Beijing, China,: A major cybersecurity breach has reportedly compromised a government-linked supercomputing facility in China, with hackers allegedly stealing over 10 petabytes of sensitive data, including classified defence research, missile schematics, and war simulation records.

According to a report by CNN, the breach is believed to have targeted the National Supercomputing Center in Tianjin, a critical infrastructure hub that supports thousands of organisations involved in advanced science, aerospace, and defence projects.

Massive data breach raises global concerns

The scale of the breach is staggering, with estimates suggesting that more than 10 petabytes of data may have been exfiltrated. To put this into perspective, one petabyte equals 1,000 terabytes, meaning the stolen data could be equivalent to millions of high-resolution files and documents.

If confirmed, the incident could rank among the largest known cyber intrusions involving sensitive government infrastructure. Experts warn that such a vast dataset may contain highly valuable intelligence, particularly in areas like military strategy, weapons development, and advanced simulations.

The compromised facility, located in Tianjin, plays a key role in China’s research ecosystem, reportedly serving over 6,000 organisations. These include institutions working on aerospace engineering, artificial intelligence, and national defence technologies.

How the breach reportedly unfolded

Cybersecurity researchers analysing the incident suggest that the hacker gained access through a compromised VPN endpoint, which allowed entry into the system without immediate detection. Once inside, the attacker is believed to have used a botnet—a distributed network of automated systems—to extract data gradually over time.

Rather than transferring large volumes of data at once, which could trigger security alerts, the hacker reportedly siphoned information in smaller chunks across multiple systems. This low-profile approach enabled the breach to go unnoticed for an extended period, possibly up to six months.

Experts noted that while the techniques used were not particularly sophisticated, their execution proved effective due to the lack of timely detection mechanisms.

Data surfaces online via Telegram

The stolen data first came to light in early February when a user identified as “FlamingChina” began sharing samples on an anonymous channel on Telegram. The leaked previews reportedly included files linked to aerospace engineering, bioinformatics, and fusion simulations.

Further analysis of the samples indicated the presence of documents marked “secret” in Chinese, along with technical renderings and simulation data related to bombs, missiles, and advanced defence systems.

The hacker group also claimed connections between the leaked data and major Chinese institutions, including the Aviation Industry Corporation of China and the National University of Defense Technology.

Stolen data reportedly up for sale

Following the breach, the attackers are believed to have begun monetising the stolen dataset. Reports indicate that limited previews were offered for a few thousand dollars, while full access to the data is being priced in the range of several lakh rupees equivalent, payable through cryptocurrency.

While the authenticity of the entire dataset has not been independently verified, multiple cybersecurity experts who examined portions of the leak suggest that the material appears credible and highly sensitive.

If genuine, the breach could have far-reaching implications, potentially providing strategic insights to foreign governments, intelligence agencies, or cybercriminal networks.

Rising concerns over cyber vulnerabilities

The incident has once again highlighted vulnerabilities in critical infrastructure systems, particularly those handling classified or high-value research data. Supercomputing centres, which process vast amounts of complex information, are increasingly becoming targets for cyber espionage.

Analysts say that even well-protected systems can be compromised through relatively simple entry points such as weak VPN security or inadequate monitoring protocols.

The breach also underscores the growing importance of cybersecurity resilience, especially as geopolitical tensions and digital warfare continue to evolve globally.

Conclusion

While investigations are still ongoing and full verification remains pending, the reported breach of a Chinese supercomputing facility signals a potentially serious lapse in cybersecurity. If confirmed, it could represent one of the most significant data leaks involving defence-related research in recent years. The incident serves as a stark reminder of the risks facing critical infrastructure in an increasingly digital and interconnected world.