logo
Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam

Critical infrastructure in Singapore under attack by cyber espionage group: Shanmugam

The Star19-07-2025
SINGAPORE: The authorities are dealing with an ongoing attack on Singapore's critical information infrastructure by a state-sponsored cyber espionage group, UNC3886.
Naming the nation's attacker for the first time on Friday (July 18), Coordinating Minister for National Security K. Shanmugam said that Singapore is facing serious threats from state-linked advanced persistent threat (APT) actors.
These are well-resourced attackers that use sophisticated techniques to evade detection. They lurk in networks to spy over the long term, to steal sensitive information or disrupt essential services, among other objectives.
'UNC3886 poses a serious threat to us, and has the potential to undermine our national security,' said Shanmugam at the Cyber Security Agency of Singapore's (CSA) 10th anniversary dinner at Sands Expo and Convention Centre.
'Even as we speak, UNC3886 is attacking our critical infrastructure right now.'
Shanmugam, who is also Home Affairs Minister, did not disclose UNC3886's sponsors, but experts have said that the group is linked to China.
Cyber-security firm Mandiant first detected the Chinese espionage group in 2022. UNC3886 is said to have targeted prominent strategic organisations – including those in the defence, technology and telecommunication sectors – on a global scale.
APT hackers like UNC3886 gain unauthorised access into networks by employing techniques such as custom malware and tools available on the victim's system to evade detection.
Zero-day exploits, which are unpatched vulnerabilities, are also typically used to gain entry to networks.
Shanmugam said CSA and relevant agencies are actively dealing with the attack, and are working with relevant critical information infrastructure owners.
Describing UNC3886 as highly sophisticated and persistent in victim networks, he said: 'The intent of this threat actor in attacking Singapore is quite clear. They are going after high-value, strategic targets – vital infrastructure that delivers our essential services.
'If it succeeds, it can conduct espionage, and it can cause major disruption to Singapore and Singaporeans.'
Shanmugam said the number of suspected APT attacks in Singapore has increased more than fourfold from 2021 to 2024.
Illustrating how APTs seriously threaten national security, Shanmugam said a cyber attack on Singapore's power system could disrupt its electricity supply, which could have a knock-on effect on other essential services such as healthcare or transport.
'There are also economic implications. Our banks, airport and industries would not be able to operate. Our economy can be substantially affected,' he said.
Attacks on Singapore's telco systems and payment systems can have very serious consequences too, he added.
He said attacks on the nation's systems and infrastructure will impact how it does business, with Singapore having to relook its vendors and supply chains.
Trust and confidence in Singapore as a whole can also be affected, he added.
'Businesses may shy away if they are unsure about our systems – whether the systems are clean, resilient, safe,' he said.
Shanmugam cited APT attacks in Ukraine that caused a power outage. He also cited a cyber attack on a South Korean telecommunications company in April 2025 that exposed the SIM data of nearly 27 million users and caused widespread concern in the country.
'Singapore has been attacked as well. We are a relevant country geopolitically. We are a digital and data hub that connects the world,' he said. 'People want to get into our systems, to both influence us and threaten us.'
He highlighted some attacks from APT actors in Singapore that have been made public, but where the culprits were not named due to national security reasons.
These include an incident in 2014 when the authorities detected a security breach in the Ministry of Foreign Affairs' technology systems. Steps were taken to isolate the affected devices, and the networks were strengthened following the discovery.
In what was the first sophisticated attack against universities here, NUS and NTU discovered intrusions in their networks in 2017.
No classified data or student personal data was stolen. But the attackers were believed to have targeted the two institutions to steal government and research data. The universities were involved in government-linked projects for the defence, foreign affairs and transport sectors.
Then in 2018, Singapore experienced its worst data breach involving the personal particulars of 1.5 million patients, including then Prime Minister Lee Hsien Loong.
The attacker in the SingHealth breach was said to be persistent in its efforts to penetrate the network, bypass the security measures, and illegally access and exfiltrate data.
The attacker is believed to have lurked in the healthcare group's network for at least nine months. Its mission: to access SingHealth's electronic medical records system, which is critical information infrastructure in Singapore.
The unauthorised transfer of sensitive data took place in 2018.
Most recently in 2024, about 2,700 devices in Singapore were discovered to have been infected after CSA took part in a cyber operation against a global botnet.
APT hackers behind the botnet exploited poor cyber hygiene practices to infect devices, including baby monitors and internet routers. No critical information infrastructure was affected by the attack.
Shanmugam said Singapore has been and continues to be attacked by cyber threat actors.
He cited a survey which showed that nearly 80 per cent of organisations in Singapore have experienced some form of cyber attack.
At the event on July 18, CSA chief executive David Koh noted that cyberspace is contested, and that the agency is on the front line of this dynamic domain.
'We will continue to be agile, to adapt to emerging threats, and to demonstrate our collective will and commitment to secure Singapore's cyberspace,' he added. - The Straits Times/ANN
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Nvidia denies back-door features in its H20 chips after Beijing raises security concerns
Nvidia denies back-door features in its H20 chips after Beijing raises security concerns

