Executive Summary
In February 2026, three Silicon Valley engineers—Samaneh Ghandali, her sister Soroor Ghandali, and her husband Mohammadjavad Khosravi—were indicted for allegedly stealing trade secrets from Google and other technology companies and transferring them to unauthorized locations, including Iran. The trio exploited their positions to access sensitive data related to processor security and cryptography, transferring hundreds of confidential files to personal devices and third-party platforms. Their actions were detected by Google's internal security systems in August 2023, leading to an internal investigation and subsequent legal action. This incident underscores the persistent threat of insider attacks in the tech industry, highlighting the need for robust internal security measures and vigilant monitoring to protect intellectual property. The case also reflects broader concerns about the exfiltration of sensitive technologies to foreign entities, emphasizing the importance of safeguarding national security interests in the face of evolving cyber threats.
Why This Matters Now
The indictment of these engineers highlights the ongoing risk of insider threats within the tech industry, emphasizing the need for enhanced security protocols and monitoring to protect sensitive intellectual property from unauthorized access and potential foreign exploitation.
Attack Path Analysis
Former Google engineers exploited their legitimate access to confidential information, escalating their privileges to access sensitive trade secrets. They moved laterally within the organization to gather additional proprietary data, established covert channels for command and control, and exfiltrated the data to unauthorized locations, including Iran. The impact resulted in significant intellectual property theft and potential economic and security implications.
Kill Chain Progression
Initial Compromise
Description
The insiders leveraged their authorized access to Google's internal systems to obtain confidential information.
MITRE ATT&CK® Techniques
Valid Accounts
Transfer Data to Cloud Account
Exfiltration Over Physical Medium
Automated Exfiltration
Impersonation
Financial Theft
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Secure Storage of Cardholder Data
Control ID: 3.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – User Access Controls
Control ID: Identity and Access Management
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Insider threats targeting trade secrets pose critical risks to IP protection, requiring enhanced egress security and zero trust segmentation for development environments.
Information Technology/IT
Trade secret theft demonstrates need for multicloud visibility, anomaly detection, and encrypted traffic monitoring to prevent unauthorized data transfers to foreign entities.
Computer/Network Security
Insider threat case highlights vulnerabilities in current security frameworks, emphasizing requirements for threat detection capabilities and east-west traffic security implementations.
Defense/Space
Foreign transfer of sensitive technologies creates national security implications, requiring enhanced data loss prevention and policy enforcement for classified information protection.
Sources
- Former Google Engineers Indicted Over Trade Secret Transfers to Iranhttps://thehackernews.com/2026/02/three-former-google-engineers-indicted.htmlVerified
- Former Google Engineer Found Guilty of Economic Espionage and Theft of Confidential AI Technologyhttps://www.justice.gov/opa/pr/former-google-engineer-found-guilty-economic-espionage-and-theft-confidential-ai-technologyVerified
- Three Silicon Valley engineers charged with stealing Google trade secrets for Iranhttps://www.yahoo.com/news/articles/three-silicon-valley-engineers-charged-083500002.htmlVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the insiders' ability to escalate privileges, move laterally, and exfiltrate sensitive data, thereby reducing the overall impact of the breach.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The insiders' ability to access confidential information would likely have been constrained, reducing the scope of initial data exposure.
Control: Zero Trust Segmentation
Mitigation: The insiders' ability to escalate privileges would likely have been limited, reducing the risk of accessing sensitive trade secrets.
Control: East-West Traffic Security
Mitigation: The insiders' ability to move laterally within the network would likely have been restricted, reducing the risk of accessing additional proprietary data.
Control: Multicloud Visibility & Control
Mitigation: The insiders' ability to establish covert channels for data transfer would likely have been detected and disrupted, reducing the risk of unauthorized data coordination.
Control: Egress Security & Policy Enforcement
Mitigation: The insiders' ability to exfiltrate data to unauthorized locations would likely have been prevented, reducing the risk of data loss.
The overall impact of intellectual property theft would likely have been mitigated, reducing potential economic and security consequences.
Impact at a Glance
Affected Business Functions
- Intellectual Property Management
- Product Development
- Corporate Security
Estimated downtime: N/A
Estimated loss: N/A
Confidential trade secrets related to processor security and cryptography were exfiltrated.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement.
- • Deploy Egress Security & Policy Enforcement to monitor and control outbound data transfers, mitigating unauthorized exfiltration.
- • Utilize Multicloud Visibility & Control to detect and respond to anomalous activities across cloud environments.
- • Apply Threat Detection & Anomaly Response mechanisms to identify and address insider threats promptly.
- • Establish comprehensive identity governance to manage and monitor user access rights effectively.



