China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

Published: (February 9, 2026 at 12:01 PM EST)
2 min read

Source: The Hacker News

Cyber Espionage Campaign

Overview

The Cyber Security Agency (CSA) of Singapore announced that the China‑linked cyber espionage group UNC3886 has targeted the nation’s telecommunications sector. According to the CSA, “UNC3886 had launched a deliberate, targeted, and well‑planned campaign against Singapore’s telecommunications sector.” All four major Singapore telcos—M1, SIMBA Telecom, Singtel, and StarHub—were affected.

Background

  • The campaign follows a statement made more than six months earlier by Singapore’s Coordinating Minister for National Security, K. Shanmugam, who accused UNC3886 of striking high‑value strategic targets.
  • UNC3886 has been active since at least 2022, focusing on edge devices and virtualization technologies to gain initial access.

ThreatLocker

In July 2025, security firm Sygnia disclosed a long‑term espionage campaign attributed to a threat cluster it calls Fire Ant, which shares tooling and targeting overlaps with UNC3886. The adversary infiltrates VMware ESXi and vCenter environments as well as network appliances.

Technical Tactics

  • Zero‑day exploitation – In at least one incident, UNC3886 weaponized a zero‑day exploit to bypass a perimeter firewall and exfiltrate a small amount of technical data. The specific vulnerability was not disclosed.
  • Rootkits – The group deployed rootkits to maintain persistent access and hide its activities.
  • Network intrusion – Unauthorized access was gained to “some parts” of telco networks and systems, including critical components. The incidents did not cause service disruption.

CSA Response

The CSA launched a cyber operation named CYBER GUARDIAN to counter the threat and limit attacker movement within telecom networks. Key actions included:

  • Implementing remediation measures across the targeted telcos.
  • Closing UNC3886’s access points.
  • Expanding monitoring capabilities.

The agency emphasized that there is no evidence of exfiltration of personal data (e.g., customer records) or interruption of internet services.

References

Tags: Advanced Persistent Threat, cyber espionage, cybersecurity, network security, rootkit, Singapore, Threat Intelligence, zero‑day

0 views
Back to Blog

Related posts

Read more »