The Cyber Safety Company (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group generally known as UNC3886 focused its telecommunications sector.
“UNC3886 had launched a deliberate, focused, and well-planned marketing campaign in opposition to Singapore’s telecommunications sector,” CSA stated. “All 4 of Singapore’s main telecommunications operators (‘telcos’) – M1, SIMBA Telecom, Singtel, and StarHub – have been the goal of assaults.”
The event comes greater than six months after Singapore’s Coordinating Minister for Nationwide Safety, Ok. Shanmugam, accused UNC3886 of placing high-value strategic risk targets. UNC3886 is assessed to be lively since at the very least 2022, focusing on edge gadgets and virtualization applied sciences to acquire preliminary entry.
In July 2025, Sygnia disclosed particulars of a long-term cyber espionage marketing campaign attributed to a risk cluster it tracks as Fireplace Ant and which shares tooling and focusing on overlaps with UNC3886, stating the adversary infiltrates organizations’ VMware ESXi and vCenter environments in addition to community home equipment.
Describing UNC3886 as a complicated persistent risk (APT) with “deep capabilities,” CSA stated the risk actors deployed refined instruments to achieve entry into telco techniques, in a single occasion even weaponizing a zero-day exploit to bypass a fringe firewall and siphon a small quantity of technical knowledge to additional its operational aims. The precise specifics of the flaw weren’t disclosed.
In a second case, UNC3886 is alleged to have deployed rootkits to determine persistent entry and conceal their tracks to fly underneath the radar. Different actions undertaken by the risk actor embrace gaining unauthorized entry to “some elements” of telco networks and techniques, together with these deemed crucial, though it is assessed that the incident was not extreme sufficient to disrupt companies.
CSA stated it mounted a cyber operation dubbed CYBER GUARDIAN to counter the risk and restrict the attackers’ motion into telecom networks. It additionally emphasised that there isn’t a proof that the risk actor exfiltrated private knowledge reminiscent of buyer information or lower off web availability.
“Cyber defenders have since applied remediation measures, closed off UNC3886’s entry factors, and expanded monitoring capabilities within the focused telcos,” the company stated.

