Chinese Cyberspies Breach Singapore’s Four Largest Telcos

Related

Pentagon CIO Kirsten Davies Announces New Team Appointments

What happened Pentagon Chief Information Officer Kirsten Davies announced several...

Carnival Corporation Probes Data Breach After Claims of 8.7 Million Records Theft

What happened Carnival Corporation is investigating a potential data breach...

Grinex Exchange Blames Western Intelligence for $13.7M Crypto Hack

What happened Kyrgyzstan-based cryptocurrency exchange Grinex suspended operations on April...

Payouts King Ransomware Uses QEMU VMs to Bypass Endpoint Security

What happened Sophos researchers have documented two active campaigns in...

Share

What happened

Security agencies in Singapore confirmed that state-linked Chinese cyberspies breached the networks of the country’s four largest telecommunications providers: Singtel, StarHub, M1, and Simba Telecom. According to the report, the Singapore government disclosed that malicious activity attributed to a China-linked advanced persistent threat involved unauthorized access to internal systems at all four telcos. The intrusions were uncovered during government-led forensic investigations and were linked through shared infrastructure and tactics associated with Chinese cyber-espionage operations. Authorities stated that the attackers established persistent access within the affected environments, enabling long-term surveillance and data collection activities. The breaches were assessed as part of coordinated espionage operations rather than isolated incidents, with compromises occurring months before detection.

Who is affected

Singtel, StarHub, M1, and Simba Telecom are directly affected, as unauthorized access to their internal networks allowed threat actors to maintain persistent presence and conduct espionage activity.

Why CISOs should care

The compromise of multiple national telecommunications providers in a single espionage campaign highlights the strategic value of telecom infrastructure and the elevated risk posed by state-linked threat actors targeting core communications networks.

3 practical actions

  • Strengthen internal segmentation. Limit lateral movement across telecom network environments.
  • Detect persistence mechanisms. Monitor for long-lived unauthorized accounts and covert access paths.
  • Coordinate with government agencies. Share telemetry and findings with national cybersecurity authorities to support collective defense.