A hacker group calling itself FlamingChina has claimed responsibility for the theft of over 10 petabytes of sensitive data from China's National Supercomputing Center in Tianjin, one of the country's most critical high-performance computing facilities. The breach, corroborated by multiple international outlets including TechRadar, NDTV, and Der Spiegel, is believed to be the largest known data leak in Chinese history. The group is now attempting to sell the dataset for cryptocurrency.

What Happened

FlamingChina gained access to the Tianjin supercomputing facility, which supports over 6,000 institutions involved in advanced science and defense research. The group claims to have maintained persistent access for months, extracting data gradually before going public on April 9, 2026. Sample data shared online has been reviewed by cybersecurity experts who say it appears credible and consistent with what would be stored at such a facility. Full verification remains ongoing.

What Was Taken

The alleged dataset exceeds 10 petabytes, roughly equivalent to the combined storage of 10,000 high-end laptops. Reported contents include:

Organizations reportedly affected include the Aviation Industry Corporation of China, the Commercial Aircraft Corporation of China, and the National University of Defense Technology.

Why It Matters

This breach represents a significant exposure of military and advanced research data from a nation-state supercomputing facility. For the global defense and intelligence community, the implications are severe: weapons systems schematics, aerospace research, and classified defense documents potentially entering the open market or falling into adversarial hands. The incident also signals that even heavily resourced state infrastructure remains vulnerable to prolonged intrusions. Defenders across critical infrastructure sectors should treat this as a warning that high-performance computing environments are high-value targets requiring commensurate security investment.

The Attack Technique

Initial analysis indicates the attacker exploited a compromised VPN domain associated with the facility to gain initial access. Once inside the network, FlamingChina reportedly deployed a botnet to automate and distribute the data extraction process, allowing them to siphon petabytes of data over an extended period without triggering volume-based detection thresholds. The prolonged dwell time suggests gaps in network monitoring, lateral movement detection, and data loss prevention controls.

What Organizations Should Do

Sources: China Hit by 10PB Data Breach at Supercomputing Center