The Star

time9 hours ago

  • The Star

Nvidia denies back-door features in its H20 chips after Beijing raises security concerns

Nvidia said its chips had no 'back doors' after China's cyberspace regulator interviewed company representatives over alleged security risks associated with its H20 chips, which were tailor-made for Chinese customers, although it remains unclear what impact Beijing's mistrust of the US firm will have over time. 'Cybersecurity is critically important to us,' an Nvidia representative said in an email to the South China Morning Post on Thursday night. 'Nvidia does not have 'back doors' in our chips that would give anyone a remote way to access or control them.' The statement was in response to a regulatory move by the Cyberspace Administration of China (CAC), the agency responsible for the country's cybersecurity. The Chinese regulator said on Thursday that it had summoned and interviewed Nvidia regarding the potential tracking and remote control functions of its H20 chips, a surprise move as Nvidia had just received the green light from Washington to export the chips to clients in China. Nvidia's shares were down 0.8 per cent on Thursday in New York. The latest development highlights the challenges faced by Nvidia, the world's most valuable company in terms of market capitalisation, in trying to please both Washington and Beijing amid intensifying US-China rivalry in artificial intelligence and hi-tech. While China needs Nvidia chips to build out its computing infrastructure, Beijing remains committed to the long-term goal of tech self-sufficiency by reducing its reliance on imported American equipment and technologies. In the latest example of that, a group of Chinese semiconductor and AI companies – including Huawei Technologies, Cambricon Technologies and Moore Threads – formed an alliance to push for the adoption of locally developed processors for AI projects. China's cyberspace administration did not specify the source or evidence for its concerns about back-door security threats associated with Nvidia chips. In May, a bipartisan group of US lawmakers introduced a bill that would require makers of AI processors to incorporate tracking technology in their chips before export. The proposal aimed to address reports of US export-controlled AI chips being smuggled into China via third countries. But Nvidia has never said that its H20 chips have such tracking functions. The summoning of Nvidia was the latest example of the long-lasting mistrust between Beijing and Washington over the other's tech hardware. The US has banned the use of Huawei gear in the American telecommunications network, while new guidelines from the administration of US President Donald Trump implied that the use of Huawei's Ascend AI chips 'anywhere in the world' could be a violation of US export controls. For its part, China accelerated the process of replacing imported technologies in its key infrastructure facilities about a decade ago, after former US National Security Agency contract employee Edward Snowden exposed the global spying practices of the US. In May 2023, the CAC said products from another US chip giant, Micron Technology, failed a national security review, resulting in a sales ban of its products to key infrastructure operators in China. - SOUTH CHINA MORNING POST

Tourist caught at border after overstaying social visit pass
Tourist caught at border after overstaying social visit pass

New Straits Times

time9 hours ago

  • New Straits Times

Tourist caught at border after overstaying social visit pass

BUKIT KAYU HITAM: A Chinese national was detained at the Immigration, Customs, Quarantine and Security Complex (ICQS) here on Friday after officers found that he had overstayed in Malaysia, over a month. Malaysian Border Control and Protection Agency (MBCA) in a statement today said the 39-year-old man was stopped during a routine inspection around 1pm as he attempted to exit the country into Thailand. Checks on his passport, MBCA said, revealed that his last recorded entry into Malaysia was on May 30 via the Sultan Abu Bakar Complex in Tanjung Kupang, Johor. "His social visit pass had expired and there was no exit endorsement from Thailand, confirming that he had overstayed in Malaysia for 34 days," it said. The man has since been arrested under Section 15(1)(c) of the Immigration Act 1959/63 (Amendment 2002) and handed over to the Immigration Department for further action. MCBA advised all foreigners residing in Malaysia to be mindful of their visa expiry dates and to renew their passes on time or leave the country before they expire.

