UNC3886 Cyber Espionage Group Linked to Singapore Telecom Infrastructure Cyberattacks: Singtel, StarHub, M1, Simba Telecom

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Targeted Attack: Cyber espionage group UNC3886 targeted Singapore's four major telecom companies: Singtel, StarHub, M1, and Simba Telecom.
  • Limited Exfiltration: The attackers successfully infiltrated some systems and stole a small amount of network-related data, but did not access personal data or disrupt services.
  • Attribution: UNC3886 has been described by security firm Mandiant as a "China-nexus espionage group" known for focusing on critical infrastructure in the U.S. and Asia.

Singapore's Cyber Security Agency (CSA) has confirmed that the nation's telecommunications infrastructure was targeted by the cyber espionage group UNC3886 in cyberattacks last year. The Singapore telecom cyberattack impacted all four major providers: Singtel, StarHub, M1, and Simba Telecom. 

The agency revealed that the threat actor successfully gained access to certain parts of the telecom systems. 

Impact and Scope of the Espionage Campaign

While the attackers achieved a degree of infiltration, their access was limited. The CSA stated that the group's actions did not disrupt telecom services and, critically, did not result in the compromise of any customer personal data. 

The primary objective of the UNC3886 cyberespionage campaign appears to have been intelligence gathering. This aligns with the known tactics of advanced persistent threat (APT) groups focused on reconnaissance.

The agency, cited by Reuters, confirmed the exfiltration of a "small amount of technical data," which is believed to be network-related information intended to support the threat actor's future operational objectives. 

Enhancing Telecom Infrastructure Security in Singapore

In response to the incident, the four telecom companies issued a joint statement acknowledging the persistent threats facing the industry. They emphasized their use of defence-in-depth mechanisms to protect networks and their commitment to prompt remediation when issues arise. 

This incident marks the first time the Singaporean government has specified the type of critical infrastructure targeted by this group, following a more general announcement last July about attacks on high-value strategic assets.

Last year, Australia’s privacy regulator filed a lawsuit against the nation’s telecommunications firm Optus, whose parent company is Singtel, for its alleged failure to safeguard customer data during the 2022 data breach.

A 2024 Mandiant report revealed that UNC3886, China-nexus group, exploited the now-patched CVE-2022-42475 vulnerability in FortiOS's Secure Sockets Layer (SSL) VPN to gain unauthorized access and collect credentials via Secure Shell (SSH) backdoors, extracted from TACACS+ authentication via custom malware.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: