This operation tested Singapore’s resilience like nothing before. Operation Cyber Guardian was not a paper exercise; it was a sustained, gritty response to an adversary that refuses to play by the rules. When UNC3886 found a zero-day at a telco perimeter firewall and began to roam, logs were altered, backdoors were planted, and stealth became the attackers’ default posture. The response had to be surgical, relentless and coordinated — exactly that was delivered.
Why this mattered — and fast
Telecommunications are the nervous system of modern life. When Singtel, StarHub, M1 and Simba Telecom showed signs of infiltration, containment could not wait. The attack exploited a previously unknown vulnerability at the outermost line of defence — a zero-day — and then expanded using advanced malware such as the Medusa rootkit. That tool enabled credential theft, lateral movement and the concealment of secondary payloads. Detection was made harder by deliberate log tampering. A visible footprint was erased, leaving only faint traces and a long, painstaking hunt to reconstruct events.
Scale and choreography
More than 100 defenders from six government agencies and four telcos came together. Names included the Cyber Security Agency, IMDA, CSIT, DIS, GovTech and ISD. This was a multi-agency, whole-of-nation response. That kind of scale matters because no single team has all capabilities. Purple teaming — simulated attacks by a red team matched against blue team defences — became a central tool. Simulate. Validate. Close gaps. Repeat. It sounds methodical because it was. But method alone would not have worked without trust, stamina and the willingness to push through long nights.
Technique: the adversary’s playbook
UNC3886’s playbook combined surgical exploitation and surgical concealment. First: exploit the unknown — the zero-day at the perimeter firewall. Second: deploy a stealthy rootkit that bypasses commercial antivirus solutions. Third: remove traces — logs and system evidence were altered or deleted. Fourth: build and maintain elegant backdoors that sidestep conventional authentication pathways. The goal was persistent, low-profile access; the means were technically sophisticated and operationally disciplined.
When defenders closed external access points and rotated credentials, UNC3886 adapted, pulling back and waiting, attempting to maintain a foothold without drawing attention. That cat-and-mouse dance required patience and persistence by defenders who were scraping through massive volumes of network telemetry and system artifacts.
What protection looked like in practice
Logs were rebuilt where possible. The handful of surviving artifacts were treated like gold. Threat hunting shifted from broad sweeps to micro-investigations, examining timing, behavioral anomalies and sequences of actions that made little sense unless stitched together. Credentials were reset. Access pathways were sealed. Backdoors were hunted and removed. Where evidence suggested data movement, everything was analysed to determine scope. The conclusion: exfiltration was primarily network-related, and no evidence indicated customer records or sensitive personal data were taken. That outcome did not come by chance. It came because defenders acted deliberately, fast and together.
Human cost, human grit
A late-night memory remains vivid: a cluttered operations room, the glow of monitors, cups of coffee going cold, and a steady thrum of conversation as analysts traced a single suspicious handshake across logs. Frustration flared when a promising lead evaporated after an attacker’s log wipe. But fatigue was met by discipline. Teams rotated, documentation was kept immaculate, and the collective focus never softened. The emotional arc moved from anxious to resolute to quietly proud. That is the spirit that wins these fights.
Collaboration as strategy
One hard lesson stands out: cybersecurity is a team sport. Tactical skills matter, but so do relationships. Mutual trust enabled swift sharing of indicators, coordinated containment actions and consistent messaging. Agencies brought different capabilities — legal hindsight, threat intelligence, forensic depth, operational reach — and telcos brought domain knowledge of their networks. The combined force produced outcomes unattainable by any single actor. This was not mere cooperation; it was integrated execution.
Lessons for SMEs and leaders
- Assume breaches will happen. Preparation is the multiplier that turns a crisis into a contained incident.
- Segment networks. Perimeter failures are survivable when internal lateral movement is constrained.
- Prioritise logging and immutable storage. An attacker who can erase traces is exponentially harder to hunt.
- Practice purple teaming regularly. Simulated, iterative exercises expose real gaps before adversaries do.
- Invest in relationships. Trusted partners shorten mean time to respond when seconds count.
Closing thoughts
Operation Cyber Guardian sent a clear signal: resilience demands constant vigilance, technical rigor and the humility to collaborate. UNC3886 demonstrated capability and cunning. The response demonstrated resolve and craftsmanship. For Singapore’s digital ecosystem, the episode served as a reminder and a call to action — prepare, test, and never underestimate the value of a well-coordinated defence. Experience shows that determination, discipline and a willingness to hunt methodically are the decisive variables in these engagements.
When the dust settles, reflections will be written, and playbooks refined. Meanwhile, the work continues. Systems must be hardened, detection tuned, and partnerships deepened. There will be more runs at the perimeter. The measure of readiness will be how quickly and cleanly those future runs are stopped. That is an outcome that needs to be engineered — deliberately, now.

