Current Cyber Threats

OT-ISAC Warns Singapore Critical Infrastructure of UNC3886 Exploiting Zero-Days in Fortinet, VMware,

Summary:
The OT-ISAC (Operational Technology) has issued a threat alert regarding an active and highly coordinated cyber-espionage campaign by the Chinese state-sponsored APT group UNC3886, which is targeting Singapore's critical infrastructure. UNC3886, active since at least 2021, exploits zero-day vulnerabilities in FortiOS, VMware, Juniper, and ESXi hypervisors. Some of the first public research on the group was published by Mandiant in 2022. Their custom toolkit, including MOPSLED and RIFLESPINE, is designed for persistence and evasion across OT and virtualization layers. The group employs a layered infiltration strategy, utilizing zero-day exploits, living-off-the-land techniques, SSH credential harvesting, and backdoors via legitimate services like Google Drive and GitHub, while also tampering with logs. They are actively targeting sectors such as energy, water, telecommunications, finance, and government services, with the potential for cascading operational disruptions across interconnected critical infrastructure.

Security Officer Comments:
The ongoing campaign by UNC3886 against Singapore's critical infrastructure signifies a noteworthy escalation of Chinese state-sponsored cyber-espionage, with the group exemplifying state actors’ proficiency in exploiting zero-day vulnerabilities and maintaining stealthy, long-term persistence. Their focus on operational technology and virtualization layers highlights a dangerous understanding of industrial control systems and the potential for cascading physical impacts beyond traditional IT disruptions that only affect one isolated sector. The use of custom malware and legitimate services for command and control underscores their adept capabilities to successfully perform long-term persistence operations. OT-ISAC recommends immediate patching, enhanced monitoring, robust credential authentication hygiene, network segmentation, and comprehensive incident response preparedness.

Suggested Corrections:
  • Hardening and patching
    • Apply latest patches to Fortinet, VMware, Juniper devices; remove or isolate deprecated hardware.
  • Enhanced monitoring & detection
    • Deploy network device integrity checks (e.g., Juniper JMRT scans); monitor log tamperingincidents.
    • Integrate detections for MOPSLED, RIFLESPINE, REPTILE, LOOKOVER under MITRE ATT&CKframework, and monitor for anomalous C2 traffic to GitHub or Google Drive.
  • Credential hygiene and segmentation
    • Rotate SSH and account credentials; monitor TACACS+ usage; implement strong identityverification and MFA on device admin access.
  • Forensics and Incident Response Preparedness
    • Maintain offline firmware and backup configurations for all critical devices.
    • Run integrity and rootkit scans; ensure incident response plans include virtualization and networkdevice remediation.
  • Forward‑Looking Threat Detection
    • Integrate updated IOC and TTPs on UNC3886 into shared intelligence feeds.
    • Perform regular red‑teaming around OT systems, especially edge routers and virtualization layers.
    • Emphasize multi‑layer resilience, network, host, and application visibility plus anomaly detection.
Link(s):
https://industrialcyber.co/critical-infrastructure/ot-isac-warns-singapore-critical-infrastructure-of-unc3886-exploiting-zero-days-in-fortinet-vmware-juniper-systems/

PDF: https://www.otisac.org/_files/ugd/5f2206_430b10915fee4e44bb946de942b19655.pdf