Threat Actor Profile
Description
UNC3886 is a China-nexus cyberespionage group that has been active since at least 2022, targeting defense, technology, and telecommunication organizations located in the United States and the Asia-Pacific-Japan (APJ) regions. UNC3886 has displayed a deep understanding of edge devices and virtualization technologies through the exploitation of zero-day vulnerabilities and the use of novel malware families and utilities.(Citation: Mandiant Fortinet Zero Day)(Citation: Google Cloud Threat Intelligence VMWare ESXi Zero-Day 2023)
Confidence Score
Known Aliases
Tags
First Seen
Unknown
Last Updated
Unknown
Active Status
ActiveCreated
April 29, 2026
MITRE ATT&CK Techniques (49)
AI Threat Intelligence Report
April 29, 2026 14:31Threat Intelligence Report: UNC3886
Automated AI-generated threat intelligence report for UNC3886.
View full AI reportIndicators of Compromise
Loading IOCs…
IOC KQL for Sentinel
STIX Data
{'aliases': ['UNC3886'],
'created': '2025-05-29T20:48:42.051Z',
'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'description': '[UNC3886](https://attack.mitre.org/groups/G1048) is a '
'China-nexus cyberespionage group that has been active since '
'at least 2022, targeting defense, technology, and '
'telecommunication organizations located in the United States '
'and the Asia-Pacific-Japan (APJ) regions. '
'[UNC3886](https://attack.mitre.org/groups/G1048) has '
'displayed a deep understanding of edge devices and '
'virtualization technologies through the exploitation of '
'zero-day vulnerabilities and the use of novel malware '
'families and utilities.(Citation: Mandiant Fortinet Zero '
'Day)(Citation: Google Cloud Threat Intelligence VMWare ESXi '
'Zero-Day 2023)',
'external_references': [{'external_id': 'G1048',
'source_name': 'mitre-attack',
'url': 'https://attack.mitre.org/groups/G1048'},
{'description': 'Alexander Marvi, Brad Slaybaugh, Ron '
'Craft, and Rufus Brown. (2023, June '
'13). VMware ESXi Zero-Day Used by '
'Chinese Espionage Actor to Perform '
'Privileged Guest Operations on '
'Compromised Hypervisors. Retrieved '
'March 26, 2025.',
'source_name': 'Google Cloud Threat Intelligence '
'VMWare ESXi Zero-Day 2023',
'url': 'https://cloud.google.com/blog/topics/threat-intelligence/vmware-esxi-zero-day-bypass/'},
{'description': 'Marvi, A. et al.. (2023, March 16). '
'Fortinet Zero-Day and Custom Malware '
'Used by Suspected Chinese Actor in '
'Espionage Operation. Retrieved March '
'22, 2023.',
'source_name': 'Mandiant Fortinet Zero Day',
'url': 'https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem'}],
'id': 'intrusion-set--461b8e25-8f4a-4ea2-a4a8-e39df7ce6630',
'modified': '2025-10-24T03:55:02.289Z',
'name': 'UNC3886',
'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
'revoked': False,
'spec_version': '2.1',
'type': 'intrusion-set',
'x_mitre_attack_spec_version': '3.3.0',
'x_mitre_deprecated': False,
'x_mitre_domains': ['enterprise-attack'],
'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
'x_mitre_version': '1.0'}