M1, Singtel, StarHub and Simba Telecom: What is UNC3886, the group that attacked Singapore’s telcos

M1, Singtel, StarHub and Simba Telecom: What is UNC3886, the group that attacked Singapore’s telcos

Singapore’s Major Telcos Targeted by State-Linked Cyberespionage Group UNC3886

On February 9, Singapore’s Minister for Digital Development and Information, Josephine Teo, disclosed that all four of the country’s major telecommunications providers Singtel, StarHub, M1, and Simba Telecom were targeted by the advanced persistent threat (APT) group UNC3886, a China-linked cyberespionage actor.

First identified in 2022 by cybersecurity firm Mandiant, UNC3886 is known for its persistent, sophisticated attacks aimed at intelligence gathering and long-term surveillance. The group employs zero-day exploits vulnerabilities unknown to vendors to infiltrate network devices, virtualization systems, and critical infrastructure. It also uses custom malware and legitimate system tools to evade detection, making it particularly difficult to counter.

While no sensitive data was confirmed to have been exfiltrated, authorities warned of the potential fallout. A successful breach could disrupt telecom and internet services, cascading into sectors like banking, finance, transport, and healthcare all part of Singapore’s 11 critical services sectors. Minister Teo emphasized that even limited access could erode trust in Singapore’s digital infrastructure and economic security.

The Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA) revealed that UNC3886’s activities were detected in parts of the country’s critical information infrastructure as early as July 18, 2025. Though the group managed to steal a small amount of technical data, 5G networks and other core systems remained uncompromised due to separate security measures.

UNC3886 has a history of targeting high-value sectors globally, including government, defense, energy, and telecommunications. Past attacks have exploited vulnerabilities in Juniper Networks routers, Fortinet security devices, and VMware virtual machines. The group’s persistence was underscored by Minister Teo, who noted that even if detected and removed, UNC3886 would likely attempt re-entry.

The incident follows a pattern of escalating cyber threats against Singapore. Previous APT attacks include the 2014 breach of the Ministry of Foreign Affairs, the 2017 intrusions at NUS and NTU (targeting government-linked research), and the 2018 SingHealth data breach, which exposed the personal data of 1.5 million patients, including then-Prime Minister Lee Hsien Loong. More recently, in 2024, a global botnet infected 2,700 devices in Singapore, though no critical infrastructure was affected.

While Singapore’s defenses prevented significant damage in this case, authorities stressed that the threat remains ongoing, with UNC3886’s tactics continuing to evolve.

Source: https://www.straitstimes.com/tech/what-is-unc3886-the-group-that-attacked-singapores-telco-infrastructure

M1 TPRM report: https://www.rankiteo.com/company/m1-limited

Singtel TPRM report: https://www.rankiteo.com/company/singtel

StarHub TPRM report: https://www.rankiteo.com/company/starhub

Simba Telecom TPRM report: https://www.rankiteo.com/company/simba-telecom

"id": "simstasinm1-1770638462",
"linkid": "simba-telecom, starhub, singtel, m1-limited",
"type": "Cyber Attack",
"date": "2/2026",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'industry': 'Telecommunications',
                        'location': 'Singapore',
                        'name': 'Singtel',
                        'type': 'Telecommunications provider'},
                       {'industry': 'Telecommunications',
                        'location': 'Singapore',
                        'name': 'StarHub',
                        'type': 'Telecommunications provider'},
                       {'industry': 'Telecommunications',
                        'location': 'Singapore',
                        'name': 'M1',
                        'type': 'Telecommunications provider'},
                       {'industry': 'Telecommunications',
                        'location': 'Singapore',
                        'name': 'Simba Telecom',
                        'type': 'Telecommunications provider'}],
 'attack_vector': ['Zero-day exploits',
                   'Custom malware',
                   'Legitimate system tools'],
 'data_breach': {'data_exfiltration': 'Small amount of data stolen',
                 'type_of_data_compromised': 'Technical data'},
 'date_detected': '2025-07-18',
 'date_publicly_disclosed': '2025-02-09',
 'description': 'Singapore’s Minister for Digital Development and Information '
                'disclosed that all four of the country’s major '
                'telecommunications providers (Singtel, StarHub, M1, and Simba '
                'Telecom) were targeted by the advanced persistent threat '
                '(APT) group UNC3886, a China-linked cyberespionage actor. The '
                'group employed zero-day exploits and custom malware to '
                'infiltrate network devices and critical infrastructure, with '
                'potential risks to Singapore’s digital and economic security.',
 'impact': {'brand_reputation_impact': 'Potential erosion of trust in digital '
                                       'infrastructure',
            'data_compromised': 'Small amount of technical data',
            'operational_impact': 'Potential disruption to critical services '
                                  'sectors (banking, finance, transport, '
                                  'healthcare)',
            'systems_affected': 'Telecommunications infrastructure (non-core '
                                'systems)'},
 'investigation_status': 'Ongoing',
 'lessons_learned': 'The incident highlights the persistent and evolving '
                    'nature of state-linked cyber threats, the importance of '
                    'securing critical infrastructure, and the need for '
                    'continuous monitoring and adaptive defenses.',
 'motivation': 'Intelligence gathering, long-term surveillance',
 'post_incident_analysis': {'root_causes': 'Exploitation of zero-day '
                                           'vulnerabilities in network devices '
                                           'and virtualization systems, use of '
                                           'custom malware and legitimate '
                                           'tools for evasion.'},
 'references': [{'source': 'Mandiant'},
                {'source': 'Singapore Ministry of Digital Development and '
                           'Information'}],
 'regulatory_compliance': {'regulatory_notifications': 'Cyber Security Agency '
                                                       'of Singapore (CSA), '
                                                       'Infocomm Media '
                                                       'Development Authority '
                                                       '(IMDA)'},
 'response': {'communication_strategy': 'Public disclosure by Minister '
                                        'Josephine Teo'},
 'stakeholder_advisories': 'Authorities warned of potential fallout to '
                           'critical services sectors and erosion of trust in '
                           'digital infrastructure.',
 'threat_actor': 'UNC3886',
 'title': 'Singapore’s Major Telcos Targeted by State-Linked Cyberespionage '
          'Group UNC3886',
 'type': 'Cyberespionage',
 'vulnerability_exploited': ['Juniper Networks routers',
                             'Fortinet security devices',
                             'VMware virtual machines']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.