China Supercomputing Hub Hit By 10 Petabytes Alleged Breach, Military Secrets Exposed

A major alleged data breach has hit the National Supercomputing Center in Tianjin, China, after a hacker claimed to have exfiltrated more than 10 petabytes of sensitive information. The reported cache includes military and aerospace research, along with defense papers, missile-related data, internal folders, login details, manuals, and schematics linked to weapons testing.

The incident has raised concern because the center serves as a centralized infrastructure hub for around 6,000 clients across China, including science and defense agencies. Officials in China have not confirmed the breach, but cybersecurity experts who reviewed samples of the alleged leak said the material appears authentic.

What the alleged leak contains

The hacker account, identified as FlamingChina, posted samples of the dataset on an anonymous Telegram channel in early February. The post claimed the files covered “research across various fields including aerospace engineering, military research, bioinformatics, fusion simulation and more.”

Online samples reportedly show technical material that could be tied to advanced testing programs. That includes internal directory structures and documents that appear to relate to defense systems and aerospace work.

Why the breach matters

Cybersecurity experts say the scale of the alleged theft is unusually large and potentially damaging. Jake Moore, Global Cybersecurity Advisor at ESET, said the incident “could be absolutely huge,” adding that even top-tier, state-backed infrastructure is not immune to sustained attacks.

Moore also warned that the data could hold years of research and development, creating the risk that it could be replicated or reverse engineered elsewhere. If the material is genuine, the breach could expose sensitive work that China has treated as strategically important.

Possible security and geopolitical impact

The alleged leak is drawing attention because it may include data linked to fighter jet programs and hypersonic missile testing. That could give rival states or intelligence services insight into areas that are normally kept tightly restricted.

A breach of this scale would also raise questions about how the data was taken out over time without detection. Cyber experts believe the attacker may have moved the files slowly across a period of months, a method that can help avoid alerts in large networks.

Key details reported so far

Item Reported detail
Target National Supercomputing Center in Tianjin
Alleged volume stolen More than 10 petabytes
Leaked material Military, aerospace, bioinformatics, fusion simulation and defense data
Reported exposure Internal folders, login details, manuals, schematics
Public confirmation Not confirmed by Chinese officials

What remains unclear

The exact entry point, attack method, and full scope of the alleged breach remain unknown. The lack of official confirmation has left room for uncertainty, but the samples circulating online have already triggered concern among cybersecurity specialists and observers of China’s defense technology sector.

The incident also highlights a broader challenge for China’s supercomputing strategy, which has aimed to reduce dependence on Western technology, especially chips and other critical hardware. If the reported theft is validated, it would place pressure not only on security practices at the Tianjin center but also on the wider trust placed in highly centralized research infrastructure.

Read more at: www.computing.co.uk
Exit mobile version