Stock Markets February 25, 2026

Google dismantles long-running Chinese-linked cyber-espionage operation targeting 53 organizations

Company says UNC2814 - nicknamed Gallium - used Google Sheets and cloud resources to conduct global surveillance across at least 42 countries

By Ajmal Hussain GOOGL
Google dismantles long-running Chinese-linked cyber-espionage operation targeting 53 organizations
GOOGL

Google said it disrupted a Chinese-linked hacking group tracked as UNC2814 or "Gallium" that had access to at least 53 organizations in 42 countries and may have been active in additional nations. The company, working with unnamed partners, terminated cloud projects, disabled internet infrastructure and shut down accounts the group used to operate, including Google Sheets-based tooling the group leveraged to hide its activity. Google described the operation as a broad surveillance apparatus and said the activity is distinct from another campaign known as "Salt Typhoon."

Key Points

  • Google said it disrupted a Chinese-linked hacking group tracked as UNC2814 and nicknamed "Gallium," which had a nearly decade-long pattern of breaching government and telecom organizations.
  • The company confirmed access to 53 unnamed entities across 42 countries and identified potential access in at least 22 more countries at the time of disruption.
  • Google and unnamed partners terminated cloud projects, disabled internet infrastructure the group used, and disabled accounts used to access Google Sheets, which the attackers leveraged to mask their activity.

Google announced on Wednesday that it disrupted a long-running cyber-espionage operation linked to China, impacting at least 53 organizations across 42 countries. The hacking cluster, which Google tracks as UNC2814 and refers to as "Gallium," has a nearly decade-long track record of intrusions into government entities and telecommunications providers, according to the company.

"This was a vast surveillance apparatus used to spy on people and organizations throughout the world," John Hultquist, chief analyst with Google Threat Intelligence Group, said.

Google described a coordinated takedown that included terminating Google Cloud projects under the attackers' control, identifying and disabling internet infrastructure the group relied upon, and disabling accounts the group used to access Google Sheets. The company said the attackers used Google Sheets to conduct targeting and to extract data because the platform helped them blend into routine network traffic. Google emphasized that this technique was not a compromise of any Google product.

Charlie Snyder, senior manager of Google Threat Intelligence Group, said the firm confirmed the group had gained access to 53 unnamed entities spread across the 42 countries. At the time Google disrupted the activity, Snyder added, the group had potential access in at least 22 additional countries. He declined to name the organizations that were compromised.

In one documented instance, the attackers installed a backdoor Google calls "GRIDTIDE" on a system that contained extensive personally identifying information, Snyder said. The system reportedly held full names, phone numbers, dates of birth, places of birth, voter ID entries and national ID numbers. Google characterized this pattern of targeting as consistent with operations intended to identify and follow specific individuals.

The company also noted that similar campaigns have been used for a broader set of surveillance actions. "Similar campaigns have been used to exfiltrate call data records, monitor SMS messages, and to even monitor targeted individuals through the telco's lawful intercept capabilities," the company said.

The Chinese Embassy responded through spokesperson Liu Pengyu, saying: "cyber security is a common challenge faced by all countries and should be addressed through dialogue and cooperation. China consistently opposes and combats hacking activities in accordance with the law, and at the same time firmly rejects attempts to use cyber security issues to smear or slander China."

Google also clarified that the activity it disrupted is separate from another high-profile, telecom-focused campaign tracked as "Salt Typhoon." That other campaign - which the U.S. government has linked to China - targeted hundreds of U.S. organizations as well as prominent U.S. political figures, Google said.


This announcement highlights the ways adversaries can repurpose widely used collaboration tools and cloud resources to evade detection. The incident underscores threats to telecommunications providers and government systems in particular, and reflects the operational trade-offs attackers make to hide malicious traffic within benign-looking services.

Risks

  • Use of mainstream collaboration tools to mask malicious activity - this technique can make detection harder for networks and security teams, affecting cloud and SaaS providers as well as corporate IT defenses.
  • Compromise of telecom systems and government databases - the targeting of telcos and government entities raises the risk of large-scale exposure of personal and call data, with potential implications for privacy and national security.
  • Uncertainty about the identities of the 53 affected organizations - because the compromised entities were not named, the scope of reputational and operational impact across sectors remains unclear, particularly for telecommunications and public-sector institutions.

More from Stock Markets

Premarket Movers: Nvidia Inches Up as Several U.S. Stocks React to Earnings and Forecasts Feb 25, 2026 Morgan Stanley Highlights European Ad Agencies With AI Strengths Feb 25, 2026 Novartis to add Texas radioligand therapy plant, expanding U.S. manufacturing network Feb 25, 2026 Driven Brands shares plunge after company delays results and moves to restate past financials Feb 25, 2026 Goldman Says Near-Term AI Disruption Fears Hard to Refute as Capex Drives Market Volatility Feb 25, 2026