Singapore, a global hub for finance, technology, and trade, has recently faced a sophisticated cyberattack targeting its critical infrastructure. The attack, attributed to the UNC3886 group, has raised questions about potential Chinese involvement, given reports linking the group to China.
Is China Conducting Cyber Attacks on Singapore?
On July 18, 2025, Singapore’s Coordinating Minister for National Security, K. Shanmugam, revealed that the nation is under attack by UNC3886, a highly sophisticated cyber espionage group. While Singaporean authorities have not directly named China as the sponsor, cybersecurity firm Mandiant, owned by Google, has described UNC3886 as a “China-nexus espionage group” targeting strategic organizations globally. These attacks focus on critical infrastructure sectors such as energy, water, banking, healthcare, transport, and telecommunications, posing a severe threat to Singapore’s national security and economy.
Does the UNC3886 Group Have Chinese Support?
Mandiant’s reports strongly suggest that UNC3886 is a state-sponsored group with ties to China, based on its targeting patterns, advanced techniques, and focus on geopolitical and economic espionage. The group’s operations align with China’s strategic interests, particularly in targeting defense, technology, and telecommunications sectors in the U.S. and Asia. However, the Chinese embassy in Singapore has firmly denied any connection, stating that UNC3886 “has nothing to do with China” and expressing “strong dissatisfaction” with media reports linking the group to Beijing. Without definitive public evidence, the question of Chinese support remains contentious, though expert analyses lean toward a China-nexus.
How Is UNC3886 Targeting Singapore?
UNC3886 employs advanced techniques to infiltrate Singapore’s critical infrastructure. The group is known for exploiting zero-day vulnerabilities—previously unknown software flaws—targeting network devices like Juniper Networks routers, Fortinet security systems, and VMware virtual machines. In Singapore, UNC3886 has been detected in critical information infrastructure (CII) that powers essential services. The group uses custom malware, living-off-the-land techniques (utilizing tools already on victims’ systems), and passive backdoors to evade detection and maintain long-term access. These methods allow UNC3886 to bypass firewalls and manipulate logs, making their activities akin to “modifying CCTV feeds to erase their presence.” The intent is clear: intelligence gathering and potential disruption of vital services.
What Are UNC3886’s Past Actions?
First identified by Mandiant in 2022, UNC3886 has a history of targeting high-value strategic organizations across the U.S., Europe, Asia, and Africa. Its focus includes defense, technology, telecommunications, aerospace, energy, and utility sectors. Notable past actions include:
2024 Juniper Networks Attack: UNC3886 deployed custom backdoors on end-of-life Juniper routers, exploiting vulnerabilities in Junos OS to gain persistent access.
Global Espionage Campaigns: The group has targeted government agencies and critical infrastructure, using zero-day exploits and advanced malware to conduct long-term spying.
Previous Singapore Incidents: While not explicitly linked to UNC3886, Singapore faced advanced persistent threat (APT) attacks in 2014 (Ministry of Foreign Affairs) and 2017 (National University of Singapore and Nanyang Technological University), targeting government and research data.
The group’s persistence is evident in its ability to re-enter networks even after detection, emphasizing its sophisticated and evasive nature.
How Is the Singaporean Government Viewing This?
The Singaporean government views UNC3886’s attacks as a “serious and ongoing” threat with the potential to undermine national security. Minister Shanmugam emphasized that the group targets “high-value strategic targets” and vital infrastructure, risking espionage and major disruptions. The Cyber Security Agency of Singapore (CSA) is actively responding, collaborating with the Singapore Armed Forces (SAF), Ministry of Defence (MINDEF), and other agencies in a whole-of-government approach. Singapore is also updating its Cybersecurity Act to enhance its powers against such threats. While authorities have named UNC3886 publicly to raise awareness, they are withholding specific details to preserve operational security, reflecting a cautious yet proactive stance.
Why Has China Denied This?
On July 19, 2025, the Chinese embassy in Singapore issued a statement denying any link to UNC3886, expressing frustration at being “smeared without basis.” China argues that it opposes all forms of cyberattacks, cracks down on them legally, and does not encourage or condone hacking activities. The denial aligns with Beijing’s consistent rejection of cyber espionage allegations, as seen in cases like the 2024 Salt Typhoon attack on U.S. infrastructure. China’s stance may stem from diplomatic efforts to avoid escalating tensions with Singapore, a key regional partner, and to maintain its image as a responsible global actor.
Is China’s Position Correct That It Is Also a Victim of Cyber Attacks?
China’s claim that it is a major victim of cyberattacks is plausible, as no nation is immune to cyber threats. The Chinese embassy stated, “China is one of the main victims of cyberattacks,” a position supported by the global nature of cybercrime. For instance, China has reported attacks on its infrastructure, and a 2024 data leak from Shanghai-based firm iSoon revealed domestic cybersecurity challenges. However, China’s claim is often used to deflect accusations, and its own cyber capabilities—bolstered by government-sponsored hacking competitions and private contractors—raise questions about the extent of its victimhood versus its role as an aggressor. Without transparent evidence, it’s challenging to fully validate China’s position, though cyberattacks are indeed a global issue affecting all nations.
The UNC3886 cyberattacks on Singapore highlight the growing threat of cyber espionage to global hubs like Singapore. While Mandiant links UNC3886 to China, the Chinese government denies involvement, emphasizing its own victimization by cyberattacks. Singapore’s response underscores the severity of the threat, with authorities mobilizing resources to protect critical infrastructure. As cyber warfare escalates globally, Singapore must strengthen its defenses and navigate complex geopolitical dynamics to safeguard its national security.



