Military secrets for sale as FlamingChina leaks classified chinese weapons research data

A hacker has claimed to break into one of China’s most powerful computer systems and steal a massive amount of sensitive data. The system is linked to the National Supercomputing Center in Tianjin, a key facility that supports thousands of users across the country.

The attacker, using the name “FlamingChina,” says they accessed and copied more than 10 petabytes of data. This is an extremely large amount. For comparison, one petabyte equals 1,000 terabytes, while a typical laptop stores about one terabyte.

The hacker has posted a small sample of the data online. They are offering limited previews for thousands of dollars and full access for a much higher price. Payments are being requested in cryptocurrency.

At present, the claims have not been officially confirmed. However, cybersecurity experts who reviewed the sample data believe it appears consistent with what such a system would contain.

What kind of data may have been exposed

The stolen dataset is believed to include highly sensitive and possibly classified material. Some documents in the sample are marked “secret” in Chinese. The files appear to cover a wide range of advanced research areas.

These include aerospace engineering, military research, missile designs, and scientific simulations. There are also reports of animated models and technical renderings related to defense equipment.

The data is said to be connected to major organizations. These include the Aviation Industry Corporation of China and the Commercial Aircraft Corporation of China. Another institution mentioned is the National University of Defense Technology.

These organizations are involved in important national-level projects. This makes the data highly valuable and sensitive. Experts note that such information could attract interest from foreign intelligence agencies.

The variety of files also shows how widely the supercomputing center is used. It supports research across many industries, not just defense.

Washington warns Nvidia: sell AI chips to China only under non-negotiable national security guardrails

How the hacker allegedly gained access

According to cybersecurity researchers, the attacker may have entered the system through a compromised VPN.

Once inside, the hacker reportedly used a botnet.  In this case, it was used to collect and transfer data from the supercomputer.

The data was not taken all at once. Instead, it was slowly extracted over a period of about six months. The attacker divided the data and moved it through different systems. This helped avoid detection.

Experts say this method is not highly complex. It relies more on weak monitoring and system design than advanced hacking techniques. Small amounts of data leaving a system are harder to detect than one large transfer.

This approach allowed the hacker to remove a huge amount of data without raising alarms for a long time.

Paul Randall and co-conspirators plead guilty in $270 million Medi-Cal reimbursement fraud case

Why this breach is significant

If confirmed, this could be one of the largest known data breaches involving China’s technology infrastructure. The scale of 10 petabytes alone makes it unusual.

The nature of the data adds to the concern. It includes research and materials that may have military and strategic importance. Such information could have intelligence value.

The case also highlights possible weaknesses in cybersecurity systems. Large and important facilities like supercomputing centers are expected to have strong protections. A breach of this scale raises questions about how secure these systems are.

China has several such centers in major cities like Guangzhou, Shenzhen, and Chengdu. They support thousands of users and play a key role in research and development.

This incident follows earlier cases where large datasets were exposed due to security gaps. Experts say such events show the need for stronger monitoring and better protection of critical systems.

For now, the claims remain under review. Investigations and expert analysis are ongoing to determine the authenticity and full impact of the alleged breach.

TOP 10 TRENDING ON NEWSINTERPRETATION

NASA uncovers long-running phishing plot aimed at sensitive defense technology

A major phishing and cyber-espionage operation has been uncovered...

EU develops data sharing rules for Google alongside digital identity wallet rollout

The European Union has launched a formal procedure through...

Elon Musk’s lawsuit against OpenAI raises questions over AI mission

A major legal battle is underway between OpenAI and...

Meta to cut 10 percent of workforce while Microsoft offers voluntary buyouts in the US

Two of the world’s largest technology companies are making...

Gold and Silver imports to be handled by 15 banks including HDFC, ICICI, Axis and Yes Bank till 2029

The Government of India has issued a fresh notification...

Trump informally gauges Vance and Rubio as public attention highlights contrasts

A new political development in the United States is...

Melania Trump denies connections to Epstein as Trump rejects media claims

Melania Trump made an unexpected public statement addressing claims...

Geneva on standby as frantic push for second round of Iran talks intensifies

Geneva has come into focus as a key diplomatic...

Operational blunder exposes massive Russian cyber espionage attack on Ukrainian prosecutors

A major cyberattack has compromised the email accounts of...

NASA uncovers long-running phishing plot aimed at sensitive defense technology

A major phishing and cyber-espionage operation has been uncovered...

EU develops data sharing rules for Google alongside digital identity wallet rollout

The European Union has launched a formal procedure through...

Meta to cut 10 percent of workforce while Microsoft offers voluntary buyouts in the US

Two of the world’s largest technology companies are making...

Melania Trump denies connections to Epstein as Trump rejects media claims

Melania Trump made an unexpected public statement addressing claims...

Related Articles

Popular Categories