Executive Summary
In July 2025, Singapore's four major telecommunications providers—Singtel, StarHub, M1, and SIMBA Telecom—were targeted by the Chinese state-sponsored cyber espionage group UNC3886. The attackers employed sophisticated techniques, including rootkits and zero-day exploits in firewalls, to gain unauthorized access to parts of the telecom networks. Despite these efforts, the intrusion did not disrupt services or result in the exfiltration of sensitive customer data. The Singaporean government, in collaboration with the affected telcos, launched Operation Cyber Guardian, a coordinated response involving over 100 personnel from various agencies, to contain and mitigate the threat. (channelnewsasia.com)
This incident underscores the persistent and evolving nature of cyber threats targeting critical infrastructure. The use of advanced tools and tactics by UNC3886 highlights the need for continuous vigilance and robust cybersecurity measures within the telecommunications sector to safeguard against potential future attacks.
Why This Matters Now
The attack on Singapore's telecom infrastructure by UNC3886 highlights the escalating sophistication of state-sponsored cyber threats targeting critical infrastructure. As cyber espionage groups continue to evolve their tactics, it is imperative for organizations to enhance their cybersecurity posture to prevent potential disruptions and data breaches.
Attack Path Analysis
UNC3886 exploited a zero-day vulnerability in a firewall to gain initial access to Singapore's major telecom networks. They deployed rootkits to maintain persistence and evade detection. The attackers moved laterally within the networks, accessing critical systems. They established command and control channels to exfiltrate a small amount of technical data. No significant data exfiltration or service disruption occurred. The impact was limited due to effective detection and response measures.
Kill Chain Progression
Initial Compromise
Description
UNC3886 exploited a zero-day vulnerability in a firewall to gain initial access to the telecom networks.
Related CVEs
CVE-2022-41328
CVSS 7.1A path traversal vulnerability in Fortinet FortiOS allows an attacker to read and write arbitrary files, potentially leading to code execution.
Affected Products:
Fortinet FortiOS – < 7.2.0
Exploit Status:
exploited in the wildCVE-2022-42475
CVSS 9.8A heap-based buffer overflow vulnerability in Fortinet FortiOS SSL-VPN allows a remote unauthenticated attacker to execute arbitrary code via specially crafted requests.
Affected Products:
Fortinet FortiOS – < 7.2.3
Exploit Status:
exploited in the wildCVE-2022-22948
CVSS 6.5An out-of-bounds write vulnerability in VMware vCenter Server allows a malicious actor with network access to execute arbitrary code.
Affected Products:
VMware vCenter Server – < 7.0.3
Exploit Status:
proof of conceptCVE-2023-20867
CVSS 3.9An authentication bypass vulnerability in VMware Tools allows a malicious actor to execute privileged commands on the guest operating system.
Affected Products:
VMware VMware Tools – < 12.1.0
Exploit Status:
proof of conceptCVE-2023-34048
CVSS 9.8An out-of-bounds write vulnerability in VMware vCenter Server allows a malicious actor with network access to execute arbitrary code.
Affected Products:
VMware vCenter Server – < 7.0.3
Exploit Status:
proof of concept
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Server Software Component: Web Shell
Application Layer Protocol: Web Protocols
Encrypted Channel: Symmetric Cryptography
System Information Discovery
Network Service Discovery
Remote Services: Remote Desktop Protocol
Impair Defenses: Disable or Modify Tools
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure all system components are protected from known vulnerabilities
Control ID: 6.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity Verification and Authentication
Control ID: Pillar 1: Identity
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Telecommunications
Primary target of Chinese APT attacks requiring advanced encryption, zero trust segmentation, and threat detection capabilities to protect critical infrastructure communications.
Government Administration
High-value APT target requiring enhanced east-west traffic security, multicloud visibility, and egress policy enforcement to prevent state-sponsored lateral movement attacks.
Computer/Network Security
Must provide advanced threat detection, anomaly response, and cloud native security fabric solutions to defend against sophisticated zero-day APT campaigns.
Information Technology/IT
Critical need for Kubernetes security, encrypted traffic protection, and hybrid connectivity solutions to secure infrastructure against persistent state-sponsored threats.
Sources
- Singapore & Its 4 Major Telcos Fend Off Chinese Hackershttps://www.darkreading.com/cyberattacks-data-breaches/singapore-major-telcos-fend-chinese-hackersVerified
- Largest Cyber Operation Mounted to Counter UNC3886's Threathttps://www.imda.gov.sg/resources/press-releases-factsheets-and-speeches/press-releases/2026/largest-cyber-operation-mounted-to-counter-unc3886-threatVerified
- S’pore’s four major telcos came under attack by cyber espionage group UNC3886https://www.straitstimes.com/tech/spores-four-major-telcos-came-under-attack-by-cyber-espionage-group-unc3886Verified
- Singapore: Rootkits, Zero-Day Used in Chinese Attack on Major Telecom Firmshttps://www.securityweek.com/singapore-rootkits-zero-day-used-in-chinese-attack-on-major-telecom-firmsVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While initial access may still occur, CNSF would likely limit the attacker's ability to exploit the compromised firewall to further infiltrate the network.
Control: Zero Trust Segmentation
Mitigation: Zero Trust Segmentation would likely limit the attacker's ability to escalate privileges by enforcing strict access controls between workloads.
Control: East-West Traffic Security
Mitigation: East-West Traffic Security would likely reduce the attacker's ability to move laterally by monitoring and controlling internal traffic flows.
Control: Multicloud Visibility & Control
Mitigation: Multicloud Visibility & Control would likely limit the attacker's ability to establish command and control channels by providing comprehensive monitoring across cloud environments.
Control: Egress Security & Policy Enforcement
Mitigation: Egress Security & Policy Enforcement would likely limit the attacker's ability to exfiltrate data by enforcing strict outbound traffic policies.
The overall impact would likely be reduced, with constrained attacker outcomes and minimized risk to critical assets.
Impact at a Glance
Affected Business Functions
- Network Operations
- Customer Data Management
- Service Provisioning
Estimated downtime: N/A
Estimated loss: N/A
Limited technical data related to network configurations was exfiltrated; no sensitive customer data was accessed.
Recommended Actions
Key Takeaways & Next Steps
- • Implement inline intrusion prevention systems (IPS) to detect and block exploitation attempts of zero-day vulnerabilities.
- • Deploy zero trust segmentation to limit lateral movement within the network.
- • Enhance east-west traffic security to monitor and control internal communications.
- • Establish multicloud visibility and control to detect and respond to anomalies across cloud environments.
- • Enforce egress security and policy enforcement to prevent unauthorized data exfiltration.



