Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The state of DevOps and AI: Not just hype

      September 1, 2025

      A Breeze Of Inspiration In September (2025 Wallpapers Edition)

      August 31, 2025

      10 Top Generative AI Development Companies for Enterprise Node.js Projects

      August 30, 2025

      Prompting Is A Design Act: How To Brief, Guide And Iterate With AI

      August 29, 2025

      Look out, Meta Ray-Bans! These AI glasses just raised over $1M in pre-orders in 3 days

      September 2, 2025

      Samsung ‘Galaxy Glasses’ powered by Android XR are reportedly on track to be unveiled this month

      September 2, 2025

      The M4 iPad Pro is discounted $100 as a last-minute Labor Day deal

      September 2, 2025

      Distribution Release: Linux From Scratch 12.4

      September 1, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025
      Recent

      Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

      September 2, 2025

      August report 2025

      September 2, 2025

      Fake News Detection using Python Machine Learning (ML)

      September 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025
      Recent

      Installing Proxmox on a Raspberry Pi to run Virtual Machines on it

      September 2, 2025

      Download Transcribe! for Windows

      September 1, 2025

      Microsoft Fixes CertificateServicesClient (CertEnroll) Error in Windows 11

      September 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»‘UNC3886 is Attacking Our Critical Infrastructure Right Now’: Singapore’s National Security Lawmaker

    ‘UNC3886 is Attacking Our Critical Infrastructure Right Now’: Singapore’s National Security Lawmaker

    July 18, 2025

    UNC3886, Critical Infrastructure, Singapore, Singapore Critical Infrastructure, National Security

    In a rare and urgent late-night address, a senior Singapore official confirmed that the country is currently facing a sophisticated and ongoing cyberattack targeting its critical infrastructure. The attack is attributed to UNC3886, a suspected China-nexus advanced persistent threat (APT) actor previously associated with espionage campaigns targeting U.S. and Asian defense and tech sectors.

    Coordinating Minister for National Security, K Shanmugam, called the threat “serious and ongoing,” warning that UNC3886 is actively attempting to compromise Singapore’s power, telecommunications, water, and transportation systems.

    “UNC3886 poses a serious threat to us and has the potential to undermine our national security,” the official said. “Even as we speak, UNC3886 is attacking our critical infrastructure right now.” – K Shanmugam

    Who Is UNC3886

    UNC3886 is a highly advanced, state-sponsored cyber espionage group, strongly suspected to be linked to China. A defining characteristic of UNC3886 is their exceptional ability to discover and exploit zero-day vulnerabilities in network devices and virtualization software. According to multiple threat intelligence reports, the group is also known for using living-off-the-land techniques, and operating in air-gapped or segmented environments to maintain undetected access.

    Also read: Researchers Deep Dive into UNC3886 Actors’ Cyberespionage Realm

    Their operational methods are marked by extreme sophistication and evasiveness. UNC3886 employs a diverse toolkit including custom malware (like VIRTUALSHINE and TINYSHELL-based backdoors), publicly available rootkits, and intricate techniques to disable logging and remove traces of their activity. They prioritize maintaining long-term, stealthy access to compromised systems, often through multiple layers of persistence and by abusing legitimate credentials obtained via methods like SSH backdoors or targeting authentication servers.

    First identified by Mandiant in 2022, UNC3886 has demonstrated a unique capability to compromise high-value targets by exploiting vulnerabilities in widely used products from vendors such as VMware, Fortinet, and Juniper Networks. Their focus on zero-day exploits, coupled with their highly covert and persistent operational style, positions them as one of the most dangerous and challenging cyber adversaries currently operating on the global stage.

    Targeting the Lifelines of the State

    Specifics of the current attack were not disclosed due to “national security concerns” but the Shanmugam said the targets include high-value national assets.

    “The intent of this threat actor is quite clear—it is going after high-value strategic targets: vital infrastructure that delivers essential services.” – K Shanmugam

    The gravity of such intrusions is not hypothetical. A successful breach into Singapore’s energy grid, for instance, could cascade into failures across healthcare, water, and transport systems. “Our economy can be substantially impacted,” Shanmugam warned. “Banks, airports, industries would not be able to operate.”

    Prepared but Realistic

    Singapore’s Cyber Security Agency (CSA), in coordination with other national agencies and Critical Information Infrastructure (CII) owners, is actively mitigating the ongoing threat. The speaker reiterated that the country has robust incident response plans but tempered expectations given the sophistication of state-sponsored attackers.

    “We are up against very sophisticated actors, some backed by countries with vast resources—unlimited almost—in manpower and technology,” Shanmugam said. “Even countries at the frontier of technology have not been able to prevent APT attacks on their systems.”

    Trust and Reputation at Stake

    Perhaps the most sobering part of the address was a clear recognition of what’s at stake: trust.

    “Trust and confidence in Singapore as a whole can be affected,” the official said. “Businesses may shy away if they are unsure about our systems—whether they are clean, resilient, and safe.”

    Singapore has long prided itself as a global business hub. But in a landscape where cyber resilience is becoming a key metric of economic stability, its digital infrastructure is now squarely part of its national brand.

    The situation remains fluid. Authorities have promised to reassess whether more details can be released publicly. In the meantime, Singapore is rallying its resources and international partners to keep systems secure.

    The message is clear: the island nation is under digital siege—but it is not standing still.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleManage multi-tenant Amazon Bedrock costs using application inference profiles
    Next Article DevOps won’t scale without platform engineering and here’s why your teams are still stuck

    Related Posts

    Development

    Enhanced Queue Job Control with Laravel’s ThrottlesExceptions failWhen() Method

    September 2, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 2, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Postgres RAG Stack: Embedding, Chunking & Vector Search

    Development

    CVE-2025-39454 – Jeroen Peters Name Directory Missing Authorization Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-9786 – Campcodes Online Learning Management System SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    Rilasciata Rocky Linux 9.6: Nuova Versione Basata su Red Hat Enterprise Linux 9.6

    Linux

    Highlights

    CVE-2025-7207 – mruby Heap-Based Buffer Overflow Vulnerability

    July 9, 2025

    CVE ID : CVE-2025-7207

    Published : July 9, 2025, 1:15 a.m. | 5 hours, 22 minutes ago

    Description : A vulnerability, which was classified as problematic, was found in mruby up to 3.4.0-rc2. Affected is the function scope_new of the file mrbgems/mruby-compiler/core/codegen.c of the component nregs Handler. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The name of the patch is 1fdd96104180cc0fb5d3cb086b05ab6458911bb9. It is recommended to apply a patch to fix this issue.

    Severity: 3.3 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    This beastly 500W charger replaced every other charger I had – with six ports to boot

    June 16, 2025

    Gemma 3 27B model now available on Amazon Bedrock Marketplace and Amazon SageMaker JumpStart

    May 28, 2025

    When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider

    September 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.