News: 0181496824

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Hacker Steals 10 Petabytes of Data From China's Tianjin Supercomputer Center (cnn.com)

(Thursday April 09, 2026 @05:00PM (BeauHD) from the largest-ever-China-hack dept.)


An anonymous reader quotes a report from CNN:

> A hacker has allegedly stolen a massive trove of sensitive data -- including highly classified defense documents and missile schematics -- from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China. The dataset, which allegedly [1]contains more than 10 petabytes of sensitive information , is believed by experts to have been obtained from the National Supercomputing Center (NSCC) in Tianjin -- a centralized hub that provides infrastructure services for more than 6,000 clients across China, including advanced science and defense agencies.

>

> Cyber experts who have spoken to the alleged hacker and reviewed samples of the stolen data they posted online say they appeared to gain entry to the massive computer with comparative ease and were able to siphon out huge amounts of data over the course of multiple months without being detected. An account calling itself FlamingChina posted a sample of the alleged dataset on an anonymous Telegram channel on February 6, claiming it contained "research across various fields including aerospace engineering, military research, bioinformatics, fusion simulation and more." The group alleges the information is linked to "top organizations" including the Aviation Industry Corporation of China, the Commercial Aircraft Corporation of China, and the National University of Defense Technology.

>

> Cyber security experts who have reviewed the data say the group is offering a limited preview of the alleged dataset, for thousands of dollars, with full access priced at hundreds of thousands of dollars. Payment was requested in cryptocurrency. CNN cannot verify the origins of the alleged dataset and the claims made by FlamingChina, but spoke with multiple experts whose initial assessment of the leak indicated it was genuine. The alleged sample data appeared to include documents marked "secret" in Chinese, along with technical files, animated simulations and renderings of defense equipment including bombs and missiles.



[1] https://www.cnn.com/2026/04/08/china/china-supercomputer-hackers-hnk-intl



So (Score:3, Funny)

by RitchCraft ( 6454710 )

The hacker stole back stolen data then?

Re: (Score:2)

by CEC-P ( 10248912 )

I was just gonna say, I bet a lot of those schematics look familiar. Well, a bunch of Chinese companies are about to go on the entity list.

How the fuck? (Score:5, Insightful)

by anoncoward69 ( 6496862 )

Do you not notice 10 PETABYTES of data transmitting out of your data center? This was either a slow transfer over a REALLY long time, or they pegged the network to download it all really quickly.

Re: (Score:2)

by zlives ( 2009072 )

RTFA but even 6 months seems like it should have triggered something. unless they rely on AI to monitor the alerts, and if you know the model you can game it.

Re: (Score:2)

by nightflameauto ( 6607976 )

> RTFA but even 6 months seems like it should have triggered something. unless they rely on AI to monitor the alerts, and if you know the model you can game it.

I wonder if you did a slowly accelerating transfer if it would just be shrugged off as a natural escalation of something. What, wouldn't know, but folks tend to get really stupid when something starts at a trickle and builds slowly over time.

Re: How the fuck? (Score:3)

by sziring ( 2245650 )

The only indication was a small blinking red light that was partially hidden by an empty coffee mug. It happened just like in the movies. You think they would have learned by now not to cover important blinking lights.

Re: How the fuck? (Score:3)

by rayzat ( 733303 )

That was one of my first two thoughts. How long did it take to get that out and where the heck did you store it. That's not an insignificant amount of capacity to acquire.

Re: (Score:2)

by sabbede ( 2678435 )

Well, they didn't have to solve that problem in a day. If you had three weeks to do it, I'm sure you could find a way to store a petabyte. That, ten times.

Re: (Score:2)

by nightflameauto ( 6607976 )

> That was one of my first two thoughts. How long did it take to get that out and where the heck did you store it. That's not an insignificant amount of capacity to acquire.

Maybe they used middle-out compression. Richard Hendricks is gonna sue somebody.

Re: (Score:2)

by omnichad ( 1198475 )

Even over 6 months, that's 5 Gbps averaged out. That's USB 3.0 speeds. Must have been a really impressive compression algorithm or a lot of filler/duplicate data that is easily compressed.

Re: (Score:2)

by anoncoward69 ( 6496862 )

Still seems this should have triggered multiple alerts. Disk IO usage, compute resource usage, bandwidth and data transmission usage. Even without specific alerts you would think someone would notice degraded system performance.

