
Singapore has mounted its largest coordinated cyber incident response effort to date after a sophisticated threat actor was found targeting the nation’s telecommunications backbone — the systems that keep everything from banking OTPs to government communications moving.
In a joint update on Monday, the Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA) revealed details of a multi-agency operation, Operation CYBER GUARDIAN, launched to counter an Advanced Persistent Threat (APT) actor tracked as UNC3886.
Also Read: After cyber attacks, silence can be the biggest brand killer: Penta’s Dan La Russo
Over 100 cyber defenders across CSA, IMDA, CSIT, the Digital and Intelligence Service (DIS), GovTech and the Internal Security Department (ISD), working alongside the country’s four major telcos: M1, SIMBA Telecom, Singtel, and StarHub, are involved in the operation.
The target set matters. Telcos are not “just another industry”; they are the connective tissue of a digital economy. If an attacker can burrow into telecom networks, they can potentially observe or manipulate traffic, map relationships, and position themselves for follow-on attacks, including against other critical sectors that rely on telecom infrastructure.
How the attackers got in, and what the scale looked like
CSA and IMDA characterised the campaign as “deliberate, targeted, and well-planned”, consistent with what cyber defenders typically expect from APT groups: patient intrusions designed to stay hidden long enough to extract strategic advantage rather than to smash-and-grab.
The agencies disclosed two key intrusion methods used by UNC3886:
- In one case, the attacker used a zero-day exploit to bypass a perimeter firewall, gaining access to telco networks. They “managed to exfiltrate a small amount of technical data”, believed to be network-related data intended to advance the actor’s operational goals.
- In another case, the attacker used rootkits and other advanced techniques to maintain persistent access, cover tracks, and evade detection — forcing defenders to perform comprehensive checks across networks to identify and flush out the intruder.
This is the uncomfortable truth of modern telecom security: even well-defended networks can be penetrated when attackers chain together previously unknown vulnerabilities, stealth tooling, and deep operational discipline.
As for the scale, the statement stops short of providing counts of compromised devices, affected sites, or dwell time per environment — likely because those details can help adversaries refine their methods.
What it does confirm is significant on its own:
- All four major telcos were targeted.
- The threat actor gained unauthorised access into some parts of telco networks and systems.
- In at least one instance, the actor obtained limited access to critical systems, but “did not get far enough to have been able to disrupt services”.
That combination — confirmed intrusion, but no confirmed customer data theft and no service disruption — points to a campaign that looks more like strategic reconnaissance and positioning than immediate monetisation. In other words, this was not a typical ransomware crew looking for a quick payday. It was closer to an adversary trying to understand, persist, and potentially hold options open.
Why a multi-agency operation is essential, and what it actually delivers
A telecom intrusion is not a “single-company incident” once it crosses certain thresholds. It becomes a national security problem because telecom networks intersect with emergency services, government communications, financial services, and the everyday operations of millions of residents and businesses.
Also Read: Southeast Asia’s cyber boom is fuelled by fear—and AI
That is why a multi-agency operation matters — not as bureaucratic theatre, but as a practical requirement:
- Speed and coordination across four telcos: When multiple operators are targeted, defenders need a unified view of tactics, techniques and procedures (TTPs) to prevent a whack-a-mole response where attackers simply hop to the next environment.
- Broader intelligence picture: Agencies such as ISD, DIS and CSIT can contribute threat intelligence and analytical capabilities that typical enterprise security teams may not have access to — especially for state-linked or state-grade actors.
- Specialised technical muscle: Rootkits and stealth persistence can require deep forensics, network-wide threat hunting, and high-confidence remediation. Coordinating that at national scale demands extra manpower and specialist tooling.
- Clear incident command: A large incident needs disciplined governance: who makes decisions, how evidence is handled, how remediation is sequenced, and how communications are managed without tipping off the attacker.
So what results will Operation CYBER GUARDIAN yield?
The agencies say defenders have:
- Limited the actor’s movement within networks;
- Implemented remediation measures and closed off access points;
- Expanded monitoring capabilities in the targeted telcos;
- Increased ongoing activities such as joint threat hunting, penetration testing, and “levelling up of capabilities”.
In plainer terms: the operation is intended to produce a cleaner network, fewer blind spots, and faster detection-and-response if UNC3886 attempts to re-enter — which the agencies explicitly warn may happen.
Has Singapore seen similar attacks before — and what does the world tell us?
Singapore has faced major cyber incidents in the past, including the 2018 SingHealth breach, which highlighted how determined attackers can target systems holding sensitive information. While that case was not a telecom network intrusion, it did shape the country’s posture around critical systems and the reality that sophisticated adversaries will target high-value national assets.
Globally, critical infrastructure has repeatedly been in the crosshairs. A few widely cited examples illustrate the spectrum of risk:
- Ukraine’s power grid attacks (2015/2016): Demonstrated that cyber operations can translate into real-world disruption.
- WannaCry (2017): Showed how fast-moving malware can cripple essential services, including healthcare systems.
- SolarWinds supply-chain compromise (2020): Proved that attackers can infiltrate many organisations at once by compromising a trusted supplier, then quietly expand access over time.
- Colonial Pipeline (2021): Underlined how cyberattacks can trigger broader economic and social disruption even when the target is not “digital-only”.
Telecommunications firms, in particular, have long been attractive to sophisticated actors because they sit on metadata, routing infrastructure, and signalling systems, and because compromising them can create downstream access to other targets.
Against that global backdrop, CSA and IMDA’s emphasis that this incident has “not resulted in the same extent of damage as cyberattacks elsewhere” reads as both reassurance — and a reminder that the ceiling for harm can be very high.
Does this incident bring ignominy to Singapore and its government?
Not in the way that term implies.
A headline-grabbing breach can feel like reputational damage, especially for a country that markets itself as a trusted digital hub. But sophisticated APT intrusions are not a simple scoreboard of competence versus incompetence; they are an ongoing contest between defenders and adversaries with significant resources.
Two points stand out from the government’s disclosure:
- Detection and escalation happened: The activity was “initially detected by the telcos”, which then notified IMDA and CSA — a sign that monitoring and reporting pathways functioned.
- Containment without confirmed service disruption or customer data theft: Based on the information shared, the operation prevented the incident from turning into a nationwide outage or confirmed mass data compromise.
Also Read: Are cyber attacks more life-threatening than we think?
If anything, the choice to disclose the operation — while holding back specifics that could compromise defences — signals an attempt to balance transparency with operational security.
Minister for Digital Development and Information Josephine Teo, speaking at an engagement event for cyber defenders involved in the operation, underscored the stakes and the shared responsibility. She said, “Your actions, or inaction, can determine whether we succeed or fail in protecting our critical infrastructure, and our national security. I urge all of you to continue investing in upgrading your systems as well as your capabilities”.
The broader message is clear: this is not a one-off firefight. It is a long campaign. And because telcos are “strategic targets for threat actors, including state-sponsored ones”, Singapore’s defence has to be equally strategic — spanning government, industry, and the broader cybersecurity ecosystem.
Operation CYBER GUARDIAN is, in effect, Singapore treating telecom cyber defence like what it is: national resilience work, not just IT housekeeping.
—
The image was created using AI.
The post Inside Singapore’s biggest telecom cyber defence operation appeared first on e27.
