China’s State Hackers Hit 53 Orgs Globally — Google Disrupts UNC5221

China’s State Hackers Hit 53 Orgs Globally — Google Disrupts UNC5221

Oh, for fuck’s sake. Another day, another Chinese state-sponsored hacking group caught doing exactly what everyone with a security clearance and a pulse has been screaming about for the last decade. Google dropped the news on February 25th, 2026 that they’d disrupted a Chinese-linked threat actor — tracked internally as UNC5221 — that had successfully breached at least 53 organizations across 42 countries. Telecoms. Government bodies. Critical infrastructure operators. The usual suspects on the receiving end of a campaign that’s apparently been running for the better part of a decade.

And Google had to step in. Google. Because the victims sure as hell weren’t catching it themselves.

What Actually Happened

According to Reuters and SecurityWeek, Google and unnamed partners terminated Google Cloud projects being used as command-and-control infrastructure by UNC5221 and identified and disabled the internet infrastructure they were operating. The group has a nearly decade-long history of penetrating government bodies and telcos — primarily in the Americas, Asia, and Africa.

UNC5221 isn’t new. Google’s own Threat Intelligence Group has been tracking this crew through multiple campaigns. They were attributed to exploitation of CVE-2025-22457 in Ivanti devices back in early 2025, and before that they were burning Ivanti Connect Secure zero-days (CVE-2025-0282, CVE-2023-46805, CVE-2024-21887) like they were buying rounds at a bar. They’ve deployed a persistent malware ecosystem including something researchers call SPAWN — a collection of tools designed for long-term stealthy access, not smash-and-grab operations.

This is espionage. Quiet, patient, surgical espionage. And for a significant chunk of those 53 organizations, they had no idea.

Why This Should Make You Want to Flip a Table

Let me be very direct about what “53 organizations across 42 countries” means in practice. It means nation-state hackers were living rent-free inside telcos and government networks — reading emails, watching traffic, hoovering up credentials and strategic intelligence — and the discovery didn’t come from the victims’ own security teams. It came from a cloud provider noticing anomalous infrastructure use.

That’s the state of enterprise security in 2026, folks. Your billion-dollar telco with a 200-person IT department got caught by someone else’s threat hunting team. How’s that SOC investment looking now?

The business impact here isn’t a ransomware payment you can put a number on. It’s worse: it’s sustained intelligence collection. Strategic plans. Personnel data. Network topology. Negotiation positions. Communications between government officials and contractors. This stuff doesn’t show up on a breach notification letter to customers. It shows up six months later when a competitor somehow knows your bid price, or when a foreign government’s diplomatic position suspiciously aligns with your internal memos.

What Went Wrong — Let Me Count the Ways

Edge devices. Again. Same as always. I’ve been banging this drum since my post on why device IP addresses being publicly visible is a disaster waiting to happen. UNC5221’s entire playbook revolves around edge devices — VPN gateways, SSL terminators, network appliances — because those things sit on the perimeter, face the internet, run ancient firmware, and get patched approximately never.

The specific failure cascade goes like this:

  1. Edge appliance has a zero-day or n-day vulnerability (often an Ivanti product — and yes, Ivanti, I’m looking directly at you and your absolutely stellar track record of security)
  2. Attacker exploits it before the vendor patches, or after the patch drops but before the admin gets around to applying it
  3. Attacker deploys persistent backdoor (SPAWN ecosystem in this case)
  4. Attacker quietly lives inside the network for months, potentially years
  5. Attacker exfiltrates data at low, noise-minimizing rates
  6. Google eventually notices something weird in their cloud infrastructure

Dwell time on these campaigns is measured in months. In the BRICKSTORM campaign targeting law firms and tech companies, the average time between initial access and detection was 393 days. Over a year. Attackers were inside for over a year. Let that sink in while you sip your morning coffee.

The second failure is the complete absence of meaningful network segmentation and east-west monitoring in most of these environments. Getting into an edge device is the first step. What happens after that is where organizations could — if they were actually trying — catch the intrusion before it becomes a full-scale intelligence compromise. Behavioral anomaly detection on internal traffic. Honeypots. Privileged access workstations. Proper secrets management so a compromised VPN gateway can’t pivot to domain admin in fifteen minutes.

Instead, most organizations have a shiny EDR on the laptops and a prayer on the network devices. Good work, everyone.

The Fixer’s Advice

Here’s the thing about nation-state threats — everyone loves to throw their hands up and say “what are we supposed to do, we can’t defend against China.” Which is exactly the kind of defeatist bullshit that gets networks compromised.

You can’t stop a determined, resourced nation-state from trying. You absolutely can make yourself expensive enough that they go hit the next target instead. Here’s what that actually looks like in practice:

Patch your edge devices like your job depends on it. Because it does. Ivanti, Fortinet, Palo Alto, Cisco — these are the entry points. As I wrote in my breakdown of the Fortinet SSL VPN brute-force campaign, your VPN endpoint is the front door to your entire network. Treat it accordingly. Automated patch deployment. Change management that doesn’t take six weeks. Firmware update SLAs measured in days, not months.

Assume breach architecture. Stop designing networks as if perimeter security is going to hold. It isn’t. Zero trust isn’t a product you buy; it’s an architecture principle. Segment everything. Require authentication for lateral movement. Log and analyze east-west traffic, not just north-south.

Threat hunting, not just alerting. Your SIEM is not going to catch a sophisticated nation-state actor who’s specifically designed their tooling to blend in with normal traffic. You need human analysts actively looking for anomalies — beaconing patterns, unusual authentication times, process chains that don’t match normal behavior. If you don’t have that capability in-house, buy it. This is exactly what managed threat hunting services are for.

Hunt for SPAWN indicators. Google’s threat intelligence team has published indicators of compromise for the SPAWN malware ecosystem. Go look at your Ivanti appliance logs right now. I’ll wait.

Cloud infrastructure monitoring matters. Part of how Google caught this was anomalous cloud project activity. If you’re running infrastructure in any cloud provider, make sure you have governance controls over what’s being provisioned and by whom. Cloud infrastructure used for C2 doesn’t look like a hacking tool; it looks like a virtual machine someone spun up. You need controls to notice when that happens.

The telcos and government bodies that got hit in this campaign aren’t incompetent organizations with no security budget. Some of them have serious security teams. But sophistication on the attacker side combined with the perpetual weak spot that is edge device security means the equation keeps tilting in the attacker’s favor.

The Call-Out

China’s cyber operations aren’t a future threat. They’re not a theoretical risk. They are happening right now, to organizations that thought they were doing security reasonably well. Fifty-three of them, apparently, across forty-two countries.

Google disrupting this campaign is genuinely good news. But let’s be honest: for every UNC5221 infrastructure cluster that gets taken down, there are ten more running that nobody’s noticed yet. The lesson isn’t “great, Google fixed it.” The lesson is “if you’re running edge devices connected to the internet and you haven’t implemented the mitigations above, there is a non-trivial probability that someone is already inside your network.”

Go check. Seriously. Go check right now.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.