· 199 comments · Save ·
News & Current Events Apr 8, 2026 at 4:17 PM

10 petabyte (10000 terabyte) of data allegedly stolen from Chinese supercomputer, including classified defense documents

Posted by amra_the_lion


A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data | CNN
CNN
A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data | CNN
A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile schematics – from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China.

🚩 Report this post

199 Comments

Sign in to comment — or just click the box below.
🔒 Your email is never shown publicly.
static989 2 days ago +2285
So allegedly they used a compromised VPN domain to access the data, and then used a botnet to spread out where the data was going so it wouldn't raise suspicion/trigger alerts Though I'm still curious how no one would notice a spike in the amount of sources transferring data, I wish there was more info on their methods but I can understand why there's not lol. Also: "An account calling itself FlamingChina posted a sample of the alleged dataset on an anonymous Telegram channel on February 6, claiming it contained “research across various fields including aerospace engineering, military research, bioinformatics, fusion simulation and more.”  New WarThunder DLC is gonna be craaaaaaazy
2285
MaybeTheDoctor 2 days ago +638
Moving petabytes of data over Internet is not something that goes unnoticed.
638
static989 2 days ago +290
I agree, the article suggests that if their source is telling the truth then the hacker only succeeded because of incompetence/very poor cyber security. I would imagine they would have been able to notice/stop this, but didn't for whatever reason
290
MaybeTheDoctor 2 days ago +195
I still don’t believe. I think the more likely is that there were petabytes of data stored, some of it got exfiltrated but they don’t know which parts, so they need to assume all of it was compromised. Good cyber security logs which data is accessed, so still bad
195
CoderDevo 2 days ago +148
A supercomputer like this one (10,649,600 cores) can process a petabyte of data in under a minute. A national supercomputer center will have many exabytes of data pass through it over the course of a month. The data exfiltration occurred over 6 months.
148
Tidzor 2 days ago +86
To read 1 PB in 60s you need ~17 TB/s sustained throughput. That’s far beyond what a Tianhe-1A system can sustain at storage level. Internal memory / compute may attain exabyte-scale, but it does not have the capacity for Exabyte-scale data movement. That said, the rest still holds: 10 PB over 6 months is ~55 TB/day, so about ~5 Gbit/s sustained. I don't think this would look like a spike for a national center. Although it must have been quite an elaborate hack (or terrible cybersecurity) if they managed to avoid triggering any alarm based on what the traffic looks like if not the volume.
86
CoderDevo 2 days ago +35
Totally agree that security failed to prevent or even detect this likely sophisticated exfiltration. But I bet it is hard to determine anomalous activity on shared research systems. Of course you are right about actually getting enough I/O bandwidth into the supercomputer. NVLink is at 3.6 TB/s. No idea what they are using in China.
35
Tidzor 2 days ago +17
NVLink is gpu-to-gpu communication inside the node, so relates more to computing. doesn’t apply to storage or network I/O. Once data leaves the node is where things really slow down as it will be limited by the interconnect; where they probably use something like InfiniBand so limited to around 50gb/s per link. Then you will have the filesystem and external network further slowing things down.
17
NotSoFastLady 2 days ago +31
If they had persistent access over a long period, maybe they mirrored/spoofed legit traffic? Initial access is one thing, once they have access that changes things a lot. It just stands to reason state levels actors could pull something like this off. We hear about western adversaries and their capabilities all the time. Rare is it that you hear about what the westerners are actually doing.
31
Bubbly-Magician-- 2 days ago +19
They took 6 months to take the data, seems more plausible that it went unnoticed over that time frame.
19
NotSoFastLady 2 days ago +11
Makes sense to me. I don't know anything specific about western capabilities as far as hacking goes. But I've listened to most episodes of Darknet Diaries and I have listened to a ton of Hacked, as well as Recorded Future news. All of these outlets have had many episodes covering some insane hacks to include state level. What is stunning to me aren't the sophisticated state actors. Its the stuff unaffiliated threat actors like teenage kids are doing. There are so many novel ways that systems are being exploited and data is being exfilrraited. If I had to bet, I'd bet on western capabilities being far more capable than what we are led to believe.
