Date of Incident:
2024
Overview:
In 2024, the APT group UNC3886 breached Singapore’s four major telecom companies—Singtel, StarHub, M1 Limited, and TPG Telecom. The attackers accessed some critical systems but failed to cause service disruptions or access sensitive customer data. Techniques used included exploiting public-facing applications and leveraging valid accounts, with attempts at lateral movement using PowerShell. Custom backdoors and RATs were deployed, using DNS tunneling for communication. However, the breach was limited in scope with unsuccessful attempts at executing significant impact actions, such as encrypting data. Compromised indicators included Chinese IP ranges and modified registry keys, but no data exfiltration was detected.
>>Outpace Attackers With AI-Based Automated Penetration Testing
Impact:
Hackers gained limited access to critical systems but did not pivot deep enough to disrupt services. No evidence of sensitive customer data accessed or stolen, and no service disruptions.
Details:
The UNC3886 breach involved APT group UNC3886 compromising Singapore’s four largest telecommunications companies including Singtel, StarHub, M1 Limited, and TPG Telecom. MITRE ATT&CK techniques used include T1190 (Exploit Public-Facing Application), T1078 (Valid Accounts), T1059 (Command and Scripting Interpreter) with evidence of PowerShell usage for lateral movement attempts which were incomplete, and T1486 (Data Encrypted for Impact) which was not successfully executed. The attackers deployed custom backdoors and RATs with C2 communications over DNS tunneling. Indicators of Compromise (IOCs) include suspicious IP ranges from China (203.208.60.0/24), domain names used for C2, hashes of dropped DLLs (e.g., d41d8cd98f00b204e9800998ecf8427e), and registry keys modified under HKLM\Software\Microsoft\Windows\CurrentVersion\Run for persistence. Logs showed event ID 4625 (failed logons) and cmd.exe invocation patterns consistent with reconnaissance scripts. No evidence of data exfiltration was found, and the intrusion was limited in scope without pivoting into critical backend systems.
Remediation:
Telecommunications vendors issued emergency patches closing exploited vulnerabilities involving web interfaces and RDP services. Recommendations included immediate credential resets, enhanced network segmentation to isolate critical infrastructure, and deployment of advanced endpoint detection and response (EDR) solutions. Temporary mitigations involved disabling legacy protocols and restricting PowerShell execution policies via Group Policy Objects (GPOs). Continuous network monitoring for anomalous DNS traffic was enforced to detect tunneling attempts.
Takeaway for CISO:
Although the breach was contained without service disruption or sensitive data loss, it underscores the persistent threat posed by sophisticated nation-state actors targeting critical telecom infrastructure. CISOs must prioritize proactive vulnerability management, strict access controls, zero trust network architectures, and continuous behavioral monitoring to detect and mitigate early-stage intrusions before lateral movement and data exfiltration can occur.
