Stock Markets February 25, 2026

Google dismantles long-running Chinese-linked cyber-espionage operation targeting 53 organizations

Company says UNC2814 - nicknamed Gallium - used Google Sheets and cloud resources to conduct global surveillance across at least 42 countries

By Ajmal Hussain GOOGL
Google dismantles long-running Chinese-linked cyber-espionage operation targeting 53 organizations
GOOGL

Google said it disrupted a Chinese-linked hacking group tracked as UNC2814 or "Gallium" that had access to at least 53 organizations in 42 countries and may have been active in additional nations. The company, working with unnamed partners, terminated cloud projects, disabled internet infrastructure and shut down accounts the group used to operate, including Google Sheets-based tooling the group leveraged to hide its activity. Google described the operation as a broad surveillance apparatus and said the activity is distinct from another campaign known as "Salt Typhoon."

Key Points

  • Google said it disrupted a Chinese-linked hacking group tracked as UNC2814 and nicknamed "Gallium," which had a nearly decade-long pattern of breaching government and telecom organizations.
  • The company confirmed access to 53 unnamed entities across 42 countries and identified potential access in at least 22 more countries at the time of disruption.
  • Google and unnamed partners terminated cloud projects, disabled internet infrastructure the group used, and disabled accounts used to access Google Sheets, which the attackers leveraged to mask their activity.

Google announced on Wednesday that it disrupted a long-running cyber-espionage operation linked to China, impacting at least 53 organizations across 42 countries. The hacking cluster, which Google tracks as UNC2814 and refers to as "Gallium," has a nearly decade-long track record of intrusions into government entities and telecommunications providers, according to the company.

"This was a vast surveillance apparatus used to spy on people and organizations throughout the world," John Hultquist, chief analyst with Google Threat Intelligence Group, said.

Google described a coordinated takedown that included terminating Google Cloud projects under the attackers' control, identifying and disabling internet infrastructure the group relied upon, and disabling accounts the group used to access Google Sheets. The company said the attackers used Google Sheets to conduct targeting and to extract data because the platform helped them blend into routine network traffic. Google emphasized that this technique was not a compromise of any Google product.

Charlie Snyder, senior manager of Google Threat Intelligence Group, said the firm confirmed the group had gained access to 53 unnamed entities spread across the 42 countries. At the time Google disrupted the activity, Snyder added, the group had potential access in at least 22 additional countries. He declined to name the organizations that were compromised.

In one documented instance, the attackers installed a backdoor Google calls "GRIDTIDE" on a system that contained extensive personally identifying information, Snyder said. The system reportedly held full names, phone numbers, dates of birth, places of birth, voter ID entries and national ID numbers. Google characterized this pattern of targeting as consistent with operations intended to identify and follow specific individuals.

The company also noted that similar campaigns have been used for a broader set of surveillance actions. "Similar campaigns have been used to exfiltrate call data records, monitor SMS messages, and to even monitor targeted individuals through the telco's lawful intercept capabilities," the company said.

The Chinese Embassy responded through spokesperson Liu Pengyu, saying: "cyber security is a common challenge faced by all countries and should be addressed through dialogue and cooperation. China consistently opposes and combats hacking activities in accordance with the law, and at the same time firmly rejects attempts to use cyber security issues to smear or slander China."

Google also clarified that the activity it disrupted is separate from another high-profile, telecom-focused campaign tracked as "Salt Typhoon." That other campaign - which the U.S. government has linked to China - targeted hundreds of U.S. organizations as well as prominent U.S. political figures, Google said.


This announcement highlights the ways adversaries can repurpose widely used collaboration tools and cloud resources to evade detection. The incident underscores threats to telecommunications providers and government systems in particular, and reflects the operational trade-offs attackers make to hide malicious traffic within benign-looking services.

Risks

  • Use of mainstream collaboration tools to mask malicious activity - this technique can make detection harder for networks and security teams, affecting cloud and SaaS providers as well as corporate IT defenses.
  • Compromise of telecom systems and government databases - the targeting of telcos and government entities raises the risk of large-scale exposure of personal and call data, with potential implications for privacy and national security.
  • Uncertainty about the identities of the 53 affected organizations - because the compromised entities were not named, the scope of reputational and operational impact across sectors remains unclear, particularly for telecommunications and public-sector institutions.

More from Stock Markets

Intuitive Surgical’s Edge Anchored in Training Network, Former Executive Says Mar 26, 2026 Tel Aviv Stocks Close Lower as TA-35 Drops 1.10% Mar 26, 2026 Oslo market edges up as healthcare and utilities lead gains Mar 26, 2026 Truist Moves Airbnb to Hold as 2027 Outlook Supports Higher Valuation Mar 26, 2026 Moonshot AI Holds Early Talks on Hong Kong Listing, Pursues Larger Fundraise Mar 26, 2026