BN
|
TechAI Desk4 views

Alleged Hack of China Supercomputer Exposes 10 Petabytes of Sensitive Data

A hacker group called FlamingChina alleges it stole over 10 petabytes of sensitive data from China's National Supercomputing Center in Tianjin. The data reportedly includes classified defense documents and research from major Chinese aerospace and military organizations. Experts who reviewed samples believe the leak is genuine, though verification is incomplete. The breach was executed via a compromised VPN and botnet over six months, exploiting architectural vulnerabilities. This incident highlights ongoing cybersecurity challenges in China's technology infrastructure. If confirmed, it could be one of the largest data thefts from China.

Ad slot
Alleged Hack of China Supercomputer Exposes 10 Petabytes of Sensitive Data

A hacker group identifying as FlamingChina has allegedly exfiltrated more than 10 petabytes of sensitive data from China's National Supercomputing Center in Tianjin, potentially including classified military and aerospace information.

The Alleged Breach

  • On February 6, an account named FlamingChina posted a sample of the stolen dataset on an anonymous Telegram channel.
  • The target is the National Supercomputing Center (NSCC) in Tianjin, which serves over 6,000 clients across China, including defense and science agencies.
  • The hacker claims to have gained access through a compromised VPN domain and used a botnet to extract data over approximately six months.

Contents of the Stolen Data

According to the hacker, the dataset includes:

  • Research from top organizations such as the Aviation Industry Corporation of China (AVIC) and the Commercial Aircraft Corporation of China (COMAC).
  • Documents marked "secret" in Chinese, technical files, and simulations of defense equipment like bombs and missiles.
  • Data spanning fields like aerospace engineering, military research, bioinformatics, and fusion simulation.
Ad slot

Expert Analysis and Verification

  • Cybersecurity experts, including Dakota Cary from SentinelOne, have reviewed samples and indicate they appear genuine, matching expectations from the supercomputing center.
  • However, CNN cannot independently verify the origins or full extent of the breach.
  • The data's scale—10 petabytes—makes it valuable to state intelligence services, though some governments may already possess similar information.

Method of Access

  • The attacker described using a botnet to distribute data extraction across multiple systems, reducing the risk of detection.
  • Experts note that while effective, the method was not particularly sophisticated, highlighting architectural vulnerabilities rather than advanced hacking techniques.

Cybersecurity Context

  • The alleged breach underscores persistent cybersecurity weaknesses in China, as acknowledged by Chinese policymakers.
  • Past incidents, such as a 2022 leak of a billion citizens' data, point to systemic issues.
  • China's 2025 National Security White Paper emphasizes the need for robust security barriers in network, data, and AI sectors.
Ad slot