/script src="https://cdn.jotfor.ms/agent/embedjs/019aed6b767f7ddf8a544a9c4d673d188bcb/embed.js">
Singapore's cybersecurity agency reported a state-linked espionage group targeted its telecom infrastructure, aiming to steal data and gain persistent access. The Cyber Security Agency of Singapore (CSA) has issued a detailed advisory confirming that a sophisticated, state-linked cyber espionage group conducted a sustained campaign targeting the country’s telecommunications infrastructure. According to the report, the threat actors, identified by the alias "Velvet Chameleon," employed advanced techniques to infiltrate networks, steal sensitive data, and establish long-term persistence within telecom systems. The campaign, which was detected and mitigated in late 2025, primarily sought access to carrier networks, subscriber databases, and critical network operations systems. The attackers utilized a combination of spear-phishing, exploitation of unpatched vulnerabilities in network appliances, and custom malware designed to evade traditional detection. The CSA stated that the group's tactics, techniques, and procedures (TTPs) align with those of a known advanced persistent threat (APT) group believed to operate in the interests of a foreign state. “This was not a rand...