Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Targets Singapore Telecom in Cyber Attack

China-Linked Group Targets Singapore Telecom in Cyber Attack

Posted on February 9, 2026 By CWS

The Cyber Security Agency (CSA) of Singapore has disclosed a significant cyber espionage campaign against its telecommunications industry. The attack is attributed to the China-linked group UNC3886, which has specifically targeted Singapore’s major telecom providers. This strategic incursion highlights the persistent threat posed by advanced cyber actors to national infrastructure.

Targeted Cyber Campaign

On Monday, the CSA reported that all four of Singapore’s leading telecommunications operators—M1, SIMBA Telecom, Singtel, and StarHub—were victims of a deliberate and coordinated cyber attack. This revelation follows earlier accusations by Singapore’s Coordinating Minister for National Security, K. Shanmugam, who identified UNC3886 as a threat to high-value strategic assets.

Active since at least 2022, UNC3886 has been focusing on compromising edge devices and virtualization technologies to gain initial access to targeted systems. The group’s sophisticated methods underscore its role as an advanced persistent threat (APT) with significant capabilities.

Advanced Techniques and Tools

In a report from July 2025, cybersecurity firm Sygnia linked UNC3886 to a broader threat cluster known as Fire Ant, which shares similar tactics and tools. The group is known for infiltrating VMware ESXi and vCenter environments, as well as network appliances.

UNC3886 deployed advanced tools to penetrate telecom systems, including exploiting a zero-day vulnerability to bypass perimeter defenses. This allowed the group to extract a limited amount of technical data, although specifics about the vulnerability remain undisclosed.

Additionally, the attackers used rootkits to maintain persistent access and evade detection, targeting critical segments of telecom networks without disrupting services.

Defensive Measures and Impact

In response to the threat, the CSA initiated a cyber operation named CYBER GUARDIAN to thwart the attackers’ progression within telecom networks. The agency confirmed there was no evidence of personal data breaches or interruptions to internet services.

Cyber defenders have since implemented remedial actions, sealing off UNC3886’s access points and enhancing monitoring systems across the affected telecoms. These measures aim to fortify the sector against future incursions.

The incident underscores the ongoing challenges posed by cyber espionage and the importance of robust cybersecurity frameworks to protect national infrastructure. As cyber threats evolve, continued vigilance and international cooperation are essential to safeguard critical industries.

The Hacker News Tags:APT, China, cyber defense, cyber espionage, Cybersecurity, Singapore, Telecom, Threat Actors, UNC3886, Virtualization

Post navigation

Previous Post: Critical Roundcube Flaw Allows Email Tracking
Next Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Related Posts

Dynamic PDF Phishing Threatens Latin America and Europe Dynamic PDF Phishing Threatens Latin America and Europe The Hacker News
U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing 0K Crypto Transfers and M+ Profits U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The Hacker News
⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More ⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More The Hacker News
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN The Hacker News
German Agencies Issue Alert on Signal Phishing Threat German Agencies Issue Alert on Signal Phishing Threat The Hacker News
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark