Military secrets for sale as FlamingChina leaks classified chinese weapons research data

A hacker has claimed to break into one of China’s most powerful computer systems and steal a massive amount of sensitive data. The system is linked to the National Supercomputing Center in Tianjin, a key facility that supports thousands of users across the country.

The attacker, using the name “FlamingChina,” says they accessed and copied more than 10 petabytes of data. This is an extremely large amount. For comparison, one petabyte equals 1,000 terabytes, while a typical laptop stores about one terabyte.

The hacker has posted a small sample of the data online. They are offering limited previews for thousands of dollars and full access for a much higher price. Payments are being requested in cryptocurrency.

At present, the claims have not been officially confirmed. However, cybersecurity experts who reviewed the sample data believe it appears consistent with what such a system would contain.

What kind of data may have been exposed

The stolen dataset is believed to include highly sensitive and possibly classified material. Some documents in the sample are marked “secret” in Chinese. The files appear to cover a wide range of advanced research areas.

These include aerospace engineering, military research, missile designs, and scientific simulations. There are also reports of animated models and technical renderings related to defense equipment.

The data is said to be connected to major organizations. These include the Aviation Industry Corporation of China and the Commercial Aircraft Corporation of China. Another institution mentioned is the National University of Defense Technology.

These organizations are involved in important national-level projects. This makes the data highly valuable and sensitive. Experts note that such information could attract interest from foreign intelligence agencies.

The variety of files also shows how widely the supercomputing center is used. It supports research across many industries, not just defense.

Washington warns Nvidia: sell AI chips to China only under non-negotiable national security guardrails

How the hacker allegedly gained access

According to cybersecurity researchers, the attacker may have entered the system through a compromised VPN.

Once inside, the hacker reportedly used a botnet.  In this case, it was used to collect and transfer data from the supercomputer.

The data was not taken all at once. Instead, it was slowly extracted over a period of about six months. The attacker divided the data and moved it through different systems. This helped avoid detection.

Experts say this method is not highly complex. It relies more on weak monitoring and system design than advanced hacking techniques. Small amounts of data leaving a system are harder to detect than one large transfer.

This approach allowed the hacker to remove a huge amount of data without raising alarms for a long time.

Paul Randall and co-conspirators plead guilty in $270 million Medi-Cal reimbursement fraud case

Why this breach is significant

If confirmed, this could be one of the largest known data breaches involving China’s technology infrastructure. The scale of 10 petabytes alone makes it unusual.

The nature of the data adds to the concern. It includes research and materials that may have military and strategic importance. Such information could have intelligence value.

The case also highlights possible weaknesses in cybersecurity systems. Large and important facilities like supercomputing centers are expected to have strong protections. A breach of this scale raises questions about how secure these systems are.

China has several such centers in major cities like Guangzhou, Shenzhen, and Chengdu. They support thousands of users and play a key role in research and development.

This incident follows earlier cases where large datasets were exposed due to security gaps. Experts say such events show the need for stronger monitoring and better protection of critical systems.

For now, the claims remain under review. Investigations and expert analysis are ongoing to determine the authenticity and full impact of the alleged breach.

TOP 10 TRENDING ON NEWSINTERPRETATION

Who stands to gain from plan of Bernie Sanders to tax billionaire wealth

A major policy proposal led by Bernie Sanders is...

OpenAI proposes worker-focused policies as AI reshapes the economy

Artificial intelligence is no longer just about smarter machines....

Surprise alliance as Tom Malinowski backs rival after AIPAC-backed loss

A closely watched primary election has taken an unexpected...

What Elon Musk does differently to save more and spend wisely

In a world where spending is often seen as...

Pune International Centre hosts discussion on Iran conflict highlighting India strategic role

A thought-provoking discussion in Pune brought attention to the...

From 126k to 70k: Why the Bitcoin crash cost Donald Trump 1.6 billion in personal wealth

A major financial move into cryptocurrency has drawn widespread...

Digital Armageddon? Claude Mythos strips away 30 years of internet security in three days

A major artificial intelligence company, Anthropic, has introduced a...

Russian disinformation group Storm 1516 targets Tisza Party with fake Jeffrey Epstein documents

A fresh wave of disinformation has surfaced during the...

Valeria Chomsky admits grave mistake and says Jeffrey Epstein was a Trojan horse for the couple

The recent release of private communications has sparked a...

Who stands to gain from plan of Bernie Sanders to tax billionaire wealth

A major policy proposal led by Bernie Sanders is...

OpenAI proposes worker-focused policies as AI reshapes the economy

Artificial intelligence is no longer just about smarter machines....

Surprise alliance as Tom Malinowski backs rival after AIPAC-backed loss

A closely watched primary election has taken an unexpected...

What Elon Musk does differently to save more and spend wisely

In a world where spending is often seen as...

Pune International Centre hosts discussion on Iran conflict highlighting India strategic role

A thought-provoking discussion in Pune brought attention to the...

From 126k to 70k: Why the Bitcoin crash cost Donald Trump 1.6 billion in personal wealth

A major financial move into cryptocurrency has drawn widespread...

Digital Armageddon? Claude Mythos strips away 30 years of internet security in three days

A major artificial intelligence company, Anthropic, has introduced a...

Related Articles

Popular Categories