Back

Massive Data Breach of Chinese Supercomputer Exposes Sensitive Military Information

Severity: High (Score: 74.7)

Sources: Newsbytesapp, Cnn

Summary

A hacker has breached a state-run Chinese supercomputer, the National Supercomputing Center (NSCC) in Tianjin, stealing over 10 petabytes of sensitive data, including classified defense documents and missile schematics. The hacker, known as FlamingChina, claims to have accessed the supercomputer with relative ease and extracted data over several months without detection. The stolen information includes documents marked 'secret' in Chinese, technical files, and simulations related to aerospace engineering and military research. On February 6, samples of the stolen data were posted on an anonymous Telegram channel, with the hacker offering limited previews for thousands of dollars and full access for hundreds of thousands, requesting payment in cryptocurrency. Cybersecurity experts have confirmed the authenticity of the data, which is linked to major organizations such as the Aviation Industry Corporation of China and the Commercial Aircraft Corporation of China. This incident highlights significant vulnerabilities in China's cybersecurity infrastructure, particularly as it competes with the U.S. in technology and AI. The extraction method involved a compromised VPN domain and a botnet to distribute the data extraction process, indicating a potential architectural flaw rather than advanced technical sophistication. Key Points: • Over 10PB of sensitive data stolen from China's NSCC, including military documents. • Hacker FlamingChina accessed the supercomputer easily and extracted data over six months. • The breach reveals significant vulnerabilities in China's cybersecurity infrastructure.

Key Entities

  • Data Breach (attack_type)
  • Aviation Industry Corporation Of China (company)
  • Commercial Aircraft Corporation Of China (company)
  • National University Of Defense Technology (company)
  • China (country)
  • United States (country)
  • Government (industry)
  • Technology (industry)
  • T1041 - Exfiltration Over C2 Channel (mitre_attack)
  • T1133 - External Remote Services (mitre_attack)
  • T1567 - Exfiltration Over Web Service (mitre_attack)
  • Telegram (platform)
Loading threat details...

Threat Not Found

The threat cluster you're looking for doesn't exist or has been removed.

Return to Feed