A suspected cyberattack has compromised one of China’s most critical research infrastructures, with hackers claiming to have stolen more than 10 petabytes of sensitive data from the National Supercomputing Center in Tianjin (NSCC). If confirmed, the incident could represent the largest data breach in China’s history, involving highly sensitive materials such as defense-related documents, missile schematics, and advanced scientific research. The Tianjin-based facility supports over 6,000 clients, including major research institutions and organizations linked to national defense.

According to cybersecurity analysts who reviewed portions of the leaked data, the attackers may have maintained access to the system for several months without detection. A group identifying itself as “FlamingChina” reportedly released a sample of the stolen dataset on Telegram in early February.

The group claims the data spans multiple high-value domains, including aerospace engineering, military research, bioinformatics, and fusion simulation. Some of the leaked files are said to be marked “secret” in Chinese and include technical documentation, simulations, and visual renderings of weapons systems. The attackers are allegedly offering limited previews of the data for thousands of dollars, while full access is priced significantly higher, with payments requested in cryptocurrency.

The leaked material is believed to be associated with major Chinese organizations such as the Aviation Industry Corporation of China, the Commercial Aircraft Corporation of China, and the National University of Defense Technology. However, these claims have not been independently verified. The NSCC Tianjin, established in 2009, is part of China’s national supercomputing network, which includes facilities in cities such as Guangzhou, Shenzhen, and Chengdu. These centers play a key role in supporting scientific research, industrial development, and defense-related projects.

Experts suggest the breach may have been enabled by relatively simple vulnerabilities rather than highly sophisticated techniques. According to analysts, the attacker claimed to have gained access through a compromised VPN domain before deploying a botnet to automate data extraction. The operation reportedly took around six months, during which data was systematically pulled from multiple systems. Security researchers noted that weaknesses in system architecture may have allowed attackers to move laterally and extract large volumes of data without triggering alerts.

The scale of the alleged breach raises serious concerns about both cybersecurity resilience and potential intelligence fallout. Handling and analyzing such a vast dataset equivalent to millions of gigabytes would likely require significant computational resources, potentially limiting who could fully exploit the information. Security experts warn that even partial access to such data could have far-reaching implications, particularly if it includes defense research, proprietary technologies, or classified materials.

At this stage, the claims remain unverified, and no official confirmation has been issued by Chinese authorities. However, the incident highlights ongoing risks to critical infrastructure and the growing importance of securing high-value research environments against prolonged and stealthy cyber intrusions.

Recommended Cyber Technology News:

To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com



🔒 Login or Register to continue reading