Re: (Score:2)

by breeze95 ( 880714 )

> Do you not notice 10 PETABYTES of data transmitting out of your data center? This was either a slow transfer over a REALLY long time, or they pegged the network to download it all really quickly.

Even so, it will take a long time to download 10 PETABYTES of data. For example, if they downloaded the data at 1 Gbps (this is about standard for a business internet connection) or 125 MB/s, it will take over 2 years to download 10 petabytes—assuming there is no lag, latency or throttling. If they download it at 10Gbps it takes around 3 months. Downloading at 1 Gbps and higher will be noticed, so; I am skeptical that they were able to download 10 petabytes of data. But you never know.

Re: (Score:2)

by anoncoward69 ( 6496862 )

I would think they would want to transfer as fast as they can to get as much as they can before being detected and cut off. Initiating a slow transfer that might just be seen as noise on any monitoring leaves significantly more time to be detected and cut off, or detected, monitored and traced.

Re: (Score:2)

by fabioalcor ( 1663783 )

Maybe they've used the (much probably existing) gov't backdoor, which log activities are directed to /dev/null .

Not in all the world (Score:2)

by Spazmania ( 174582 )

There's not 10 petabytes of sensitive data in all the world. 10 petabytes is enough to store a copy of every movie and television show ever released to DVD plus every book ever written in any language on Earth.

What they captured was some sensitive data and a whole lot of garbage that someone could possibly, maybe analyze to make some statistical inferences about conceivably sensitive data.

wtf (Score:2)

by methano ( 519830 )

What, pray tell, would you even do with 10 petabytes of data?

Re: (Score:3)

by Fly Swatter ( 30498 )

Will it fit in a station wagon? Never underestimate the bandwidth...

Yes, yes it will fit in a station wagon Re:wtf (Score:1)

by davidwr ( 791652 )

10TB 3.5" drives are common enough. 1000 of those could easily fit in a station wagon.

Re: (Score:2)

by DDumitru ( 692803 )

its the old joke about bandwidth versus latency. A suburban can hold an awful lot of 1TB uSD cards.

Re: (Score:2)

by methano ( 519830 )

Show your face, you sniveling coward!

Where would you even keep it? (Score:3)

by jfdavis668 ( 1414919 )

How can you transmit it, what would you do with it, but the big question is where would you put it?

Re:Where would you even keep it? (Score:4)

by Scutter ( 18425 )

They bought a 10PB thumb drive from Aliexpress for $16.

The Alliance Needs To See That (Score:2)

by NMBob ( 772954 )

Look for the folder called, "Stardust".

What country are the hackers in? (Score:2)

by ukoda ( 537183 )

I wonder what country the hackers are in and if they have state connections? Chinese government, like most governments, has double a standard when it comes to hacking. So while they have no problems with their own hackers operating against offshore targets I doubt they will take it well once if they work out which country to blame for this.

If the hackers are based in the USA it would not help relations between them but given how bad they are I guess little would come of it. On the other hand if they a

Re: (Score:2)

by sabbede ( 2678435 )

Russian hackers would cause tension, yeah. To that end, the US should do everything possible to make it look like it was a Russian with government ties. After securing access to the data.

Filleted alive (Score:2)

by ebonum ( 830686 )

These guys could have quietly cut a deal with the NSA/CIA. Now that China knows to look for them, they better watch their backs. Talk about poking the dragon.

Re: (Score:3)

by sabbede ( 2678435 )

There's already an NSA representative knocking on the guy's door. With a big check in one hand and something terrifying in the other.

Re: (Score:2)

by ebonum ( 830686 )

The CIA is running Chinese language ads looking for spies.

[1]https://www.theguardian.com/us... [theguardian.com]

The US will pay very good money for secrets.

[1] https://www.theguardian.com/us-news/2026/feb/13/cia-publishes-recruitment-video-disaffected-chinese-soldiers

Oops! (Score:2)

by jenningsthecat ( 1525947 )

The "donate an organ today" item that WASN'T on some poor Chinese IT sod's To Do list will soon have a check mark beside it...

"A hacker"... underselling (Score:2)

by felixrising ( 1135205 )

Kind of underselling the type of hacker who has 10 Petabytes of storage on hand. It's not your average everyday hack. That is an organisation and likely state sponsored.

10 PB doesn't cost all that much. (Score:3)

by TheMiddleRoad ( 1153113 )

I figure it could be put together for $250k with a mix of used and new hardware. Possibly less. Certainly less than 300k. And that's with parity. The power bill would suck.

Buckle up!