11
3BlindMice1 2 days ago +4
Yeah, teenagers just trying to find a new way around p*** blockers can innovate so hard that the entire industry just kind of gives up or declares they can only do it if they have management of the device the kid uses
4
NotSoFastLady 2 days ago +2
Brute forcing overdial up when I was a teenager lol. It's a good thing bitcoin wasn't a thing, I might gotten into stealing it.
2
-Thick_Solid_Tight- 2 days ago +5
So like the Superman III penny plot, but with data.
5
crimsonpowder 2 days ago +3
Yeah the way anyone halfway competent would do this is first observe the system for a week and learn the traffic curve and then follow it, slowly increasing the overall % over time.
3
domscatterbrain 2 days ago +3
Petabytes of data sounds like 90% of them are rather rubbish telemetry log unless someone really intend to reprocess them. Otherwise they're garbage.
3
lowercasejames 2 days ago +13
Username: admin Password: password Or whatever the Chinese equivalent is.
13
linux_ape 2 days ago +8
U: bing P: chilling
8
failedsatan 2 days ago +23
over six months that's an average of ~7TB per day (roughly, but not an order of magnitude difference). 7TB for a government-scale operation, especially one with ten petabytes of data laying around for six months, is not significant. storing it on the other hand- reliably storing that is many many thousands of dollars.
23
spinbutton 2 days ago +15
That's why my download speeds have been so slow ;-)
15
Hyperious3 2 days ago +12
Something like 75% of inbound/outbound traffic in China is ran through VPN's to bypass the great firewall. Literally petabytes a minute of data. Seeing a bunch of GRE traffic is just another day to them. It's tolerated to an extent since 99% of people in china aren't worth the extra effort of surveillance since they are deemed "unimportant" or "not a threat".
12
ww_crimson 2 days ago +3
10PB over 6 months is nothing for a big data operation
3
zachmorris_cellphone 2 days ago +5
Moving that much data with hardware would even be hard not to notice
5
MaybeTheDoctor 2 days ago
Yeah, we are talking about 2-3000 hard drives and you would need a minivan or pickup truck to move them.
0
Ninj4s 2 days ago +16
> 2-3000 hard drives This is 2026 - you'd need between 277 and 600 hard drives of modern times. But i could fit that in my car.
16
ManonMacru 2 days ago +3
I managed a data platform with an archive layer of 10 PB. At that scale even metadata is huge, listing files and sizes was q long and heavy operation. You don't improvise a transfer and even on modern infrastructure and services (think AWS S3) that is a huge operation that requires coordination between multiple parties. Also cost of holding 10PB is high.
3
GatorNator83 2 days ago +37
We are flaming dragon!!
37
violentwaffle69 2 days ago +21
“Simple Jack belong to US now!”
21
yourpseudonymsucks 2 days ago +6
Take a step back and LITERALLY F*** YOUR OWN FACE
6
TacoIncoming 2 days ago +3
Find out who that was
3
insertadjective 2 days ago +2
THANK YOU AND GOOD NIGHT!
2
e_spider 2 days ago +127
This would take weeks to transfer and use 100% of bandwidth of any firewall during that whole time period, so not seeing the red flags would be a huge level of incompetence
127
EpicBeardBattle 2 days ago +155
I think you vastly underestimate the amount of data generated and transferred on modern supercomputers.
