
Rate Of Return
CommemorativeChina's supercomputing center has encountered an unprecedented security storm, with 10PB of core scientific research data suspected of being leaked and sold for a pittance. The Chinese government has remained silent for a month and a half.
China's largest and most influential national supercomputing center (NSCC) is located in Tianjin, connecting over 30 provinces and cities, serving more than 1,600 core institutions, including military-industrial state-owned enterprises.
It not only deployed the first supercomputer ranked number one in the world, "Tianhe-1," but is also the digital heart of China's scientific research and industry. The data security of this center is directly related to the lifeline of China's core technology and national security.
In early February 2026, a hacker using the account @sparrowstrike1 posted on the famous dark web forum Breach Forums, claiming to have successfully breached the center's defense system and stolen over 10PB (approximately 10,000TB, equivalent to 10,000 1TB hard drives) of core data. The hacker is currently publicly selling these sensitive assets for a mere 10 Monero (XMR). (Note: As of March 17, 2026, 1 Monero is approximately $370, so 10 Monero totals only about $3,700.)
The data suspected of being leaked is not ordinary personal information but the crystallization of China's top-tier scientific research capabilities. The data covers highly sensitive fields such as aerospace engineering (involving AVIC, COMAC), military weapons research (involving NUDT, NWPU), as well as nuclear fusion simulations and biomedicine.
The 10PB data volume means that the vast majority of strategic-level simulation and engineering calculation results stored at this center may have entirely fallen into the hands of others. This not only puts years of hard work by tens of thousands of researchers at risk of reverse engineering but may also allow competitors to directly obtain the underlying parameters of our country's cutting-edge technologies, erasing the technological lead. As China's largest supercomputing center, the NSCC carries a large number of top-secret computing tasks related to national defense security. The loss of data from such a core platform is equivalent to a "digital dam" of national scientific research infrastructure collapsing, with potential losses that cannot be measured in monetary terms.
Some data samples briefly circulated on GitHub but disappeared shortly after.
The English tweet below has reposted some core materials of Chinese military-industrial facilities as evidence.
Translation of Figure 1:
"However, there are indeed several highly valuable files in the sample data. One file marked 'Confidentiality period: 10 years' documents a simulation study on the damage effectiveness of a weapon system against armored target groups, including targets such as the HIMARS multiple rocket launcher system, aircraft carriers, and concrete bunker fortifications from World War II." (4/7)
Translation of Figure 2
"The purpose of this study appears to be testing the strike effectiveness of a certain type of high-penetration weapon against specific armor forms and targets, including details such as the selection of optimal strike locations and a comparison of the impact resistance differences of armor materials with varying densities. (5/7)"
The incident has been exposed for over a month, but the National Supercomputing Center in Tianjin and related functional departments have not issued any official confirmation or denial statement regarding this matter.
As China's top computing power hub, this incident has attracted high attention in the global cybersecurity field.
The copyright of this article belongs to the original author/organization.
The views expressed herein are solely those of the author and do not reflect the stance of the platform. The content is intended for investment reference purposes only and shall not be considered as investment advice. Please contact us if you have any questions or suggestions regarding the content services provided by the platform.
