2026 Futuriom 50: Highlights →Explore

Executive Summary

In February 2026, three Silicon Valley engineers—Samaneh Ghandali, her sister Soroor Ghandali, and her husband Mohammadjavad Khosravi—were indicted for allegedly stealing trade secrets from Google and other technology companies and transferring them to unauthorized locations, including Iran. The trio exploited their positions to access sensitive data related to processor security and cryptography, transferring hundreds of confidential files to personal devices and third-party platforms. Their actions were detected by Google's internal security systems in August 2023, leading to an internal investigation and subsequent legal action. This incident underscores the persistent threat of insider attacks in the tech industry, highlighting the need for robust internal security measures and vigilant monitoring to protect intellectual property. The case also reflects broader concerns about the exfiltration of sensitive technologies to foreign entities, emphasizing the importance of safeguarding national security interests in the face of evolving cyber threats.

Why This Matters Now

The indictment of these engineers highlights the ongoing risk of insider threats within the tech industry, emphasizing the need for enhanced security protocols and monitoring to protect sensitive intellectual property from unauthorized access and potential foreign exploitation.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The defendants allegedly accessed and transferred confidential files related to processor security and cryptography, including information concerning Qualcomm's Snapdragon system-on-chip technology.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the insiders' ability to escalate privileges, move laterally, and exfiltrate sensitive data, thereby reducing the overall impact of the breach.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: The insiders' ability to access confidential information would likely have been constrained, reducing the scope of initial data exposure.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: The insiders' ability to escalate privileges would likely have been limited, reducing the risk of accessing sensitive trade secrets.

Lateral Movement

Control: East-West Traffic Security

Mitigation: The insiders' ability to move laterally within the network would likely have been restricted, reducing the risk of accessing additional proprietary data.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: The insiders' ability to establish covert channels for data transfer would likely have been detected and disrupted, reducing the risk of unauthorized data coordination.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: The insiders' ability to exfiltrate data to unauthorized locations would likely have been prevented, reducing the risk of data loss.

Impact (Mitigations)

The overall impact of intellectual property theft would likely have been mitigated, reducing potential economic and security consequences.

Impact at a Glance

Affected Business Functions

  • Intellectual Property Management
  • Product Development
  • Corporate Security
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

Confidential trade secrets related to processor security and cryptography were exfiltrated.

Recommended Actions

  • Implement Zero Trust Segmentation to enforce least privilege access and prevent unauthorized lateral movement.
  • Deploy Egress Security & Policy Enforcement to monitor and control outbound data transfers, mitigating unauthorized exfiltration.
  • Utilize Multicloud Visibility & Control to detect and respond to anomalous activities across cloud environments.
  • Apply Threat Detection & Anomaly Response mechanisms to identify and address insider threats promptly.
  • Establish comprehensive identity governance to manage and monitor user access rights effectively.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image