What are China's most dynamic cities? New report gives surprising answer
What are China's most dynamic cities? New report gives surprising answer

The Star

time10 hours ago

  • The Star

What are China's most dynamic cities? New report gives surprising answer

China's most dynamic local economies are no longer metropolises like Beijing and Shanghai, but lesser-known cities including Hangzhou and Hefei, according to a new report by the Economist Intelligence Unit. The findings reflect a growing shift in China's economic landscape, as smaller cities emerge as a main engine of growth due to their strength in advanced manufacturing, clean energy and other emerging sectors. The annual report by the EIU ranks Chinese cities in terms of their growth potential, with the eastern city of Hangzhou – home to e-commerce giant Alibaba, artificial intelligence start-up DeepSeek, and several other major technology companies – topping the list for the fifth consecutive year. It was followed in the ranking by Hefei – an eastern city known for being a hub for semiconductor and electric car companies – and the southwestern industrial powerhouse of Chengdu. Shenzhen, often dubbed China's Silicon Valley, placed fifth, while Beijing, Guangzhou and Shanghai all failed to make the top 10. The results 'capture the rise of manufacturing and the decline of the service sector' in China, economists Xu Tianzeng and Su Yue wrote in the report, as a prolonged property downturn drags down consumer spending and the economy continues to rely on strong production. Most of the top-ranked cities have benefited from China's advanced manufacturing boom, recording strong economic growth and attracting significant population inflows over the past two years. According to the report, Hangzhou has made a strong recovery from Beijing's regulatory crackdowns on the tech sector launched in 2021. 'The city has since reasserted its leadership in China's artificial intelligence race, driven by major players like DeepSeek, while also leveraging its strengths in advanced manufacturing,' the authors wrote, noting that Hangzhou has one of the most robust fiscal positions of cities nationwide. Hangzhou is home to China's 'six little dragons' – a group of high-profile tech start-ups including DeepSeek, humanoid robot maker Unitree Robotics and Neuralink rival BrainCo. Local authorities in Zhejiang, the eastern province where Hangzhou is located, have put a strong emphasis on supporting hi-tech companies. Last week, the province released a draft action plan for boosting local innovation, which set a target that over 80 per cent of its new listed companies should come from the tech sector by 2027. Meanwhile, Hefei and Chengdu have both 'made bold, strategic investments in foundational technologies' to drive their development, the report said. Hefei has invested heavily in CXMT, a major producer of dynamic random access memory (DRAM) chips, which is now preparing for an initial public offering. The company is widely regarded as China's best hope of competing with South Korea and the United States in the global memory chip market. Chengdu has also invested in the semiconductor company Hygon, a joint venture with US chipmaker AMD. 'These ventures have not only generated substantial returns for the two cities, but have laid the groundwork for broader industrial ecosystems with surrounding cities,' the report's authors said. They noted that the broader metropolitan area covering the core cities of Chengdu, Deyang, Meishan and Ziyang logged an average growth rate of more than 7 per cent in the first quarter of 2025 – making it one of the country's fastest-growing regions. Similarly, China's clean energy push is powering significant growth in smaller cities with established manufacturing bases for renewable energy technologies, according to the report. Xinyu and Yichun in the eastern Jiangxi province, for instance, have seen their growth boosted by rising demand for lithium-rich ores from the electric vehicle and energy storage sectors. Meanwhile, Jinchang in the northwestern Gansu province recorded an impressive average annual growth rate of 12.9 per cent between 2022 and 2024, as demand for renewable energy infrastructure boosted the city's non-ferrous metals industry. But smaller cities that are riding high thanks to the green transition also face 'vulnerabilities', the report noted. 'These include exposure to commodity price cycles, external trade shocks and spillover effects from overcapacity rectification in downstream industries,' it said. - South China Morning Post

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store