- Home
- News
- Articles+
- Aerospace
- Artificial Intelligence
- Agriculture
- Alternate Dispute Resolution
- Arbitration & Mediation
- Banking and Finance
- Bankruptcy
- Book Review
- Bribery & Corruption
- Commercial Litigation
- Competition Law
- Conference Reports
- Consumer Products
- Contract
- Corporate Governance
- Corporate Law
- Covid-19
- Cryptocurrency
- Cybersecurity
- Data Protection
- Defence
- Digital Economy
- E-commerce
- Employment Law
- Energy and Natural Resources
- Entertainment and Sports Law
- Environmental Law
- Environmental, Social, and Governance
- Foreign Direct Investment
- Food and Beverage
- Gaming
- Health Care
- IBC Diaries
- In Focus
- Inclusion & Diversity
- Insurance Law
- Intellectual Property
- International Law
- IP & Tech Era
- Know the Law
- Labour Laws
- Law & Policy and Regulation
- Litigation
- Litigation Funding
- Manufacturing
- Mergers & Acquisitions
- NFTs
- Privacy
- Private Equity
- Project Finance
- Real Estate
- Risk and Compliance
- Student Corner
- Take On Board
- Tax
- Technology Media and Telecom
- Tributes
- Viewpoint
- Zoom In
- Law Firms
- In-House
- Rankings
- E-Magazine
- Legal Era TV
- Events
- Middle East
- Africa
- News
- Articles
- Aerospace
- Artificial Intelligence
- Agriculture
- Alternate Dispute Resolution
- Arbitration & Mediation
- Banking and Finance
- Bankruptcy
- Book Review
- Bribery & Corruption
- Commercial Litigation
- Competition Law
- Conference Reports
- Consumer Products
- Contract
- Corporate Governance
- Corporate Law
- Covid-19
- Cryptocurrency
- Cybersecurity
- Data Protection
- Defence
- Digital Economy
- E-commerce
- Employment Law
- Energy and Natural Resources
- Entertainment and Sports Law
- Environmental Law
- Environmental, Social, and Governance
- Foreign Direct Investment
- Food and Beverage
- Gaming
- Health Care
- IBC Diaries
- In Focus
- Inclusion & Diversity
- Insurance Law
- Intellectual Property
- International Law
- IP & Tech Era
- Know the Law
- Labour Laws
- Law & Policy and Regulation
- Litigation
- Litigation Funding
- Manufacturing
- Mergers & Acquisitions
- NFTs
- Privacy
- Private Equity
- Project Finance
- Real Estate
- Risk and Compliance
- Student Corner
- Take On Board
- Tax
- Technology Media and Telecom
- Tributes
- Viewpoint
- Zoom In
- Law Firms
- In-House
- Rankings
- E-Magazine
- Legal Era TV
- Events
- Middle East
- Africa
Google disrupts Chinese-linked hackers that attacked 53 groups globally
Google disrupts Chinese-linked hackers that attacked 53 groups globally
The hacking group, tracked as UNC2814 and ‘Gallium’ has a nearly decade-long history of penetrating government organizations and telecommunications companies, the company said in findings shared exclusively with Reuters
Google disrupted a Chinese-linked hacking group that breached at least 53 organizations across 42 countries, the company said.
The hacking group, tracked as UNC2814 and ‘Gallium’ has a nearly decade-long history of penetrating government organizations and telecommunications companies, the company said in findings shared exclusively with Reuters.
“This was a vast surveillance apparatus used to spy on people and organizations throughout the world,” John Hultquist, chief analyst with Google Threat Intelligence Group, said.
Google and unnamed partners terminated Google Cloud projects controlled by the hacking group, identified and disabled internet infrastructure it was using and disabled accounts the group used to access Google Sheets, which it used to carry out its targeting and data theft operations.
Using Google Sheets allowed the group to evade detection and blend into normal network traffic and was not a compromise of any Google product, the company added.
Charley Snyder, senior manager of Google Threat Intelligence Group, said that the group had confirmed access to 53 unnamed entities across the 42 countries, with potential access in at least 22 more countries at the time of disruption.
Snyder declined to identify the compromised entities, but said in one case the group had installed a backdoor Google calls “GRIDTIDE” on a system containing full names, phone numbers, dates of birth, places of birth, voter IDs and national ID numbers.
The targeting is consistent with efforts to identify and track select targets, the company said. “Similar campaigns have been used to exfiltrate call data records, monitor SMS messages, and to even monitor targeted individuals through the telco’s lawful intercept capabilities.”
Chinese Embassy spokesperson Liu Pengyu said in a statement that "Cyber security is a common challenge faced by all countries and should be addressed through dialogue and cooperation.
China consistently opposes and combats hacking activities in accordance with the law, and at the same time firmly rejects attempts to use cyber security issues to smear or slander China."
The activity is distinct from separate high-profile, telecommunications-focused Chinese hacking activity tracked as “Salt Typhoon,” Google said. That campaign, which the U.S. government has linked to China, targeted hundreds of U.S. organizations and prominent U.S. political figures.



