Singapore says China-linked hackers targeted telecom providers in major spying campaign
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。好的,我得先仔细阅读一下这篇文章。 文章主要讲的是新加坡的网络安全局揭露了一个与中国有关的网络间谍组织UNC3886,他们针对新加坡的四大电信运营商进行了攻击。这个组织使用了高级工具,潜伏时间很长。新加坡方面没有透露太多技术细节,但提到至少有一次利用了未知的软件漏洞。攻击没有导致服务中断或客户数据泄露。 用户的需求是总结内容,控制在100字以内。我需要抓住关键点:谁、做了什么、结果如何。所以重点包括:新加坡当局、中国关联的网络间谍组织、四大电信运营商、高级工具、长期潜伏、攻击细节有限、未造成影响。 然后我要把这些信息浓缩成简洁的句子,确保不超过100字。可能需要合并一些信息,比如提到攻击的目标和结果,以及新加坡的回应。 最后检查一下是否符合要求:中文总结,不使用特定开头,控制在100字内。确保没有遗漏重要信息,并且表达清晰。 </think> 新加坡当局披露一中国关联网络间谍组织针对该国四大电信运营商发动定向攻击,使用高级工具长期潜伏。尽管未造成服务中断或客户数据泄露,但凸显电信基础设施面临的高风险。 2026-2-9 12:46:8 Author: therecord.media(查看原文) 阅读量:2 收藏

Singapore authorities said Monday that a sophisticated China-linked cyber espionage group carried out a targeted campaign against all four of the country’s major telecommunications operators.

In a statement, the Cyber Security Agency of Singapore (CSA) said the threat actor known as UNC3886 was behind what it described as a “deliberate, targeted, and well-planned” operation against M1, SIMBA Telecom, Singtel and StarHub. The group used advanced tools to infiltrate telecom networks and maintain long-term covert access, the agency said.

Singapore first disclosed the attacks on critical infrastructure in July but did not provide details at the time, saying it would assess whether further disclosure was in the national interest.

Following the initial findings, Singapore launched an operation called Cyber Guardian, which officials described as the country’s largest cyber incident response effort to date. The operation lasted more than 11 months and involved more than 100 cyber defenders from multiple government agencies.

Officials said the attackers gained unauthorized access to parts of telecom networks and, in one case, reached limited portions of critical systems. They said there were no service disruptions and no evidence customer data was accessed.

“There is no evidence to date that sensitive or personal data, such as customer records, was accessed or exfiltrated,” CSA said, adding there was also no indication telecommunications services were disrupted.

Authorities did not provide a detailed technical account of the attacks but said that in at least one case, the group exploited a previously unknown software vulnerability to gain access to internal systems. In another incident, the hackers used “advanced tools” to maintain persistent access and evade detection.

Singapore warned that telecommunications infrastructure remains a high-value target for advanced threat actors, including state-backed groups, because of its importance to national security and economic stability.

“We must be prepared for future attempts to gain access to our telco infrastructure,” CSA said.

The Chinese embassy in Singapore did not publicly respond to the latest disclosure. Beijing has repeatedly denied conducting cyber espionage operations abroad.

Security researchers have described China-linked UNC3886 as a “highly disciplined and stealthy” state-linked threat actor. Google has warned that the group targets strategic organizations globally and has linked it to campaigns deploying custom backdoors on network infrastructure, including Juniper routers

The group has also been associated with compromises involving Fortinet and VMware systems targeting defense, government, technology, and telecommunications organizations.

Singapore has previously faced intrusions that investigators, cited by Bloomberg, said were tied to Chinese advanced persistent threat groups. In 2024, Bloomberg said the China-linked Volt Typhoon group was believed to have breached Singtel, the country’s largest mobile carrier.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/singapore-attributes-telecoms-hacks-unc3886
如有侵权请联系:admin#unsafe.sh