BN
|
WorldAI Desk1 views

China Supercomputer Data Leak: Hacker Allegedly Steals 10 Petabytes of Classified Info

A major cybersecurity incident has surfaced, alleging that a hacker stole over 10 petabytes of highly classified data from China's National Supercomputing Center (NSCC) in Tianjin. The stolen data reportedly includes sensitive materials such as missile blueprints, defense documents, and advanced military research, making it a significant potential breach of national security. The data was allegedly leaked via a Telegram channel by a group calling itself 'FlamingChina,' which offered the data for sale in cryptocurrency. Cybersecurity experts reviewed sample data and found it authentic, suggesting the theft was possible through a compromised VPN and a 'botnet' over several months. The incident has drawn international attention to the systemic cybersecurity vulnerabilities within China's critical technological infrastructure.

Ad slot
China Supercomputer Data Leak: Hacker Allegedly Steals 10 Petabytes of Classified Info

A prominent cybersecurity report details the alleged theft of over 10 petabytes of highly classified data from China's National Supercomputing Center (NSCC), raising global concerns about technological espionage and China's digital infrastructure security.

The Alleged Data Breach

According to reports, a hacker reportedly accessed the state-run National Supercomputing Center (NSCC) in Tianjin, China. The NSCC is a critical infrastructure hub, providing computational services to over 6,000 clients, including advanced defense and scientific agencies across the country.

  • Scale of Theft: The stolen dataset is estimated to contain over 10 petabytes of confidential information.
  • Method: Cybersecurity experts speaking with the press stated that the attacker allegedly gained access with relative ease and was able to extract massive amounts of data over a period of several months without detection.

Nature of the Stolen Information

Evidence of the breach was publicized on February 6th by an account calling itself 'FlamingChina' on an anonymous Telegram channel. The group claimed the data covered a wide range of high-level organizations, including the China Aviation Industry Corporation and the National University of Defense Technology.

Ad slot

Reportedly, the data includes highly sensitive materials such as:

  • Defense documents marked as 'secret' in Chinese.
  • Missile blueprints and technical files.
  • Aerospace engineering and military research.
  • Bioinformatics and fusion simulation data.

Cybersecurity consultants who reviewed sample data noted that the breadth of the samples reflected the wide client base of the NSCC, suggesting the theft was comprehensive in scope.

Cybersecurity Vulnerabilities and Implications

Experts suggest that the breach highlights systemic vulnerabilities within China's technological infrastructure, particularly as the nation competes globally in AI and high-tech innovation.

  • Access Method: The alleged attack was reportedly executed through a compromised VPN domain, utilizing a 'botnet'—a network of automated programs—to infiltrate the system and extract data over six months.
  • Expert Analysis: While the method was described as effective, experts noted that the technique was not technically unique. However, the sheer volume of data makes it highly attractive to foreign intelligence services.
  • Broader Concerns: The incident adds to a pattern of reported cybersecurity weaknesses in China. For instance, in 2021, a massive database containing personal information for up to one billion Chinese citizens was reportedly left unprotected and accessible to the public for over a year.

Despite the Chinese government's stated commitment to strengthening cybersecurity, the incident underscores ongoing challenges in securing critical national data assets.

Ad slot