Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Targets Singapore Telecom in Cyber Attack

China-Linked Group Targets Singapore Telecom in Cyber Attack

Posted on February 9, 2026 By CWS

The Cyber Security Agency (CSA) of Singapore has disclosed a significant cyber espionage campaign against its telecommunications industry. The attack is attributed to the China-linked group UNC3886, which has specifically targeted Singapore’s major telecom providers. This strategic incursion highlights the persistent threat posed by advanced cyber actors to national infrastructure.

Targeted Cyber Campaign

On Monday, the CSA reported that all four of Singapore’s leading telecommunications operators—M1, SIMBA Telecom, Singtel, and StarHub—were victims of a deliberate and coordinated cyber attack. This revelation follows earlier accusations by Singapore’s Coordinating Minister for National Security, K. Shanmugam, who identified UNC3886 as a threat to high-value strategic assets.

Active since at least 2022, UNC3886 has been focusing on compromising edge devices and virtualization technologies to gain initial access to targeted systems. The group’s sophisticated methods underscore its role as an advanced persistent threat (APT) with significant capabilities.

Advanced Techniques and Tools

In a report from July 2025, cybersecurity firm Sygnia linked UNC3886 to a broader threat cluster known as Fire Ant, which shares similar tactics and tools. The group is known for infiltrating VMware ESXi and vCenter environments, as well as network appliances.

UNC3886 deployed advanced tools to penetrate telecom systems, including exploiting a zero-day vulnerability to bypass perimeter defenses. This allowed the group to extract a limited amount of technical data, although specifics about the vulnerability remain undisclosed.

Additionally, the attackers used rootkits to maintain persistent access and evade detection, targeting critical segments of telecom networks without disrupting services.

Defensive Measures and Impact

In response to the threat, the CSA initiated a cyber operation named CYBER GUARDIAN to thwart the attackers’ progression within telecom networks. The agency confirmed there was no evidence of personal data breaches or interruptions to internet services.

Cyber defenders have since implemented remedial actions, sealing off UNC3886’s access points and enhancing monitoring systems across the affected telecoms. These measures aim to fortify the sector against future incursions.

The incident underscores the ongoing challenges posed by cyber espionage and the importance of robust cybersecurity frameworks to protect national infrastructure. As cyber threats evolve, continued vigilance and international cooperation are essential to safeguard critical industries.

The Hacker News Tags:APT, China, cyber defense, cyber espionage, Cybersecurity, Singapore, Telecom, Threat Actors, UNC3886, Virtualization

Post navigation

Previous Post: Critical Roundcube Flaw Allows Email Tracking
Next Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Related Posts

Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery The Hacker News
Why BAS Is Proof of Defense, Not Assumptions Why BAS Is Proof of Defense, Not Assumptions The Hacker News
Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools The Hacker News
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News
AI Becomes Russia’s New Cyber Weapon in War on Ukraine AI Becomes Russia’s New Cyber Weapon in War on Ukraine The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • European Commission Thwarts Cyber-Attack on Mobile Data
  • Node.js-Powered LTX Stealer Targets User Credentials
  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • European Commission Thwarts Cyber-Attack on Mobile Data
  • Node.js-Powered LTX Stealer Targets User Credentials
  • Hackers Target Ivanti EPMM Devices with Hidden Backdoors
  • China-Linked Group Targets Singapore Telecom in Cyber Attack
  • Critical Roundcube Flaw Allows Email Tracking

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark