Movatterモバイル変換


[0]ホーム

URL:


Sign in / up
The Register

Cyber-crime

Singapore spent 11 months booting China-linked snoops out of telco networks

Operation Cyber Guardian involved 100-plus staff across government and industry

iconCarly Page
Tue 10 Feb 2026 //13:43 UTC

Singapore spent almost a year flushing a suspected China-linked espionage crew out of its telecom networks in what officials describe as the country's largest cyber defense operation to date.

The Cyber Security Agency of Singaporesaid advanced persistent threat UNC3886 dug itself into the networks of all four major telecom providers, sparking an 11-month digital eviction effort involving more than 100 personnel from across government, military, intelligence, and industry. Branded "Operation Cyber Guardian," the cleanup saw the state and telco engineers teaming up to flush the intruders out while keeping the nation's phone and data pipes flowing.

"Over the past months, our investigations have indicated that UNC3886 had launched a deliberate, targeted, and well-planned campaign against Singapore's telecommunications sector," the CSA said.

Officials stopped short of formally pointing the finger at Beijing, but UNC3886 has long been associated with Chinese state-aligned cyber espionage. The group tends to skip flashy break-ins on user machines and instead sneaks into the dull but revealing parts of network infrastructure, where traffic flows quietly and almost nobody is paying attention.

According to Singapore's account, the attackers slipped past perimeter defenses using a previously unknown flaw, then dug in using custom rootkits that let them stay hidden deep inside telecom systems. Officials didn't say what bugs had been exploited, but UNC3886 waspreviously observed exploiting zero-day flaws in FortiGate firewalls, VMware ESXi, and VMware vCenter Server endpoints.

Investigators believe the operation focused on siphoning off technical network information that could support long-term intelligence collection, rather than stealing customer records or causing outages that might draw attention.

The tactics will sound familiar to anyone who has followed recent telecom-focused espionage campaigns. The operation bears a strong resemblance to the China-backed Salt Typhoon espionage campaign uncovered in 2024, which also went after telecom providers across several countries using similar infrastructure-level tricks to quietly watch data and communications traffic. 

That kind of access is why telecom breaches tend to ring louder alarm bells than the average hack. Operators sit at the intersection of government communications, enterprise data, and consumer traffic, making them attractive targets for states looking to map networks, monitor flows, or set the stage for future intelligence operations.

Singapore described Operation Cyber Guardian as its "largest coordinated cyber incident response effort undertaken to date." Cleaning up involved identifying compromised devices, sealing off attacker access paths, patching vulnerabilities, and ramping up monitoring to ensure the intruders didn't simply circle back.

Singapore warned that telecom networks will remain prime targets and urged operators to assume sophisticated actors are already probing their defenses. ®


More like these

More about


COMMENTS

More about

More like these

TIP US OFF

Send us news


Other stories you might like

Indian conglomerate Adani plans very slow $100 billion AI datacenter build

PM Modi tells citizens AI will lift them up, not take their jobs
Public Sector18 Feb 2026 |

Anthropic's latest Sonnet gets better at using computers, amid bouts of existential angst

Version 4.6 can also be 'warm, honest, prosocial, and at times funny'
AI + ML18 Feb 2026 |

China-linked snoops have been exploiting Dell 0-day since mid-2024, using 'ghost NICs' to avoid detection

Full scale of infections remains 'unknown'
Cyber-crime18 Feb 2026 |

Why high-performance Java is becoming a business imperative

A new generation of JVM technologies is reshaping how businesses build, deploy, and scale mission-critical Java applications.
Sponsored Feature

Gemini lies to user about health info, says it wanted to make him feel better

Though commonly reported, Google doesn't consider it a security problem when models make things up
AI + ML17 Feb 2026 |7

Amazon's $200 billion capex plan: How I learned to stop worrying and love negative free cash flow

It isn't insane, and Amazon will be fine when the music stops. Other players, maybe not so much
On-Prem17 Feb 2026 |4

Infosys bows to its master, signs deal with Anthropic

After a selloff fueled by fears AI could upend the outsourcing model
AI + ML17 Feb 2026 |1

China remains embedded in US energy networks 'for the purpose of taking it down'

Plus 3 new goon squads targeted critical infrastructure last year
Cyber-crime17 Feb 2026 |6

GPU who? Meta to deploy Nvidia CPUs at large scale

CPU adoption is part of deeper partnership between the Social Network and Nvidia which will see millions of GPUs deployed over next few years
Systems17 Feb 2026 |

AI gets all the good stuff, including Micron's speedy 28 GB/s PCIe 6.0 SSD

Consumers have a long wait ahead of them before they can bring that kind of performance home
Storage17 Feb 2026 |2

AI bit barns grow climate emergency by turning up the gas

Companies talk renewables while firing up gas turbines as fast as they can
Systems17 Feb 2026 |6

Scientists show it's possible to solve problems in your dreams by playing the right sounds

Could the same method one day power sleep-time ads?
Science17 Feb 2026 |13

[8]ページ先頭

©2009-2026 Movatter.jp