A threat actor operating under the handle "FlamingChina" claims to have breached China's state-run National Supercomputing Center (NSCC) in Tianjin, exfiltrating what they describe as over 10 petabytes of classified defense, aerospace, and military research data. Samples posted to Telegram on February 6, 2026, include documents marked "Secret" and missile schematics. Cybersecurity experts who reviewed the samples say the data appears genuine. The Chinese government has not acknowledged the incident.

What Happened

FlamingChina posted sample data to Telegram claiming a successful breach of the NSCC Tianjin, one of China's premier supercomputing facilities. The actor is offering partial data sets for thousands of dollars and full access for hundreds of thousands, payable in cryptocurrency. If confirmed at scale, this would represent the largest known breach of Chinese government infrastructure, dwarfing the 2021 incident that exposed personal data of up to one billion Chinese citizens (23 TB). The claimed 10 petabytes would be orders of magnitude larger.

What Was Taken

The alleged exfiltration includes research and classified documents spanning multiple sensitive domains:

The breadth of organizations affected suggests the NSCC served as a centralized compute and storage hub for multiple defense and research entities, making it a high-value single point of compromise.

Why It Matters

This breach carries significant intelligence implications. As cybersecurity expert Marc Hofer noted, only nation-state intelligence agencies have the resources to process and exploit 10 petabytes of mixed classified data. The stolen information could provide adversaries with insight into China's missile programs, aerospace capabilities, and advanced research initiatives. However, cybersecurity consultant Dakota Cary offered a counterpoint: governments with mature intelligence programs may already possess much of this information through existing collection methods. Regardless of the intelligence value to foreign governments, the breach exposes a critical vulnerability in China's national research infrastructure and raises questions about centralized supercomputing security across all nations.

The Attack Technique

FlamingChina claims initial access was achieved through a VPN vulnerability at the NSCC. VPN exploitation remains one of the most common and effective initial access vectors, consistently ranking among the top entry points for both ransomware operators and state-sponsored actors. Supercomputing centers frequently maintain VPN access for remote researchers, creating a broad attack surface. The scale of the alleged exfiltration (10 PB) suggests either prolonged undetected access, insufficient data loss prevention controls, or both. The lack of detection over what would have been a significant data transfer raises serious questions about the NSCC's network monitoring capabilities.

What Organizations Should Do

Organizations operating high-performance computing environments or centralized research infrastructure should take the following defensive actions:

Broader Context

This incident fits a pattern of escalating cybersecurity failures within China's public and private sectors. The 2021 breach that exposed up to one billion citizens' personal data went unnoticed for over a year. China's 2025 National Security White Paper implicitly acknowledged these vulnerabilities. For the global threat landscape, this breach is a reminder that no nation is immune to large-scale compromise, and that centralized high-value targets demand security investment proportional to the data they aggregate.

Sources: China Just Allegedly Suffered The Biggest Hack In The Country's History