Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Home/CyberSecurity News/Hackers Claim to Have Stolen 10 Petabytes of Data from China’s
CyberSecurity News

Hackers Claim to Have Stolen 10 Petabytes of Data from China’s

Hackers claim one of China’s most strategically important computing facilities has suffered a massive cyber intrusion. More than 10 petabytes of sensitive information was allegedly stolen from...

David kimber
David kimber
April 9, 2026 3 Min Read
5 0

Hackers claim one of China’s most strategically important computing facilities has suffered a massive cyber intrusion. More than 10 petabytes of sensitive information was allegedly stolen from a state-run supercomputing environment, which experts suspect is the National Supercomputing Center in Tianjin.

If confirmed, the incident could rank among the largest known data theft cases ever reported in China, not only because of the extraordinary volume involved but also because the Tianjin center supports more than 6,000 clients across the country’s scientific, industrial, and defense sectors.

Reporting on the alleged breach says the leaked sample includes highly sensitive defense documents and missile design data, raising immediate concerns about the possible exposure of research tied to military and aerospace work.

Supercomputing Center DataBreach

The suspected target is no ordinary data center. The Tianjin supercomputing facility is described as a national resource that provides high-performance computing infrastructure for major research institutions and defense-linked organizations, making any compromise potentially significant for both national security and industrial secrecy.

Because such centers concentrate workloads from many entities in one place, a breach there could expose material from multiple organizations at once rather than from a single contractor or ministry.

Cybersecurity experts who reviewed portions of the leaked material have stopped short of confirming the full breach, but they say the sample data appears broadly consistent with what would be expected from a major Chinese supercomputing center.

That leaves the case in a familiar but troubling gray zone for defenders and threat analysts: the complete archive remains unverified, yet the evidence released so far appears credible enough to justify serious scrutiny.

Chinese authorities and outside observers have not independently verified the full scope of the incident, which remains a central unanswered question as the claims continue to circulate online.

What makes the case especially alarming is the attacker’s account of how the intrusion allegedly unfolded. A researcher cited in reporting on the incident said the person claiming responsibility stated that access began through a compromised VPN domain, after which a botnet was used to infiltrate systems, extract files, and store the stolen data over roughly six months.

If that timeline is accurate, it would suggest a lengthy period of undetected access inside infrastructure tied to some of China’s most sensitive scientific and defense-related computing workloads.

The claims have also appeared alongside online channels and dark-web style listings, intensifying concerns that the actor may be attempting to monetize the alleged haul or sell access tied to the breach.

Even without full confirmation, the release of sample material fits a familiar cybercriminal playbook in which partial disclosure is used to build credibility, attract buyers, and increase pressure around an incident before independent verification is complete.

The wider implications extend far beyond one facility. Supercomputing centers sit at the intersection of academic research, aerospace development, advanced simulation, and defense modeling, which means a single compromise can have cascading effects across an entire scientific and security ecosystem.

If the Tianjin breach proves even partially true, it will stand as a stark warning that high-value national computing infrastructure remains an attractive and potentially vulnerable target in the global cyber conflict landscape.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCybersecurityHackerSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Microsoft Suspends Dev Accounts of High-Profile Developer Open-Source

Next Post

New Phishing Attack Via Google Storage Deploys Remcos

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us