UNC3886
Chinese state-sponsored (China-nexus, Mandiant designation) · Signals intelligence / telecoms infrastructure access
Tactics, Techniques & Procedures (TTPs)
- Zero-day exploitation of network edge devices — Fortinet FortiGate, VMware ESXi, Juniper routers
- REPTILE Linux rootkit for deep kernel-level persistence
- MEDUSA Linux rootkit for credential harvesting
- VMware VMCI socket exploitation for hypervisor-to-guest lateral movement
- Targeting of infrastructure outside standard EDR visibility (network appliances, hypervisors)
- Living-off-the-land using native network device management tools
Known Targets
Analyst Notes
Responsible for the compromise of all four major Singapore telecommunications operators, triggering Operation CYBER GUARDIAN — the largest coordinated cyber defence operation in Singapore's history. UNC3886 is notable for its exclusive focus on network edge devices and hypervisors, which sit outside the visibility of most enterprise EDR tools. The dual-rootkit approach (REPTILE for persistence, MEDUSA for credential theft) creates deep, resilient implants that survive reboots and patching cycles. Zero-day stockpiling against Fortinet and VMware platforms indicates substantial pre-campaign investment.
Also Known As