Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Targets Singapore Telecom in Cyber Attack

China-Linked Group Targets Singapore Telecom in Cyber Attack

Posted on February 9, 2026 By CWS

The Cyber Security Agency (CSA) of Singapore has disclosed a significant cyber espionage campaign against its telecommunications industry. The attack is attributed to the China-linked group UNC3886, which has specifically targeted Singapore’s major telecom providers. This strategic incursion highlights the persistent threat posed by advanced cyber actors to national infrastructure.

Targeted Cyber Campaign

On Monday, the CSA reported that all four of Singapore’s leading telecommunications operators—M1, SIMBA Telecom, Singtel, and StarHub—were victims of a deliberate and coordinated cyber attack. This revelation follows earlier accusations by Singapore’s Coordinating Minister for National Security, K. Shanmugam, who identified UNC3886 as a threat to high-value strategic assets.

Active since at least 2022, UNC3886 has been focusing on compromising edge devices and virtualization technologies to gain initial access to targeted systems. The group’s sophisticated methods underscore its role as an advanced persistent threat (APT) with significant capabilities.

Advanced Techniques and Tools

In a report from July 2025, cybersecurity firm Sygnia linked UNC3886 to a broader threat cluster known as Fire Ant, which shares similar tactics and tools. The group is known for infiltrating VMware ESXi and vCenter environments, as well as network appliances.

UNC3886 deployed advanced tools to penetrate telecom systems, including exploiting a zero-day vulnerability to bypass perimeter defenses. This allowed the group to extract a limited amount of technical data, although specifics about the vulnerability remain undisclosed.

Additionally, the attackers used rootkits to maintain persistent access and evade detection, targeting critical segments of telecom networks without disrupting services.

Defensive Measures and Impact

In response to the threat, the CSA initiated a cyber operation named CYBER GUARDIAN to thwart the attackers’ progression within telecom networks. The agency confirmed there was no evidence of personal data breaches or interruptions to internet services.

Cyber defenders have since implemented remedial actions, sealing off UNC3886’s access points and enhancing monitoring systems across the affected telecoms. These measures aim to fortify the sector against future incursions.

The incident underscores the ongoing challenges posed by cyber espionage and the importance of robust cybersecurity frameworks to protect national infrastructure. As cyber threats evolve, continued vigilance and international cooperation are essential to safeguard critical industries.

The Hacker News Tags:APT, China, cyber defense, cyber espionage, Cybersecurity, Singapore, Telecom, Threat Actors, UNC3886, Virtualization

Post navigation

Previous Post: Critical Roundcube Flaw Allows Email Tracking
Next Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Related Posts

Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation The Hacker News
Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials The Hacker News
Apple Patches Zero-Day Vulnerability in Devices Apple Patches Zero-Day Vulnerability in Devices The Hacker News
CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks The Hacker News
Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks Unpatched Gogs Zero-Day Exploited Across 700+ Instances Amid Active Attacks The Hacker News
Salesforce Experience Cloud Faces Security Threats Salesforce Experience Cloud Faces Security Threats The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark