{"id":11661,"date":"2026-02-10T11:23:07","date_gmt":"2026-02-10T11:23:07","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11661"},"modified":"2026-02-10T11:23:07","modified_gmt":"2026-02-10T11:23:07","slug":"singapore-rootkits-zero-day-utilized-in-chinese-language-assault-on-main-telecom-corporations","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11661","title":{"rendered":"Singapore: Rootkits, Zero-Day Utilized in Chinese language Assault on Main Telecom Corporations"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>All 4 main telecommunications suppliers in Singapore had been focused final 12 months by a Chinese language APT, in keeping with Singapore\u2019s cybersecurity company CSA and its improvement company IMDA.<\/strong><\/p>\n<p>The assault, initially disclosed in July, was attributed to UNC3886, a cyberespionage group energetic since not less than 2021, which is thought for focusing on vulnerabilities in <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/chinese-cyberspies-use-new-malware-in-ivanti-vpn-attacks\/\">Ivanti<\/a>, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/mandiant-uncovers-custom-backdoors-on-end-of-life-juniper-routers\/\">Juniper<\/a>, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/chinese-spies-exploited-vmware-vcenter-server-vulnerability-since-2021\/\">VMware<\/a> merchandise.<\/p>\n<p>\u201cUNC3886 launched a deliberate, focused, and well-planned marketing campaign towards Singapore\u2019s telecommunications sector. All 4 of Singapore\u2019s main telecommunications operators \u2013 M1, SIMBA Telecom, Singtel and StarHub \u2013 have been the goal of assaults,\u201d CSA <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.csa.gov.sg\/news-events\/press-releases\/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector\/\">says<\/a>.<\/p>\n<p>As a part of the marketing campaign, the company notes, the APT deployed superior instruments, together with a zero-day exploit in a firewall, to entry a telco\u2019s community and acquire a small quantity of technical knowledge.<\/p>\n<p>UNC3886 was additionally seen deploying rootkits to evade detection and preserve persistent entry to the compromised environments.<\/p>\n<p>CSA says UNC3886 gained restricted entry to some components of the sufferer firms\u2019 networks and programs, however couldn&#8217;t disrupt companies.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>\u201cThere isn&#8217;t a proof to-date that delicate or private knowledge resembling buyer information had been accessed or exfiltrated. There&#8217;s additionally no proof that the menace actor managed to disrupt telecommunications companies resembling web availability,\u201d CSA says.<\/p>\n<p>The cybersecurity company says it has been working with the focused organizations to analyze the intrusions, shut the menace actor\u2019s entry, implement remediation measures, and broaden monitoring capabilities throughout the impacted networks.<\/p>\n<p>\u201cWhereas our collective efforts have contributed to containing the assaults up to now, we should be ready that there could also be future makes an attempt to achieve entry into our telco infrastructure. Telcos are strategic targets for menace actors, together with state-sponsored ones,\u201d CSA notes.<\/p>\n<p>The company says it&#8217;s going to introduce initiatives to enhance Singapore\u2019s cyber capabilities and guarantee higher and quicker response to comparable assaults.<\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/chinese-spies-target-networking-and-virtualization-flaws-to-breach-isolated-environments\/\">Chinese language Spies Goal Networking and Virtualization Flaws to Breach Remoted Environments<\/a><\/p>\n<p><strong>Associated: <\/strong><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/notepad-supply-chain-hack-conducted-by-china-via-hosting-provider\/\">Notepad++ Provide Chain Hack Performed by China by way of Internet hosting Supplier<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/eu-plans-phase-out-of-high-risk-telecom-suppliers-in-proposals-seen-as-targeting-china\/\">EU Plans Section Out of Excessive Threat Telecom Suppliers, in Proposals Seen as Concentrating on China<\/a><\/p>\n<p><strong>Associated:<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear\/\">China-Linked Hackers Exploiting Zero-Day in Cisco Safety Gear<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>All 4 main telecommunications suppliers in Singapore had been focused final 12 months by a Chinese language APT, in keeping with Singapore\u2019s cybersecurity company CSA and its improvement company IMDA. The assault, initially disclosed in July, was attributed to UNC3886, a cyberespionage group energetic since not less than 2021, which is thought for focusing on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11663,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[717,851,1018,967,7785,7608,4976,4218],"class_list":["post-11661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-attack","tag-chinese","tag-firms","tag-major","tag-rootkits","tag-singapore","tag-telecom","tag-zeroday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11661"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11661\/revisions"}],"predecessor-version":[{"id":11662,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11661\/revisions\/11662"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11663"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-12 17:07:20 UTC -->