Singapore's Cyber Security Agency (CSA) has confirmed that the nation's telecommunications infrastructure was targeted by the cyber espionage group UNC3886 in cyberattacks last year. The Singapore telecom cyberattack impacted all four major providers: Singtel, StarHub, M1, and Simba Telecom.Â
The agency revealed that the threat actor successfully gained access to certain parts of the telecom systems.Â
While the attackers achieved a degree of infiltration, their access was limited. The CSA stated that the group's actions did not disrupt telecom services and, critically, did not result in the compromise of any customer personal data.Â
The primary objective of the UNC3886 cyberespionage campaign appears to have been intelligence gathering. This aligns with the known tactics of advanced persistent threat (APT) groups focused on reconnaissance.
The agency, cited by Reuters, confirmed the exfiltration of a "small amount of technical data," which is believed to be network-related information intended to support the threat actor's future operational objectives.Â
In response to the incident, the four telecom companies issued a joint statement acknowledging the persistent threats facing the industry. They emphasized their use of defence-in-depth mechanisms to protect networks and their commitment to prompt remediation when issues arise.Â
This incident marks the first time the Singaporean government has specified the type of critical infrastructure targeted by this group, following a more general announcement last July about attacks on high-value strategic assets.
Last year, Australia’s privacy regulator filed a lawsuit against the nation’s telecommunications firm Optus, whose parent company is Singtel, for its alleged failure to safeguard customer data during the 2022 data breach.
A 2024 Mandiant report revealed that UNC3886, China-nexus group, exploited the now-patched CVE-2022-42475 vulnerability in FortiOS's Secure Sockets Layer (SSL) VPN to gain unauthorized access and collect credentials via Secure Shell (SSH) backdoors, extracted from TACACS+ authentication via custom malware.