Singapore's Critical Infrastructure (2025)

Incident Insights & Impact

Singapore's government, through Coordinating Minister for National Security K. Shanmugam, disclosed on July 18, 2025, that the China-linked advanced persistent threat (APT) group UNC3886 was conducting ongoing cyberattacks against the nation's critical infrastructure. This includes sectors like energy, water, finance, transportation, government, telecommunications, and emergency services. UNC3886, linked to sophisticated espionage activities, is known for it’s ability to exploit zero-day vulnerabilities in firewalls and connecting systems from vendors such as Fortinet, VMware, Juniper and others. The group normally then deploys custom malware for stealthy, long-term access and forensic log manipulation.

While no specific data exfiltration or disruptions have been publicly detailed due to security sensitivities, the group's persistent presence signals high risks to operational continuity and national security. Suspected APT incidents in Singapore have surged more than fourfold from 2021 to 2024, prompting enhanced defenses and public awareness to counter potential economic and service impacts.

Who is at Risk?

  • Critical Information Infrastructure (CII): energy, finance, communications, transportation, security, emergency services, and government
  • High-Stakes & International Commerce: e-commerce, shipping, banking transfers, blockchain validators and miners, defence applications, and foreign relations.
  • Dignitaries & High-Profile Individuals: CEOs, COOs, military personnel, celebrities, etc.

What is the Risk?

  • Network Hardware: unpatched systems like firewalls, VPNs, and routers are susceptible to known zero-day exploits; updated systems are susceptible to unknown zero-days.
  • Hidden Software Flaws: Attackers exploit unknown weaknesses in commonly used systems, sneaking in without detection.
  • Deep Network Access: By targeting core IT systems and virtual environments, attackers gain long-term control over critical operations.
  • Hard-to-Spot Attacks: Hackers use everyday tools and erase their tracks, making it tough to catch them in action.
  • Widespread Disruptions: A single breach could ripple across industries, causing power cuts, transport chaos, or healthcare failures.
  • Slow Response Challenges: Interconnected systems, complex regulations, and limited real-time monitoring make it hard to respond quickly and effectively.

Entropya’s Solutions

Entropya’s approach offers robust defense:

  • Digital Camouflage: Eliminate the attack surface by hiding your critical digital infrastructure from spying and analytic tools.
  • Encrypted Entropya Network (EEN): Implement the highest grade of quantum-ready cryptography, the EEN applies Zero Trust architecture to data transport while delivering uncompromising performance, seamless integration, and quantum-readiness for highly sensitive needs.
  • Even if devices are compromised from insider threats, attackers cannot map or move laterally - you can't attack what you can't find.
  • Entropya's model supports low-to-no config and rapid cross-sector deployment. It works seamlessly with legacy infrastructure, reducing costs of integration. 

Want to Disappear from the Map?

If your organization handles critical infrastructure or sensitive operations and data, now is the time to adopt Entropya’s Solutions.

Your systems are vulnerable. Act today to fortify against relentless cyber attacks!

Contact us today to become untraceable.