Skip to content

The Blueprints are Gone: What the 11-Month UNC3886 campaign against SG Telcos Teaches us about Stealth Resilience

Published: at 03:00 AMSuggest Changes

Imagine waking up to find that a professional team of burglars has been living in your attic for nearly a year. They didn’t steal your jewellery, they didn’t touch your safe, and they certainly didn’t wake the dog. Instead, they spent eleven months meticulously photographing every structural beam, tracing every electrical wire, and mapping out the exact location of every silent alarm sensor in your home. They have left now, but they took the blueprints with them.

That is the chilling reality facing Singapore’s telecommunications sector following the February 2026 disclosures regarding ‘Operation Cyber Guardian’.

The details released by the Cyber Security Agency of Singapore (CSA) and the Infocomm Media Development Authority (IMDA) describe a campaign of unprecedented sophistication. For eleven months, a threat actor known as UNC3886—a group with suspected links to Chinese state interests—maintained a ghost-like presence within the core infrastructure of all four major Singaporean telcos: Singtel, StarHub, M1, and SIMBA Telecom.

Frankly, this wasn’t just another data breach. It was a masterclass in “stealth resilience” from the attacker’s side, and it serves as a wake-up call for every C-level executive who still believes a robust perimeter is enough to keep the wolves at bay.

The Ghost in the Machine: Who is UNC3886?

To understand why this breach is different, we have to look at the adversary. UNC3886 isn’t your garden-variety ransomware gang looking for a quick payday. I’ve spent two decades advising the likes of Cisco and BT on infrastructure security, and I can tell you: these guys are the elite of the elite.

While most attackers target the “soft” parts of a network—the users, the laptops, the email inboxes—UNC3886 goes for the “foundations”. They specialise in “edge” devices: the firewalls, routers, and VPN concentrators that sit at the very border of your network. Even more impressively, they have a terrifying knack for compromising the virtualisation layer—the hypervisors (like VMware ESXi) that host dozens of different servers on a single piece of hardware.

The bottom line is that they operate in the “grey space” of the network where traditional antivirus and Endpoint Detection and Response (EDR) tools often can’t see. By the time you’re looking for them on your servers, they’re already living inside the plumbing.

I remember advising a major regional bank back in 2018. They were incredibly proud of their “Air Gap” and their multi-million dollar firewall stack. We ran a red-team exercise, and we didn’t even try to hit their servers. We targeted the management interface of their storage controllers. Within four hours, we had total control over their data without ever “logging in” to a Windows or Linux machine. UNC3886 operates on that same philosophy, but at a national scale.

Operation Cyber Guardian: The 11-Month Chess Match

When the CSA launched Operation Cyber Guardian in March 2025, they weren’t just responding to a “ping” on a dashboard. This was a coordinated, multi-agency effort involving over 100 defenders from the CSA, IMDA, the Digital and Intelligence Service (DIS), and several other units.

The scale of the operation was breathtaking. We are talking about an eleven-month game of high-stakes chess played across the entire digital landscape of Singapore. What makes this particularly impressive—and terrifying—is that throughout this entire period, not a single customer lost internet service. Not a single phone call was dropped. The attackers were so careful, and the defenders so surgical, that the “business” of the nation continued as if nothing was wrong.

But underneath the surface, UNC3886 was busy. They used zero-day exploits—vulnerabilities that were previously unknown to the manufacturers—to bypass perimeter defenses. Once inside, they deployed custom rootkits that lived in the memory of the devices, making them nearly impossible to detect through standard reboots or file scans. They were even seen systematically clearing system logs and wiping their tracks with a level of discipline that would make a special forces unit blush.

Why ‘Technical Data’ is the Ultimate Prize

The official reports state that no personal customer data was compromised. For many, that’s a sigh of relief. “Oh, my credit card details are safe? Great, back to Netflix.”

But as a strategist, I find the theft of “network-related technical data” far more concerning than a million stolen passwords.

Think about it. If I steal your password, you change it. If I steal your credit card, you cancel it. But if I steal the “blueprints” of your entire telecommunications backbone—the IP addressing schemes, the routing tables, the physical path of the fibre optics, and the specific configuration of your core switches—you cannot just “change” that overnight.

By exfiltrating these technical maps, UNC3886 has essentially acquired the “cheat codes” for Singapore’s digital infrastructure. They know exactly where the bottlenecks are. They know which specific router, if disabled, would take down an entire industrial estate. They know how the traffic flows between government agencies and the public internet.

