Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
China-Linked Group Targets Singapore Telecom in Cyber Attack

China-Linked Group Targets Singapore Telecom in Cyber Attack

Posted on February 9, 2026 By CWS

The Cyber Security Agency (CSA) of Singapore has disclosed a significant cyber espionage campaign against its telecommunications industry. The attack is attributed to the China-linked group UNC3886, which has specifically targeted Singapore’s major telecom providers. This strategic incursion highlights the persistent threat posed by advanced cyber actors to national infrastructure.

Targeted Cyber Campaign

On Monday, the CSA reported that all four of Singapore’s leading telecommunications operators—M1, SIMBA Telecom, Singtel, and StarHub—were victims of a deliberate and coordinated cyber attack. This revelation follows earlier accusations by Singapore’s Coordinating Minister for National Security, K. Shanmugam, who identified UNC3886 as a threat to high-value strategic assets.

Active since at least 2022, UNC3886 has been focusing on compromising edge devices and virtualization technologies to gain initial access to targeted systems. The group’s sophisticated methods underscore its role as an advanced persistent threat (APT) with significant capabilities.

Advanced Techniques and Tools

In a report from July 2025, cybersecurity firm Sygnia linked UNC3886 to a broader threat cluster known as Fire Ant, which shares similar tactics and tools. The group is known for infiltrating VMware ESXi and vCenter environments, as well as network appliances.

UNC3886 deployed advanced tools to penetrate telecom systems, including exploiting a zero-day vulnerability to bypass perimeter defenses. This allowed the group to extract a limited amount of technical data, although specifics about the vulnerability remain undisclosed.

Additionally, the attackers used rootkits to maintain persistent access and evade detection, targeting critical segments of telecom networks without disrupting services.

Defensive Measures and Impact

In response to the threat, the CSA initiated a cyber operation named CYBER GUARDIAN to thwart the attackers’ progression within telecom networks. The agency confirmed there was no evidence of personal data breaches or interruptions to internet services.

Cyber defenders have since implemented remedial actions, sealing off UNC3886’s access points and enhancing monitoring systems across the affected telecoms. These measures aim to fortify the sector against future incursions.

The incident underscores the ongoing challenges posed by cyber espionage and the importance of robust cybersecurity frameworks to protect national infrastructure. As cyber threats evolve, continued vigilance and international cooperation are essential to safeguard critical industries.

The Hacker News Tags:APT, China, cyber defense, cyber espionage, Cybersecurity, Singapore, Telecom, Threat Actors, UNC3886, Virtualization

Post navigation

Previous Post: Critical Roundcube Flaw Allows Email Tracking
Next Post: Hackers Target Ivanti EPMM Devices with Hidden Backdoors

Related Posts

Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations The Hacker News
Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories The Hacker News
XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks The Hacker News
DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware The Hacker News
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution The Hacker News
45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage 45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark