ViewState deserialization, internal reconnaissance, and the deployment of various open-source tools for persistence and lateral movement. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch the vulnerability by September 25, 2025. The vulnerability has a CVSS score of 9.0, indicating critical severity. The China-linked threat group Ink Dragon has been observed turning misconfigured servers in European government networks into relay nodes to hide its cyber-espionage activity. Ink Dragon probes public-facing websites for weaknesses, including configuration issues in Microsoft's IIS web server and SharePoint. Once a foothold is established, the group moves quietly through the environment, collecting credentials and using Remote Desktop for lateral movement. Ink Dragon maps the environment in detail, controls policy settings, and deploys long-term access tools across high-value systems. The group uses compromised organizations to support operations elsewhere, deploying a customized IIS-based module to turn public-facing servers into relay points. Ink Dragon has updated its tooling, including a new version of the FinalDraft backdoor built for long-term access and to blend into Microsoft cloud activity. A second China-linked group, RudePanda, has entered some of the same European government networks and exploited the same exposed server vulnerability. A threat actor likely aligned with China, tracked as UAT-8837, has been targeting critical infrastructure sectors in North America since at least last year. UAT-8837 is primarily tasked with obtaining initial access to high-value organizations. The group deploys open-source tools to harvest sensitive information such as credentials, security configurations, and domain and Active Directory (AD) information. UAT-8837 exploits a critical zero-day vulnerability in Sitecore (CVE-2025-53690, CVSS score: 9.0) to obtain initial access. The group disables RestrictedAdmin for Remote Desktop Protocol (RDP) to ensure credentials and other user resources aren't exposed to compromised remote hosts. UAT-8837 downloads several artifacts including GoTokenTheft, EarthWorm, DWAgent, SharpHound, Impacket, GoExec, Rubeus, and Certipy to enable post-exploitation. The group exfiltrated DLL-based shared libraries related to the victim's products, raising the possibility of future trojanization and supply chain compromises.
Amazon Disrupts GRU-Affiliated APT44 Campaign Targeting Critical Infrastructure
Amazon has disrupted a years-long Russian state-sponsored campaign targeting Western critical infrastructure, including energy sector organizations and cloud-hosted network infrastructure. The campaign, attributed to the GRU-affiliated APT44 group, initially leveraged vulnerabilities in WatchGuard Firebox and XTM, Atlassian Confluence, and Veeam to gain initial access. However, starting in 2025, APT44 shifted its tactics to target misconfigured network edge devices, reducing their exposure and resource expenditure. The group targeted enterprise routers, VPN concentrators, network management appliances, and cloud-based project management systems to harvest credentials and establish persistent access. Amazon's intervention led to the disruption of the campaign, highlighting the ongoing threat posed by state-sponsored cyber actors. APT44, also known as FROZENBARENTS, Sandworm, Seashell Blizzard, and Voodoo Bear, has been active since at least 2021. The group exploited vulnerabilities in WatchGuard Firebox and XTM (CVE-2022-26318), Atlassian Confluence (CVE-2021-26084, CVE-2023-22518), and Veeam (CVE-2023-27532) to compromise network edge devices. The campaign involved credential replay attacks and targeted energy, technology/cloud services, and telecom service providers across North America, Western and Eastern Europe, and the Middle East. Amazon's threat intelligence team identified and notified affected customers, disrupting active threat actor operations. Additionally, APT28, another GRU-affiliated group, has been conducting a sustained credential-harvesting campaign targeting users of UKR[.]net, a webmail and news service popular in Ukraine. The campaign, observed between June 2024 and April 2025, involves deploying UKR[.]net-themed login pages on legitimate services like Mocky to entice recipients into entering their credentials and 2FA codes. Links to these pages are embedded within PDF documents distributed via phishing emails, often shortened using services like tiny[.]cc or tinyurl[.]com. In some cases, APT28 uses subdomains created on platforms like Blogger (*.blogspot[.]com) to launch a two-tier redirection chain leading to the credential harvesting page. The campaign is part of a broader set of phishing and credential theft operations targeting various institutions in pursuit of Russia's strategic objectives. APT28's recent campaign targeted Turkish renewable energy scientists with a climate change policy document from a real Middle Eastern think tank. The group used phishing emails themed to match their intended targets and written in the targets' native tongues. Victims were redirected to a login page mimicking a legitimate online service after following a link in a phishing email. APT28 used regular hosted services rather than custom tools and infrastructure for their attacks. The targets included an IT integrator based in Uzbekistan, a European think tank, a military organization in North Macedonia, and scientists and researchers associated with a Turkish energy and nuclear research organization. The campaign was highly selective and consistent with GRU collection priorities, aligning with geopolitical, military, or strategic intelligence objectives. APT28 has been targeting organizations associated with energy research, defense collaboration, and government communication in a new credential-harvesting campaign. The group used phishing pages impersonating Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Victims were redirected to legitimate domains after entering their credentials. APT28 relied heavily on free hosting and tunneling services such as Webhook.site, InfinityFree, Byet Internet Services, and Ngrok to host phishing content, capture user data, and manage redirections. In February 2025, APT28 deployed a Microsoft OWA phishing page and used the ShortURL link-shortening service for the first-stage redirection. The group employed a webhook relying on HTML to load a PDF lure document in the browser for two seconds before redirecting the victim to a second webhook hosting the spoofed OWA login page. In July, APT28 deployed a spoofed OWA login portal containing Turkish-language text and targeting Turkish scientists and researchers. In June, APT28 deployed a spoofed Sophos VPN password reset page hosted on InfinityFree infrastructure. In September, APT28 hosted two spoofed OWA expired password pages on an InfinityFree domain. In April, Recorded Future discovered a spoofed Google password reset page in Portuguese, hosted on a free apex domain from Byet Internet Services. APT28 abused Ngrok's free service to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. APT28's ability to adapt its infrastructure and rebrand credential-harvesting pages suggests it will continue to abuse free hosting, tunneling, and link-shortening services to reduce operational costs and obscure attribution. Recently, APT28 exploited CVE-2026-21509, a recently patched vulnerability in multiple versions of Microsoft Office. The attacks involved malicious DOC files themed around EU COREPER consultations in Ukraine and impersonated the Ukrainian Hydrometeorological Center. The malicious document triggers a WebDAV-based download chain that installs malware via COM hijacking, a malicious DLL (EhStoreShell.dll), shellcode hidden in an image file (SplashScreen.png), and a scheduled task (OneDriveHealth). The scheduled task execution leads to the termination and restart of the explorer.exe process, ensuring the loading of the EhStoreShell.dll file. This DLL executes shellcode from the image file, which launches the COVENANT software (framework) on the computer. COVENANT uses the Filen (filen.io) cloud storage service for command-and-control (C2) operations. APT28 used three more documents in attacks against various EU-based organizations, indicating that the campaign extends beyond Ukraine.