Flashpoints

Calibrated Signals: How Middle Powers Are Rewriting the Rules of Cyber Attribution in the Indo-Pacific.

Recent Features

Flashpoints | Security

Calibrated Signals: How Middle Powers Are Rewriting the Rules of Cyber Attribution in the Indo-Pacific.

As threats mount and great power tensions deepen, Singapore, Samoa, and others are crafting a new response to cyberattacks.

Calibrated Signals: How Middle Powers Are Rewriting the Rules of Cyber Attribution in the Indo-Pacific.
Credit: Unsplash

On July 18, Singapore’s Minister for Home Affairs and Law K. Shanmugam stood before reporters and delivered a warning that reverberated far beyond the city-state’s borders. An advanced and persistent threat actor, known in cybersecurity circles as UNC3886, had been targeting Singapore’s critical infrastructure, banking systems, energy grids, water networks, and transport hubs. Shanmugam’s statement was a rare moment of strategic transparency for a government typically circumspect in the cyber domain.

Yet, amid the gravity of the disclosure, a deliberate ambiguity remained. While Shanmugam named the actor, he stopped short of explicitly attributing the campaign to a nation-state, specifically to China. In doing so, Singapore chose a path of calibrated attribution: revealing just enough to signal capability and resolve, but not so much as to risk diplomatic rupture. In this carefully measured approach lies a story of geopolitics in a region where power dynamics are shifting rapidly, and where the rules of engagement are still being written.

Across the Indo-Pacific, a new cyber doctrine is emerging among middle powers. As regional cyber threats mount and great power tensions deepen, countries such as Singapore, Samoa, and others are beginning to articulate strategies that assert digital sovereignty while presenting strategic autonomy. They are opting for attribution that is technically precise but diplomatically restrained, a form of sovereign signaling that eschews overt confrontationalism while subtly affirming their place in the digital order.

For over a decade, cyber attribution has served as a cornerstone of Western cyber diplomacy. The United States, United Kingdom, Australia, Canada, New Zealand, and their allies, including Japan and South Korea, have routinely issued public statements attributing malicious cyber operations to state-linked actors. These statements are often accompanied by sanctions, indictments, or coordinated public condemnation. The logic is twofold: to expose malign activity and deter future aggression.

But in the Indo-Pacific, the political calculus is more delicate. Many states in the region maintain deep economic ties with China, even as they find themselves the target of increasingly sophisticated Chinese cyber operations. The Five Eyes model, with its declaratory posture and punitive response, is not easily transplanted into this context.

Singapore’s attribution of UNC3886 illustrates this tension. Mandiant, a leading U.S. cybersecurity firm, has tracked the group since 2022, linking it to cyberespionage campaigns across the defense, telecommunications, and energy sectors in Asia and the United States. The group is known for exploiting zero-day vulnerabilities and for its use of stealthy persistence mechanisms, tampering with logs, re-entering networks post-remediation, and concealing its presence within critical systems.

By publicly naming UNC3886 but declining to name its sponsor, Singapore signaled both its awareness of the threat and a refusal to be cast into a binary geopolitical frame. It was a calibrated assertion of sovereign agency, without geopolitical recrimination. 

Singapore is not alone. In February 2025, the government of Samoa, a state of fewer than 250,000 people, made history by becoming the first Pacific Island country to attribute a cyber campaign to a known state-linked actor. In a public advisory, Samoa’s CERT identified APT40, a group widely believed to be linked to China’s Ministry of State Security, as responsible for a series of cyber intrusions into government networks. The statement carefully avoided naming China directly but referenced corroborating advisories from Australia, the United States, and other partners.

In a region where diplomatic leverage is often uneven, Samoa’s decision to go public was striking. It was a performance of sovereignty, a declaration that even the smallest states have agency in cyberspace. The risk was real; China remains Samoa’s largest trading partner. Yet by stepping into the attribution arena, Samoa signaled that cyber sovereignty matters, even for those outside the traditional centers of power.

This emerging trend is reshaping the region’s cyber landscape. Attribution is becoming a political act, part intelligence disclosure, part narrative construction. Who names the attacker, and how, matters. The act of attribution shapes not just deterrence but diplomatic posture, alliance alignment, and domestic legitimacy. 

Australia’s approach offers a hybrid example. In June 2020 the Australian prime minister issued a public statement that Australia was the target of a sustained cyber campaign by a “sophisticated state-based actor” – widely interpreted to be China, although that was never stated outright. The move echoed the calibrated tone later adopted by Singapore and Samoa. 

Yet outside that episode, Canberra has more often followed the Five Eyes model: issuing joint attributions alongside the United States, the European Union, and other allied partners against actors linked to China, Russia, Iran, and North Korea. These attributions are often coordinated with public technical advisories for the Australian Cyber Security Center, accompanied by calls for resilience-building and regulatory reform. For Australia, attribution is a tool of deterrence, alliance solidarity, and reinforcing the importance of international law and norms.

Japan’s position, long characterized by restraint, is now shifting. While Tokyo once preferred to avoid naming adversaries outright, its posture has evolved in response to growing cyber threats and alliance commitments. In 2021, and again in subsequent years, Japan joined public statements by the United States and other allies attributing attacks to Chinese state-linked groups, including APT40. Japan’s 2022 National Security Strategy formally elevated cyberspace to a core security domain, and the government has since expanded intelligence sharing, incident response coordination, and joint attribution efforts. While still diplomatically cautious in tone, Japan now openly aligns with its allies on key cyber threat narratives.

India walks a cautious line. Confronted with persistent cyber intrusions from groups such as RedEcho and Stone Panda, widely believed to be linked to China, New Delhi has focused on strengthening domestic cyber defenses rather than issuing public attributions. This reflects India’s broader strategic posture, assertive where necessary, but careful to avoid commitments that might limit its room to maneuver.

Taken together, these national approaches do not constitute a unified strategy, but they do reflect a regional spectrum. At one end lies full-throated public attribution aligned with Western partners; at the other, carefully calibrated references to APT groups without naming state sponsors and at the far end, quiet resilience-building absent public attribution altogether.

But beneath these differences lies a shared recognition: attribution is not purely a technical exercise. It is a strategic signal, a tool of statecraft, a way of asserting control over the narrative space. Increasingly, it is being wielded not just to name adversaries but to shape the evolving architecture of regional order.

Singapore’s attribution of UNC3886 was a performance of governance. It provided reassurance to domestic stakeholders, lent weight to the ongoing review of the  Cybersecurity Act, and signaled technical competence. Just as importantly, it reinforced Singapore’s credentials as a highly credible, independent cyber actor in the region, precise, informed and unafraid to act when national interests are threatened.

China’s response was swift and familiar. Its embassy in Singapore dismissed the claims as “groundless smears” and reiterated Beijing’s well-worn stance that it is a victim, not a perpetrator of cyberattacks. Such denials are routine. But they underscore the contest now underway, not just over infrastructure and intrusion but over narrative dominance and legitimacy.

In this contested space, calibrated attribution may offer a new norm: exposure without escalation, sovereignty without confrontation. For middle powers in the Indo-Pacific, it offers a way to asset agency, build resilience and influence the rules of digital engagement on their own terms.

In the shadows of cyber conflict, where evidence is elusive and action often deniable, the ability to name without inflaming may prove the most strategic act of all. The age of calibrated attribution has arrived. And it is middle powers, quietly, deliberately, who are showing the world how it’s done.