155
someguy7710 2 days ago +76
10 PTB is A LOT of f****** data. Whoever was stealing it was racking up points at Micro Center for hard drives.
76
Koala_eiO 2 days ago +5
10 PB, not PTB.
5
ineyy 2 days ago +57
I was about to agree but no, 10 PB is a shitton of data. it would take almost 3 months of 24/7 to download 1PB on 1Gbit, much less 10. That botnet must have been huge and was probably spread over a long time. It would also take about 3 months at 10Gbit speeds but that's not something normal endpoints have. 10 PB on 1Gbit is 2 and a half years of downloading. But with a 1000 computers with 1Gbit uplink it'd take about 1 day though.
57
justin-8 2 days ago +65
Sure, on a 1gbps link. But if they're on something more modern like a 40 or 100gbps link it's far quicker. I'll guarantee you virtually nothing on that supercomputer is sitting on 1gbe links.
65
imgonagetu 2 days ago +42
Honestly, I would be surprised if it were even that slow. Most of the racks I deploy these days for anything truly compute intensive is getting 400gb minimum, and 800gb is becoming common. 40/100gb is still common for non-compute intensive servers. For a true supercomputer, I would imagine they are using even greater throughput.
42
ineyy 2 days ago +16
Yeah but that's inside the network. Botnet endpoints usually aren't enterprise grade data centers. And getting that data back together in one place is also no small feat.
16
TogTogTogTog 2 days ago +14
They used the enterprise VPN to access the enterprise network. The botnet was functionally a t****** to exfiltrate. If you have 1k connections on a petabyte, it's 1tb per client, so that's ~32kbps/over 1 year, or 64kbps/6mths/client.
14
m4teri4lgirl 2 days ago +4
There is a 0.0, repeating of course, percent chance that they were connected to this vpn on 10Gb link. Multiple workers connected on a 1Gb link is much more likely. That's still a metric shit ton of incompetence by whoever was supposed to secure their network.
4
civilitty 2 days ago +6
Supercomputer clusters have dedicated data transfer nodes with 40-400 gbps data links to the outside world, and they're one of the cheapest parts to upgrade as the technology improves. If the supercomputer is tied to a campus of some sort, it likely has multiple links of that size to the campus and a major national facility would easily have multiple 100-400 gbe links. I don't think I've seen one with less than 40gbe in years outside of small university clusters.
6
Skeesicks666 2 days ago +3
brb, changing max. simultaneous logins on my firewall to 999
3
TryingToBeReallyCool 2 days ago +4
Im willing to wager that this was a state actor at that scale and conducted over at least one or more years. The storage requirements alone mean any small scale hacker group is out, so it has to be a geopolitical player at that point
4
Tidzor 2 days ago +2
It took 6 months to extract the data, nothing a large botnet can't handle.
2
static989 2 days ago +6
The article suggests that this was less of an impressive/difficult feat for the hacker, and moreso a result of incompetence/poor security
6
JohnHazardWandering 2 days ago +9
> so not seeing the red flags would be a huge level of incompetence They thought it was just another Chinese holiday. 
9
bendover912 2 days ago +27
China is known for nepotism in government. The person in charge of preventing stuff like this is probably someone's idiot nephew.
27
its_not_you_its_ye 2 days ago +14
*was
14
Dry_Magazine796 2 days ago +4
Yea he prolly got a chinese defenestration award
4
sillylittlguy 2 days ago +2
> The extraction of 10 petabytes of data took around six months.
2
drifting_signal 2 days ago +4
TIL there are people in this world with a spare 10PB to store hacked data. They're selling access to the data for 10 XMR (about $320 USD lol) Strange stuff
4
ElGuano 2 days ago +780
The hacker is now bankrupt, having to pay for 10PB of HDD storage.
780
kramfive 2 days ago +241
That’s about $250k. Call it $500k for redundancy.
241
janktraillover 2 days ago +92
Ya, you're not risking drive failure during an array rebuild of 10PB. Raid 1 all the way.
92
ToucansBANG 2 days ago +8
For what it’s worth, in the real world you use pools of arrays of drives at this scale. Think groups of 12 drives in RAID6, with multiple groups and a few hot spares per server. Acceptable redundancy, and performance tuned to whatever you optimise for.
