China’s Supercomputing Center Hit by Major Data Breach

Thu Apr 09 2026
Eric Whitman (457 articles)
China’s Supercomputing Center Hit by Major Data Breach

A reported cyberattack on a state-operated Chinese supercomputing facility might have resulted in the theft of a vast amount of sensitive data, possibly marking it as one of the largest known breaches in the country, as stated in a report. The incident is thought to encompass more than 10 petabytes of data, raising new alarms regarding national security and cyber defenses. The data was allegedly taken from the National Supercomputing Centre in Tianjin, a significant computing center that serves over 6,000 users, including organizations involved in advanced scientific and defense-related activities. The magnitude of the breach is considerable, as one petabyte equates to 1,000 terabytes, which is approximately the storage capacity of around 1,000 high-end laptops.

Experts who examined parts of the leaked material and spoke with the hacker indicated that the system may have been compromised with relative ease, as reported. The attacker reportedly went undetected for months, extracting significant amounts of data, which raises concerns regarding the effectiveness of monitoring systems. The breach initially came to light when an account identified as ‘FlamingChina’ disseminated sample files on an anonymous Telegram channel in early February. The samples encompassed a diverse array of research domains, spanning aerospace, military technologies, bioinformatics, and fusion simulations. The data is thought to be linked to significant entities including the Aviation Industry Corporation of China, the Commercial Aircraft Corporation of China, and the National University of Defence Technology. Some of the sample material reportedly includes files marked “secret” in Chinese, along with technical documents, animated simulations, and visual representations of defense systems such as bombs and missiles. A cybersecurity researcher emphasized that the dataset’s immense size renders it especially appealing to state-backed intelligence agencies, which possess the resources to handle such extensive amounts of information.

The report indicates that the complete dataset is available for purchase at a significant cost, potentially reaching hundreds of thousands of dollars, while smaller segments have reportedly been sold for lesser sums through cryptocurrency transactions. However, these claims remain unverified. Initial findings suggest that the assailant potentially gained entry to the system via a compromised VPN domain linked to the Tianjin facility. Upon gaining access, a botnet, consisting of numerous automated systems, was employed to methodically extract and store data. The data breach operation is thought to have spanned almost six months, with data being extracted concurrently through various channels to evade detection. This method seems to have diminished the chances of activating security alerts. The breach, therefore, may not have depended on sophisticated hacking tools but rather exploited flaws in system design and infrastructure, highlighting fundamental vulnerabilities.

If confirmed, the incident may reveal vulnerabilities in China’s technological framework as it vies with the United States for dominance in advanced computing and artificial intelligence. It also reflects previous oversights. In 2021, a database allegedly holding personal information of as many as one billion Chinese citizens was left unprotected online for more than a year, only coming to attention in 2022 when it was put up for sale on a hacking forum. Experts assert that such cases highlight persistent deficiencies. A consultant at cybersecurity firm SentinelOne, remarked that even Chinese authorities recognize that cybersecurity is still a work in progress, with systems continually evolving to tackle emerging threats.

Eric Whitman

Eric Whitman

Eric Whitman is our Senior Correspondent who has been reporting on Stock Market for last 5+ years. He handles news for UK and Europe. He is based in London