Sophisticated APT Campaign Revealed

The Cyber Security Agency (CSA) of Singapore has revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector in a deliberate, targeted, and well-planned campaign.

All four of Singapore's major telecommunications operators have been the target of attacks:

- M1
- SIMBA Telecom
- Singtel
- StarHub

Advanced Threat Actor Profile

The disclosure comes more than six months after Singapore's Coordinating Minister for National Security, K. Shanmugam, accused UNC3886 of striking high-value strategic threat targets. UNC3886 is assessed to be active since at least 2022, targeting edge devices and virtualization technologies to obtain initial access.

CSA described UNC3886 as an advanced persistent threat (APT) with "deep capabilities."

Attack Methods and Tools

The threat actors deployed sophisticated tools to gain access into telco systems:

Zero-Day Exploitation: In one instance, attackers weaponized a zero-day exploit to bypass a perimeter firewall and siphon a small amount of technical data to further operational objectives

Rootkit Deployment: UNC3886 deployed rootkits to establish persistent access and conceal their tracks to fly under the radar

Critical Systems Access: Threat actors gained unauthorized access to some parts of telco networks and systems, including those deemed critical

Impact Assessment

While the incident was serious, CSA assessed that it was not severe enough to disrupt services. There is no evidence that the threat actor:

- Exfiltrated personal data such as customer records
- Cut off internet availability

Response Operation

CSA mounted a cyber operation dubbed CYBER GUARDIAN to counter the threat and limit the attackers' movement into telecom networks.

Cyber defenders have since:

- Implemented remediation measures
- Closed off UNC3886's access points
- Expanded monitoring capabilities in the targeted telcos

Connection to Fire Ant

In July 2025, Sygnia disclosed details of a long-term cyber espionage campaign attributed to a threat cluster it tracks as Fire Ant, which shares tooling and targeting overlaps with UNC3886. The adversary infiltrates organizations' VMware ESXi and vCenter environments as well as network appliances.


Source: The Hacker News: China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign