
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works .
A hacker (or hacker group) claims to have extracted more than 10 petabytes (1PB = 1000 TB) of highly sensitive information from China's National Supercomputing Center (NSCC) in Tianjin, which could be the largest known data breach involving Chinese infrastructure. Although the incident remains unverified, its nature and scale — data was stolen from 6,000 state-controlled entities — may point to a systemic weakness in China's critical infrastructure, which has serious implications, reports CNN .
The dataset is said to originate from China's National Supercomputing Center, a centralized high-performance computing facility that supports over 6,000 entities from research, industrial, and defense sectors. Indeed, the alleged content spans multiple disciplines, including aerospace engineering, bioinformatics, fusion modeling, and other fields studied using supercomputer simulations. The individual or group behind the breach, which goes by the name of FlamingChina, released a sample in a Telegram channel in February, claiming the archive contains research tied to such organizations as the Aviation Industry Corporation of China (AVIC), the Commercial Aircraft Corporation of China (COMAC), and the National University of Defense Technology.
The exposed materials include files labeled 'secret' in Chinese, along with engineering documentation, simulation results, and rendered models tied to weapons systems such as bombs and missiles, according to analysts who reviewed portions of the leak. Access to portions of the dataset is reportedly being sold for thousands of dollars in cryptocurrency, while full access is priced at hundreds of thousands of dollars.
You may like Bain Capital's data center unit removes disgraced tenant suspected of smuggling Nvidia GPUs to China China tells entities to ditch U.S. and Israeli cybersecurity software Chinese universities performing military research acquired Super Micro servers with sanctioned Nvidia AI chips — public documents reveal purchases were completed in 2025 and 2026 despite US export controls The scale of the alleged breach raises questions about the attacker and represents a significant interest from an intelligence point of view. First up, stealing 10PB of data undetected requires exceptional skills, plenty of time (six months), and dedication. Secondly, processing 10PB of data requires significant computing resources that are not usually available to individuals or hacking groups. Thirdly, given the requirements for significant computing capabilities, meaningful analysis of the dataset can indeed be limited to governments or large organizations. Yet, researchers questioned by CNN suggested that while global governments may show interest in such data, some may already possess the information through other means.
According to the alleged attacker, they gained access through a compromised VPN domain, then deployed a botnet to extract data. Instead of transferring data in bulk, the attacker distributed the exfiltration across multiple systems and moved 'smaller' amounts over about six months to avoid detection. Such a method relies more on exploiting system architecture than on advanced hacking techniques, which in part helped the perpetrator to avoid detection.
Although CNN could not confirm the source of the leak or whether it was real, multiple cybersecurity experts say that the samples appear authentic and match what they would expect to see from a centralized supercomputing facility. If the attack is real, the incident highlights ongoing cybersecurity weaknesses in China's critical infrastructure, which means that some of its secret technologies can end up in the hands of foreign governments or terrorist organizations, which may use them to harm not only China but other countries as well.
Follow Tom's Hardware on Google News , or add us as a preferred source , to get our latest news, analysis, & reviews in your feeds.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Key considerations
- Investor positioning can change fast
- Volatility remains possible near catalysts
- Macro rates and liquidity can dominate flows
Reference reading
- https://www.tomshardware.com/tech-industry/cyber-security/SPONSORED_LINK_URL
- https://www.tomshardware.com/tech-industry/cyber-security/10-petabytes-of-sensitive-data-stolen-from-chinas-national-supercomputing-center-hackers-claim-daring-heist-would-be-largest-ever-china-hack-covering-6-000-clients-across-science-defense-and-beyond#main
- https://www.tomshardware.com
- Denuvo properly cracked in Resident Evil: Requiem, bypasses become plug-and-play — cracked version runs faster, smoother, and uses way less VRAM and RAM
- Original Apollo 11 code open-sourced by NASA — original Command Module and Lunar Module code repos are now public domain resources
- French government says it's ditching Windows for Linux — country accelerates plans to ditch US-based software in digital sovereignty push
- Benchmarking Nvidia's RTX Neural Texture Compression tech that can reduce VRAM usage by over 80%
- UK navy tracked three Russian submarines near undersea cables, damage would 'have serious consequences,' Putin warned — US and allies expand seabed protection e
Informational only. No financial advice. Do your own research.