A prominent cybersecurity report details the alleged theft of over 10 petabytes of highly classified data from China's National Supercomputing Center (NSCC), raising global concerns about technological espionage and China's digital infrastructure security.
The Alleged Data Breach
According to reports, a hacker reportedly accessed the state-run National Supercomputing Center (NSCC) in Tianjin, China. The NSCC is a critical infrastructure hub, providing computational services to over 6,000 clients, including advanced defense and scientific agencies across the country.
- Scale of Theft: The stolen dataset is estimated to contain over 10 petabytes of confidential information.
- Method: Cybersecurity experts speaking with the press stated that the attacker allegedly gained access with relative ease and was able to extract massive amounts of data over a period of several months without detection.
Nature of the Stolen Information
Evidence of the breach was publicized on February 6th by an account calling itself 'FlamingChina' on an anonymous Telegram channel. The group claimed the data covered a wide range of high-level organizations, including the China Aviation Industry Corporation and the National University of Defense Technology.
Reportedly, the data includes highly sensitive materials such as:
- Defense documents marked as 'secret' in Chinese.
- Missile blueprints and technical files.
- Aerospace engineering and military research.
- Bioinformatics and fusion simulation data.
Cybersecurity consultants who reviewed sample data noted that the breadth of the samples reflected the wide client base of the NSCC, suggesting the theft was comprehensive in scope.
Cybersecurity Vulnerabilities and Implications
Experts suggest that the breach highlights systemic vulnerabilities within China's technological infrastructure, particularly as the nation competes globally in AI and high-tech innovation.
- Access Method: The alleged attack was reportedly executed through a compromised VPN domain, utilizing a 'botnet'—a network of automated programs—to infiltrate the system and extract data over six months.
- Expert Analysis: While the method was described as effective, experts noted that the technique was not technically unique. However, the sheer volume of data makes it highly attractive to foreign intelligence services.
- Broader Concerns: The incident adds to a pattern of reported cybersecurity weaknesses in China. For instance, in 2021, a massive database containing personal information for up to one billion Chinese citizens was reportedly left unprotected and accessible to the public for over a year.
Despite the Chinese government's stated commitment to strengthening cybersecurity, the incident underscores ongoing challenges in securing critical national data assets.