In the world of high-stakes espionage, this is called “Prepositioning”. They aren’t here to disrupt today; they are here to ensure they can disrupt tomorrow if they ever need to. This is about long-term strategic leverage.

The Myth of the Perimeter

For years, I’ve sat in boardrooms where the prevailing wisdom was to build a bigger, better wall. “Give me more firewalls!” the CTO would cry. Operation Cyber Guardian proves that the wall is a polite suggestion to an adversary like UNC3886.

If an attacker can exploit a zero-day in the very firewall that is supposed to protect you, then your perimeter doesn’t just fail; it becomes the attacker’s best friend. It provides them with a trusted vantage point from which to scan the rest of your network.

We need to move towards what I call “Intrinsic Resilience”. This isn’t just about “Zero Trust”—though that is a necessary component—it’s about accepting that the adversary is already inside.

I once worked with a transport conglomerate that had been breached. They were obsessed with finding the “entry point”. I told them, “Stop looking at the front door. Assume they climbed in through the chimney six months ago. The question isn’t how they got in; the question is why they’re still able to move around unnoticed.”

UNC3886 moved around for eleven months because telco networks are notoriously complex and often rely on “implicit trust” between different segments of the core. Operation Cyber Guardian has forced a rethink of this model, pushing for much deeper segmentation and a level of visibility that extends into the very “chips and wires” of the infrastructure.

Stealth Resilience: Lessons for the C-Suite

So, what does this mean for the rest of us who aren’t running national telcos? Whether you’re a VP of Operations at a manufacturing firm or a Director of IT at a healthcare provider, the lessons are universal.

1. Visibility must be deep, not just wide

Most companies have great visibility at the application layer. They know who logged into the HR system. But do they have any idea what’s happening at the hypervisor level? Do they monitor the configuration changes on their core switches? UNC3886 thrives in the shadows of the infrastructure. If you aren’t looking at the “hardware-software” interface, you’re blind.

2. The ‘Assume Breach’ Mindset is Mandatory

If you assume you will be breached, your investment priorities change. You spend less on the “wall” and more on “internal tripwires”. You start looking for anomalous “east-west” traffic—the movement of data between servers inside your network—rather than just “north-south” traffic moving in and out of the internet.

3. Public-Private Collaboration is the New Defensive Standard

The success of Operation Cyber Guardian wasn’t just due to the CSA’s brilliance. It was the fact that the telcos worked hand-in-hand with government agencies like the DIS and IMDA. In a world where threats are state-sponsored, private companies cannot be expected to defend themselves in isolation. We need to build these bridges before the crisis hits, not during it.

4. Technical Debt is a Security Risk

UNC3886 often targets older, unpatched, or “legacy” edge devices. In many cases, these devices are kept in service because they are “mission-critical” and the downtime to replace them is too high. Operation Cyber Guardian shows that the risk of keeping a vulnerable device is far higher than the risk of a scheduled maintenance window.

The Future of the Battlefield

The disclosures this February mark a turning point. We are no longer in the era of “smash and grab” cybercrime. We are in the era of “low and slow” strategic positioning.

The Digital and Intelligence Service (DIS) played a crucial role in this operation, reflecting the shift of cybersecurity into the realm of national defence. When the “blueprints” of your nation’s communications are at risk, it is no longer just an IT problem. It is a sovereignty problem.

The bottom line is this: The blueprints are gone. We have to operate under the assumption that the “map” of our infrastructure is known to our adversaries. Resilience now means the ability to operate effectively even when the enemy has the floor plan. It means being able to “change the locks” on the fly, to reroute traffic through uncompromised pathways, and to detect the tiniest flicker of an intruder’s shadow in the corner of a core router.

Final Thoughts

Operation Cyber Guardian was a victory for Singapore’s cyber defenders. They evicted a world-class threat actor without the public even noticing a glitch in their 5G signal. That is a remarkable achievement.

But we cannot be complacent. UNC3886 is already looking for the next zero-day. They are already analysing the network maps they stole.

As leaders, our job isn’t to promise that we will never be breached. That’s a lie. Our job is to ensure that when the breach happens, it doesn’t matter. We must build systems so resilient, so segmented, and so visible that even an adversary with the blueprints finds themselves trapped in a maze of our own making.

The era of the perimeter is over. The era of stealth resilience has begun. Are you ready to play the long game?


Previous Post
The $80 Billion Sovereignty Shift: Why Enterprises are 'Geopatriating' Workloads
Next Post
Accountability in Autonomy: Breaking Down Singapore’s World-First Agentic AI Governance Framework