China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
Source: The Hacker News

Overview
The Cyber Security Agency (CSA) of Singapore announced that the China‑linked cyber espionage group UNC3886 has targeted the nation’s telecommunications sector. According to the CSA, “UNC3886 had launched a deliberate, targeted, and well‑planned campaign against Singapore’s telecommunications sector.” All four major Singapore telcos—M1, SIMBA Telecom, Singtel, and StarHub—were affected.
Background
- The campaign follows a statement made more than six months earlier by Singapore’s Coordinating Minister for National Security, K. Shanmugam, who accused UNC3886 of striking high‑value strategic targets.
- UNC3886 has been active since at least 2022, focusing on edge devices and virtualization technologies to gain initial access.
Related Threat Activity

In July 2025, security firm Sygnia disclosed a long‑term espionage campaign attributed to a threat cluster it calls Fire Ant, which shares tooling and targeting overlaps with UNC3886. The adversary infiltrates VMware ESXi and vCenter environments as well as network appliances.
Technical Tactics
- Zero‑day exploitation – In at least one incident, UNC3886 weaponized a zero‑day exploit to bypass a perimeter firewall and exfiltrate a small amount of technical data. The specific vulnerability was not disclosed.
- Rootkits – The group deployed rootkits to maintain persistent access and hide its activities.
- Network intrusion – Unauthorized access was gained to “some parts” of telco networks and systems, including critical components. The incidents did not cause service disruption.
CSA Response
The CSA launched a cyber operation named CYBER GUARDIAN to counter the threat and limit attacker movement within telecom networks. Key actions included:
- Implementing remediation measures across the targeted telcos.
- Closing UNC3886’s access points.
- Expanding monitoring capabilities.
The agency emphasized that there is no evidence of exfiltration of personal data (e.g., customer records) or interruption of internet services.
References
- UNC3886 profile – The Hacker News (Mar 2025)
- CSA press release on UNC3886
- K. Shanmugam’s accusation – The Hacker News (Jul 2025)
- Sygnia disclosure on Fire Ant – The Hacker News (Jul 2025)
Tags: Advanced Persistent Threat, cyber espionage, cybersecurity, network security, rootkit, Singapore, Threat Intelligence, zero‑day