Google flags intensifying cyber campaigns against the global defense supply chain
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Global cyber-espionage campaign breaches sensitive targets in 37 countries
A coordinated, long-duration hacking campaign has established persistent access to high-value government and diplomatic networks in 37 countries, prioritizing intelligence collection over immediate disruption. The operation leverages polymorphic tooling, credential harvesting and social-engineering techniques that complicate detection and raise urgent needs for identity-focused defenses and cross-border incident coordination.

Google disrupts UNC2814 GridTide espionage campaign
Google and partners dismantled a cloud‑hosted espionage operation that used spreadsheets and SaaS APIs as covert command channels, attributed to the actor UNC2814 and a backdoor called GridTide . The takedown affects at least 53 organizations across 42 countries and highlights an accelerating trend: cloud services are becoming primary vectors for stealthy state‑linked intrusions.

Google GTIG: Zero‑Day Exploits Shift Toward Enterprise Targets in 2025
Google’s GTIG logged 90 exploited zero‑days in 2025 and a record portion hit enterprise infrastructure; commercial spyware vendors and OS flaws drove much of the shift. Field cases — including a long‑running WinRAR exploit and rapid weaponization of disclosed appliance flaws — illustrate how automation and exploit brokerage compress the timeline from discovery to impact.
Google unveils threat-disruption team to choke attacker infrastructure
Google has created a centralized Threat Disruption team to deny cyber adversaries the infrastructure they use through legal takedowns, public exposure, sinkholing and product hardening, while explicitly avoiding offensive operations on behalf of governments. The move formalizes prior ad‑hoc disruptions (for example GridTide and residential proxy takedowns) and pairs GTIG telemetry with coordinated cross‑provider action — an approach that yields immediate defensive gains but is constrained by jurisdictional limits and adversary migration to harder-to-reach platforms.
Cyberwar in 2026: Pre-positioning, AI and the Blurred Line Between Crime and Statecraft
Nation-state operations are increasingly about long-term pre-positioning inside critical infrastructure rather than one-off disruptive strikes, and the rapid spread of generative and agentic AI lowers the barrier to assemble and coordinate complex campaigns. That convergence — together with scalable impersonation, commodified access in underground markets, and the latent threat from future quantum decryption — forces defenders to prioritize early detection, identity-first controls, post-quantum planning, and calibrated public–private response mechanisms.
Google warns of large-scale prompting campaign to clone Gemini
Google disclosed that actors prompted its Gemini model at scale to harvest outputs for use in building cheaper imitations, with at least one campaign issuing over 100,000 queries. The company frames the activity as theft of proprietary capabilities and signals a rising threat vector for LLM operators, with technical and legal consequences ahead.

Google Keeps Anthropic Services Available for Non‑Defense Customers
Google said Anthropic’s models will remain available to commercial customers on Google Cloud platforms while explicitly excluding Department of Defense uses after a White House/Pentagon supply‑chain designation; the move preserves enterprise continuity but intersects a broader, contested procurement fight that risks a roughly $200M defense award and has spurred legal, policy and workforce frictions.

GitHub: Invisible Unicode Supply‑Chain Campaign Encodes Malicious JavaScript
Researchers uncovered a cross‑registry campaign that hides executable JavaScript inside seemingly blank strings by using invisible Unicode code points, prompting removals across GitHub, npm, and the VS Code Marketplace. Related investigations link the tactic to publisher‑account abuses, off‑platform Solana memo signaling, and platform convenience features (Codespaces) and package manager gaps that together magnify supply‑chain risk and demand coordinated registry and toolchain fixes.