Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

February 17, 2026

Significant Rise in Ransomware Attacks Targeting Industrial Operations

February 17, 2026
Facebook X (Twitter) Instagram
Tuesday, February 17
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
News

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

Team-CWDBy Team-CWDFebruary 17, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector.

“UNC3886 had launched a deliberate, targeted, and well-planned campaign against Singapore’s telecommunications sector,” CSA said. “All four of Singapore’s major telecommunications operators (‘telcos’) – M1, SIMBA Telecom, Singtel, and StarHub – have been the target of attacks.”

The development comes more than six months after Singapore’s Coordinating Minister for National Security, K. Shanmugam, accused UNC3886 of striking high-value strategic threat targets. UNC3886 is assessed to be active since at least 2022, targeting edge devices and virtualization technologies to obtain initial access.

In July 2025, Sygnia disclosed details of a long-term cyber espionage campaign attributed to a threat cluster it tracks as Fire Ant and which shares tooling and targeting overlaps with UNC3886, stating the adversary infiltrates organizations’ VMware ESXi and vCenter environments as well as network appliances.

Describing UNC3886 as an advanced persistent threat (APT) with “deep capabilities,” CSA said the threat actors deployed sophisticated tools to gain access into telco systems, in one instance even weaponizing a zero-day exploit to bypass a perimeter firewall and siphon a small amount of technical data to further its operational objectives. The exact specifics of the flaw were not disclosed.

In a second case, UNC3886 is said to have deployed rootkits to establish persistent access and conceal their tracks to fly under the radar. Other activities undertaken by the threat actor include gaining unauthorized access to “some parts” of telco networks and systems, including those deemed critical, although it’s assessed that the incident was not severe enough to disrupt services.

CSA said it mounted a 11-month-long cyber operation dubbed CYBER GUARDIAN to counter the threat and limit the attackers’ movement into telecom networks. It also emphasized that there is no evidence that the threat actor exfiltrated personal data such as customer records or cut off internet availability.

“Cyber defenders have since implemented remediation measures, closed off UNC3886’s access points, and expanded monitoring capabilities in the targeted telcos,” the agency said.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSignificant Rise in Ransomware Attacks Targeting Industrial Operations
Next Article Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks
Team-CWD
  • Website

Related Posts

News

Low-Skilled Cybercriminals Use AI to Perform “Vibe Extortion” Attacks

February 17, 2026
News

Infostealer Targets OpenClaw to Loot Victim’s Digital Life

February 17, 2026
News

SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

February 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

Beware of Winter Olympics scams and other cyberthreats

February 2, 2026

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.