No menu items!

Chinese Hackers Targeted Brazil’s Telecoms for Years

Key Points

Google says a Chinese state-linked hacking group breached telecoms and government agencies in 42 countries — including targets in Brazil and across the Americas — to harvest personal data used for tracking surveillance targets.
The hackers planted malware on systems storing names, phone numbers, dates of birth, voter IDs, and national identity numbers — the kind of data that in Brazil means CPF numbers and títulos de eleitor for over 200 million citizens.
The campaign’s infrastructure dates to at least mid-2018, and Google warns the group will likely try to rebuild after the disruption — raising questions about the security of Brazil’s telecom networks, which rely heavily on Chinese-made equipment.

For years, a hacking group linked to the Chinese government sat inside telecommunications companies across the Americas, Africa, and Asia — collecting personal data that lets an intelligence service know who someone is, where they live, and who they call. On Wednesday, Google revealed it had shut down the operation. The question for Brazil is how long the hackers had access, and what they took.

Why Telecoms Are the Target

Brazil’s major carriers — Vivo, Claro, TIM, and Oi — collectively hold the personal records of virtually every adult in the country: CPF numbers, addresses, phone records, and billing data. For a foreign intelligence service, breaching a telecom is about building a surveillance map — identifying persons of interest and monitoring their communications through the operator’s own systems, including the lawful intercept infrastructure that carriers maintain for court-ordered wiretaps.

Chinese Hackers Targeted Brazil’s Telecoms for Years. (Photo Internet reproduction)

Google’s report does not name specific Brazilian companies among the 53 confirmed victims, but identifies the Americas as one of the campaign’s target regions and confirms that the hackers sought data including national identity numbers and voter IDs — categories that map directly onto Brazil’s CPF and título de eleitor.

Hidden Inside Google Sheets

The group, tracked as UNC2814, used a backdoor called GRIDTIDE that disguised its communications as ordinary cloud traffic by routing commands through the Google Sheets API. The malware checked a spreadsheet cell for instructions, executed them, and wrote results back — making its activity nearly invisible to standard monitoring. Google said the campaign is separate from Salt Typhoon, which penetrated major U.S. telecoms, but the two share a common logic: getting inside the infrastructure that carries a country’s communications.

A Familiar Vulnerability

Brazil is no stranger to telecom espionage. In 2023, Federal Police revealed that Bolsonaro’s intelligence agency had used an Israeli tool called FirstMile to track journalists, politicians, and Supreme Court justices — exploiting a vulnerability in mobile signaling protocols. Anatel opened proceedings but acknowledged the attacks bypassed operators without their knowledge.

The UNC2814 campaign operates at a different scale. Where FirstMile exploited a protocol flaw from outside, these hackers burrowed directly into telecom systems from within, planting persistent backdoors that could remain active for years. Google said the group’s VPN infrastructure dates to at least July 2018 and that many of the compromised organizations had likely been breached for years before detection.

China’s embassy rejected the findings, calling them an attempt at defamation. Google terminated the attackers’ cloud access and seized their domains but warned that the group will try to rebuild. For a country where three carriers serve most of the population and significant portions of the network run on Chinese-made equipment, the report is less a revelation than a confirmation of a risk Brazil has been slow to confront.

Check out our other content

  • Google Analytics Report

×
You have free article(s) remaining. Subscribe for unlimited access.

Rotate for Best Experience

This report is optimized for landscape viewing. Rotate your phone for the full experience.