On April 10, 2026, news broke that China may have suffered what experts are calling one of the largest data breaches in its history, with a hacker group reportedly infiltrating the National Supercomputing Center (NSCC) in Tianjin and extracting more than 10 petabytes of highly sensitive data. The NSCC, a cornerstone of China’s technological ambition, supports thousands of organizations, including key players in defense, aerospace, and advanced scientific research. The sheer scale and nature of the compromised information have sent shockwaves through the global cybersecurity community and raised urgent questions about the safety of critical infrastructure worldwide.
The breach, first reported by multiple outlets including The Economic Times, CNN, and Republic World, centers on a hacker or group operating under the name "FlamingChina." According to cybersecurity analysts and leaked samples, the stolen data includes classified defense documents, technical schematics for missiles, research files related to fighter jets, and war simulation data. Some of the files reportedly bear the "secret" designation in Chinese, underscoring the sensitivity of the material. The dataset, at over 10 petabytes, is almost unfathomable in scale—equivalent to millions of high-end laptops filled to the brim.
The NSCC in Tianjin is no ordinary facility. As CNN reports, it provides infrastructure to more than 6,000 clients, spanning government agencies, scientific institutions, and defense-linked organizations. Its systems are designed to handle massive computational tasks, from climate modeling and bioinformatics to nuclear fusion simulations and weapons research. That breadth made it a particularly tempting target for cybercriminals and state-backed actors alike.
The story began to unfold publicly when, on February 6, 2026, the group FlamingChina posted samples of the alleged data trove on Telegram. Their claims, as described by Republic World and Jerusalem Post, included access to research across aerospace engineering, military technology, bioinformatics, and nuclear fusion simulation. The group did not stop at boasting; they offered limited previews for thousands of dollars and full access for hundreds of thousands, payable in cryptocurrency. This open market approach has heightened concerns that the data could land in the hands of adversarial state intelligence services or organized cybercriminal networks.
Cybersecurity experts who reviewed portions of the leaked files noted their authenticity. Marc Hofer, a cybersecurity researcher, told CNN that the dataset’s size alone would make it highly attractive to foreign intelligence agencies. "Only they probably have the capacity to work through all this data and come back with something useful," Hofer observed. Dakota Cary, a consultant at SentinelOne, added, "They’re exactly what I would expect to see from the supercomputing center. You would use supercomputer centers for large computational tasks. The swath of samples that the sellers put out kind of really speaks to the breadth of customers that this supercomputing center had."
How did the hackers pull off such a colossal breach? According to cybersecurity researchers cited in CNN and Republic World, the attackers exploited a compromised VPN domain to gain access to the NSCC’s network. Once inside, they deployed a botnet—a network of distributed systems—to quietly siphon off data over a period of six months. By breaking up the extraction into smaller chunks and distributing it across multiple servers, the hackers managed to avoid detection by security systems that typically look for large, sudden data transfers. "It wasn’t, at least my read on it, anything particularly incredible in the way that they pulled out this information," Cary said. "You can think of it as having a bunch of different servers that you have access to and you’re pulling data through this hole in the security of the NSCC—pulling some down to one server, some down to the next."
The method may not have been cutting-edge, but it was effective—particularly in an environment where, as experts have repeatedly noted, cybersecurity practices have lagged behind technological advances. "They’ve really had poor cybersecurity for a very long time across a wide number of industries and organizations. If you look at what Chinese policymakers say themselves, cybersecurity in China has not been good. They would say it’s still improving at this point in time," Cary explained to CNN. Indeed, China’s own 2025 National Security White Paper acknowledged the need to build "robust security barriers for the network, data, and AI sectors," and pledged continued efforts to strengthen protections for key infrastructure.
The implications of the breach are potentially vast. If the data includes the full range of classified defense documents, missile designs, and military simulations as claimed, it could threaten years of Chinese military and scientific research. Some experts believe that only major state-level intelligence agencies would have the resources to process and exploit such a massive trove, but the fact that it is being offered for sale on the open market raises the specter of it falling into less predictable hands. "I’m sure that there are plenty of governments globally that are interested in some of the data at the NSCC, but many of those governments that are interested also may already have the data," Cary told CNN, hinting at the complex world of cyber espionage where secrets are often traded and stolen multiple times over.
Despite the mounting evidence, Chinese officials have not yet publicly verified the incident. As Republic World and The Economic Times both noted, if confirmed, this would stand as the largest known data heist from China—potentially eclipsing even the massive 2021 database leak that exposed personal information of up to one billion Chinese citizens. For now, the Chinese government’s silence is fueling speculation and concern both domestically and abroad.
The breach also comes at a time when China is striving to position itself as a global leader in advanced technology and artificial intelligence. The NSCC in Tianjin is just one of several supercomputing hubs across the country, alongside centers in Guangzhou, Shenzhen, and Chengdu, all supporting government, academic, and industrial users. This incident, however, highlights the persistent vulnerabilities that can undermine even the most ambitious technological projects.
As the world waits for more official confirmation and details, the Tianjin supercomputer breach stands as a stark reminder: in an era where information is both power and currency, even the most formidable digital fortresses can be breached—sometimes through surprisingly simple means. The fallout from this incident, both for China and for the global cybersecurity landscape, is sure to be felt for years to come.