Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Home/Threats/Chinese Hackers Target Singapore Telecom Edge Devices
Threats

Chinese Hackers Target Singapore Telecom Edge Devices

Singapore’s telecommunications sector has recently been the target of a highly sophisticated cyber espionage campaign orchestrated by the Advanced Persistent Threat (APT) group known as UNC3886. The...

Emy Elsamnoudy
Emy Elsamnoudy
February 10, 2026 2 Min Read
6 0

Singapore’s telecommunications sector has recently been the target of a highly sophisticated cyber espionage campaign orchestrated by the Advanced Persistent Threat (APT) group known as UNC3886.

The details of this extensive intrusion were formally disclosed following Operation CYBER GUARDIAN, a major multi-agency response led by the Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA).

This unprecedented operation, which spanned more than eleven months, was launched to identify, contain, and remediate the security breach that affected all four of the nation’s major operators: Singtel, M1, StarHub, and SIMBA Telecom.

The attackers utilized a calculated and stealthy approach to infiltrate the country’s critical infrastructure.

By using a zero-day exploit, UNC3886 successfully bypassed the perimeter firewalls, granting them unauthorized entry into the internal networks of the targeted telecommunications providers.

Once inside, the threat actors prioritized lateral movement and maintained a low profile to avoid triggering standard security alarms.

Their primary objective appeared to be the exfiltration of technical network configurations and architectural data to further their operational goals, rather than stealing customer records or causing service downtimes.

Following the initial detection of these anomalies, CSA analysts identified the malware and the full scope of the intrusion during their detailed investigations.

The researchers noted that while the attackers managed to access certain restricted segments of the network, they were effectively contained before they could penetrate deep enough to disrupt internet services or damage critical systems.

This swift collaboration between government authorities and the private telcos was key in limiting the adversary’s reach and preventing a potential national crisis.​

Persistence and Detection Evasion

A defining characteristic of UNC3886’s tradecraft is their reliance on advanced evasion techniques to ensure long-term survival within a victim’s environment.

To maintain persistence, the attackers deployed complex rootkits that allowed them to deeply embed malicious code within the infected systems.

These tools enabled them to hide their processes, mask unauthorized connections, and conceal file modifications from conventional security scans.

By securing hidden administrative privileges, the group could disable antivirus protections and systematically cover their tracks, requiring defenders to perform comprehensive and intrusive checks to effectively root them out.

In response to this significant threat, cyber defenders have implemented rigorous remediation measures, closing the exploited access points and deploying active monitoring capabilities.

The successful containment of UNC3886 highlights the vital importance of the “actions or inaction” of infrastructure operators, as noted by officials.

The ongoing battle against such capable state-sponsored actors necessitates continuous vigilance and a robust partnership between the public and private sectors to safeguard the digital economy and national security.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitHackerMalwareSecurityThreatzero-day

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

15,200 OpenClaw Control Panels with Full System Access Exposed to

Next Post

Augustus: Open-Source LLM Scanner Detects Vulnerability With

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us