China’s National Supercomputing Center in Tianjin: Data heist of the century? Hacker claims to steal top-secret files from China supercomputer - data up for sale

China’s National Supercomputing Center in Tianjin: Data heist of the century? Hacker claims to steal top-secret files from China supercomputer - data up for sale

Massive Alleged Data Breach Targets China’s Supercomputing Center, Exposing Sensitive Defense and Scientific Research

An alleged cyberattack on China’s National Supercomputing Center in Tianjin has sent shockwaves through the global cybersecurity community, with claims of over 10 petabytes of highly sensitive data stolen potentially one of the largest breaches in modern history. The incident, reportedly carried out by a hacker group operating under the name "FlamingChina," involves defense-related documents, aerospace research, missile simulations, AI development, and nuclear fusion experiments, raising serious national security concerns.

The breach is said to have unfolded over several months, with attackers exploiting a compromised VPN to gain initial access before using distributed botnet tools to extract data in small, undetected chunks. This method transferring files through multiple channels to evade security monitoring allowed the operation to persist without triggering alerts. Cybersecurity experts describe the attack as a sustained, low-profile intrusion rather than a single event, highlighting vulnerabilities in large-scale infrastructure security.

Samples of the stolen data have surfaced on encrypted platforms like Telegram, with the full dataset reportedly priced in the hundreds of thousands of dollars, payable in cryptocurrency. While some leaked files including technical diagrams and classified-marked documents appear authentic upon initial review, full verification remains pending, and Chinese authorities have not publicly confirmed the breach. Analysts warn that if proven true, the exposure could provide foreign intelligence agencies with unprecedented insights into China’s advanced military and scientific research, including strategic defense capabilities and high-performance computing outputs.

The incident has intensified scrutiny of China’s cybersecurity posture, particularly in state-run supercomputing centers, which serve thousands of clients across defense, academia, and industry. Experts note that the breach underscores persistent weaknesses in perimeter defenses, even in advanced nations, and raises questions about the security of shared computing ecosystems critical to global research. While the attack’s sophistication was not exceptionally high, its success relied on exploiting architectural flaws a reminder of the challenges in securing distributed, high-value targets.

As investigations continue, the breach has already sparked discussions on global cybersecurity cooperation and the need for stronger segmentation and monitoring in critical infrastructure. The full impact of the leak remains unclear, but if confirmed, it could reshape cyber intelligence competition and accelerate reforms in digital defense strategies worldwide.

Source: https://m.economictimes.com/news/international/us/data-heist-of-the-century-hacker-claims-to-steal-top-secret-files-from-china-supercomputer-data-up-for-sale/articleshow/130168900.cms

Cyber Threat Intelligence ® cybersecurity rating report: https://www.rankiteo.com/company/cyber-threat-intel

"id": "CYB1775831786",
"linkid": "cyber-threat-intel",
"type": "Breach",
"date": "4/2026",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'customers_affected': 'Thousands of clients across '
                                              'defense, academia, and industry',
                        'industry': 'Defense, Aerospace, Scientific Research, '
                                    'High-Performance Computing',
                        'location': 'Tianjin, China',
                        'name': 'National Supercomputing Center in Tianjin',
                        'type': 'Government/Research Institution'}],
 'attack_vector': 'Compromised VPN, Distributed Botnet Tools',
 'data_breach': {'data_exfiltration': 'Yes, via distributed botnet tools in '
                                      'small, undetected chunks',
                 'file_types_exposed': ['Technical diagrams',
                                        'Classified documents'],
                 'sensitivity_of_data': 'Highly sensitive, classified-marked '
                                        'documents',
                 'type_of_data_compromised': ['Defense-related documents',
                                              'Aerospace research',
                                              'Missile simulations',
                                              'AI development',
                                              'Nuclear fusion experiments']},
 'description': 'An alleged cyberattack on China’s National Supercomputing '
                'Center in Tianjin has resulted in the theft of over 10 '
                'petabytes of highly sensitive data, including defense-related '
                'documents, aerospace research, missile simulations, AI '
                'development, and nuclear fusion experiments. The breach, '
                "attributed to the hacker group 'FlamingChina,' exploited a "
                'compromised VPN and distributed botnet tools to exfiltrate '
                'data undetected over several months. Samples of the stolen '
                'data have surfaced on encrypted platforms, with the full '
                'dataset reportedly priced in the hundreds of thousands of '
                'dollars. The incident raises serious national security '
                'concerns and highlights vulnerabilities in China’s '
                'cybersecurity posture.',
 'impact': {'brand_reputation_impact': 'Severe reputational damage to China’s '
                                       'cybersecurity posture and '
                                       'supercomputing centers',
            'data_compromised': 'Over 10 petabytes of sensitive data',
            'operational_impact': 'Potential disruption to defense, aerospace, '
                                  'and scientific research operations',
            'systems_affected': 'National Supercomputing Center in Tianjin'},
 'initial_access_broker': {'data_sold_on_dark_web': 'Yes, priced in hundreds '
                                                    'of thousands of dollars '
                                                    '(cryptocurrency)',
                           'entry_point': 'Compromised VPN',
                           'high_value_targets': ['Defense-related documents',
                                                  'Aerospace research',
                                                  'Missile simulations',
                                                  'AI development',
                                                  'Nuclear fusion experiments'],
                           'reconnaissance_period': 'Several months'},
 'investigation_status': 'Ongoing, full verification pending',
 'lessons_learned': 'The breach underscores persistent weaknesses in perimeter '
                    'defenses, even in advanced nations, and highlights the '
                    'need for stronger segmentation, monitoring, and security '
                    'in shared computing ecosystems critical to global '
                    'research.',
 'motivation': 'Financial gain (data sold on dark web), potential intelligence '
               'gathering',
 'post_incident_analysis': {'root_causes': ['Exploited architectural flaws in '
                                            'perimeter defenses',
                                            'Lack of segmentation and '
                                            'monitoring',
                                            'Sustained, low-profile intrusion '
                                            'methods']},
 'recommendations': ['Strengthen perimeter defenses',
                     'Implement network segmentation',
                     'Enhance monitoring for distributed data exfiltration',
                     'Improve cybersecurity cooperation globally',
                     'Reform digital defense strategies for critical '
                     'infrastructure'],
 'references': [{'source': 'Encrypted platforms like Telegram'}],
 'threat_actor': 'FlamingChina',
 'title': 'Massive Alleged Data Breach Targets China’s Supercomputing Center, '
          'Exposing Sensitive Defense and Scientific Research',
 'type': 'Data Breach',
 'vulnerability_exploited': 'Architectural flaws in perimeter defenses, lack '
                            'of segmentation and monitoring'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.