Hackers Allegedly Steal 10 Petabytes from Chinese Supercomputer

Hackers Allegedly Steal 10 Petabytes from Chinese Supercomputer

Filmogaz.com reports that hackers allegedly stole roughly 10 petabytes of data from a state-run Chinese supercomputer. The files reportedly originate from Tianjin’s National Supercomputing Center, a major infrastructure hub.

Scope and contents of the leak

Sources say the dataset exceeds 10 petabytes in size. It contains highly sensitive material across multiple domains.

  • Classified defense documents.
  • Missile schematics and related technical files.
  • Animated simulations and rendered displays of defense technology.
  • Research in aerospace engineering, bioinformatics and fusion simulation.

How the breach reportedly occurred

On Feb. 6, a user named FlamingChina posted a sample of the dataset on Telegram. Cybersecurity researcher Marc Hofer reviewed the sample and began inquiries.

An individual claiming responsibility said a compromised VPN domain provided initial access. The actor then deployed a botnet to extract and download data.

Investigators estimate the exfiltration took roughly six months to complete.

Ransom and sale attempts

The alleged threat actor has been marketing limited previews for thousands of dollars. Full dataset access is reportedly offered for hundreds of thousands.

Payment demands are quoted in cryptocurrency. The seller provided controlled samples to prove the data’s authenticity.

Potential affected organizations

The leaked files may be linked to several major Chinese entities. The list includes aerospace and defense research organizations.

  • Aviation Industry Corporation of China.
  • Commercial Aircraft Corporation of China.
  • National University of Defense Technology.

Tianjin’s National Supercomputing Center serves more than 6,000 clients across China. The center supports government and commercial research projects.

Ongoing verification

Filmogaz.com is monitoring developments and confirmations from independent cybersecurity teams. Authorities have not publicly validated all claims.

Further technical analysis will be needed to confirm ownership and impact. Stakeholders should assume potential risks until investigations conclude.