China Supercomputer Breach Exposes 10 Petabytes Of Sensitive Research

A man walking down a street past a red sign (Photo by BoHang Lee on Unsplash )

A man walking down a street past a red sign (Photo by BoHang Lee on Unsplash)

Summary
  • Over 10 petabytes reportedly taken from NSCC Tianjin
  • Samples posted on Telegram under the name FlamingChina
  • Exfiltration used compromised VPN and botnet over six months
  • Full dataset offered for hundreds of thousands in cryptocurrency

The data breach at the National Supercomputing Center Tianjin affected a china supercomputer that reportedly lost more than 10 petabytes of research, according to CNN.

The attacker identifying as FlamingChina posted samples on an anonymous Telegram channel, and the previews included files tied to aerospace, defence, bioinformatics and fusion simulations, as reported by CNN.

Multiple experts who examined the material told reporters the leaked samples contained documents labelled secret in Chinese, technical files, renderings of weapons systems, missile schematics and computational outputs consistent with supercomputing workloads.

According to analysis cited in reports, the facility supports more than 6,000 organisations, including major aerospace and defence research entities such as the Aviation Industry Corporation of China, COMAC and the National University of Defense Technology.

Implications And Sale Attempts

Sources say the attacker used a compromised VPN entry point and a botnet to move data in small chunks over roughly six months, a method SentinelOne analyst Dakota Cary described as low volume and effective at avoiding bulk transfer alerts.

As reported by CNN, the hacker began offering limited previews for a few thousand dollars while pricing full access to the dataset in the hundreds of thousands, with payment sought in cryptocurrency.

Security observers told reporters the technique exploited architectural gaps rather than novel zero day exploits, raising questions about the supercomputing centre’s monitoring and the prolonged undetected access cited in the reports.

The breach is described in the reports as potentially valuable for foreign governments and rival agencies because it reportedly exposes design work, simulations and classified defence documents, and investigators say attribution and forensic work will be needed to establish responsibility.