8
krneki534 2 days ago +4
Lol, are you from the year 2000? Have you worked with a modern datacenter storage system?
4
-Bento-Oreo- 1 day ago +3
RAID 0 cuz gamer
3
CryptoThroway8205 2 days ago +20
They're only charging a couple hundred grand for the information. Which I'm guessing gets delivered physically with hard drives.
20
Vegetable_Leg_7034 2 days ago +11
Wasn't there a guy stopped at airport security a week ago with hundreds of NVMe drives? How many couriers?
11
ragequitteroffureh 2 days ago +8
Was he smuggling them up his arse? In the current economic climate, that probably yields a greater ROI than buttgold.
8
sigmoid10 2 days ago +2
8TB is currently the max for consumer NVMe drives, so they would need 1250 drives. Well above a million dollars worth of storage at current prices.
2
corys00 2 days ago +58
Maybe they used WinZip and saved some storage
58
ElGuano 2 days ago +27
WinZip: these are our most active users! They must have paid right? ….goddamit.
27
corys00 2 days ago +11
All paid and using the same license key 😂
11
delinquentfatcat 2 days ago +3
Spread across a bunch of 1.44 MB floppy disks
3
SpaceYetu531 2 days ago +29
It's almost unquestionably another government
29
Charybdis150 2 days ago +21
Actually not so sure this time. The group responsible announced this publicly, had a representative speak with cybersecurity experts about how the hack was executed, and is apparently offering to sell it to the highest bidder via cryptocurrency. I can’t think of any good reason an adversarial government would do any of those things if they were behind this. I’m not even sure any other government would want to buy it. As the article states, this wasn’t a very sophisticated attack and reflects more on poor cybersecurity by the Chinese than any ingenious hacking method, so it’s possible state actors could have easily gotten this info themselves if they wanted to. Would be hilarious if foreign intelligence services had been quietly siphoning data for ages before some rando hacker group brought it to everyone’s attention.
21
Wooden-Broccoli-7247 2 days ago +7
Coverup. Maybe China caught on and now the CIA wants to give them someone to point the finger at.
7
Affectionate_Bee6434 2 days ago +38
CIA will cover them
38
MoreLogicPls 2 days ago +8
hacker is definitely CIA sponsored lol, this is just used as a front to say "hey look we didn't steal your data"
8
Hyperious3 2 days ago +2
why do you think SSD prices are through the roof recently, even though they're barely used in AI compute?
2
froz3nt 2 days ago +6
They are used for AI and data center storage, especially NAND. And there is a supply shortage because of lower production previous years.
6
kn3cht 2 days ago +4
Just store it on other people’s computers.
4
leisurechef 2 days ago +1153
Wow the shoe is on the other foot for a change
1153
Scotsmania 2 days ago +572
It probably happens all the time and we just don't see it in the news. Like a spiderman meme of every country hacking each other.
572
1Steelghost1 2 days ago +107
What's the line from Men in Black something about there is always an issue everyday you only hear about the really bad ones.
107
lowkeylye 2 days ago +58
There’s always a korillian death ray or an intergalactic plague or something that’s about to wipe out life on this measly little planet. The only way these people get on with their lives is they DO NoT know about it
58
Ok_Two_2604 2 days ago +13
The best part of that movie was how Tommy Lee Jones played the straight man. (Idk if there is a more pc term for it now)
13
CapsSkins 2 days ago +9
You know that "straight" in the term "straight man" does not mean heterosexual, right?
9
Iwantedthatname 2 days ago +9
I'd say that character is a classic example of a square.
9
civilitty 2 days ago +5
> (Idk if there is a more pc term for it now) Man who identifies as straight.
5
Optimal_Juggernaut37 2 days ago +3
the truth is more like 'you only hear about the ones they want you to hear about'
3
_BreakingGood_ 2 days ago +33
A prolific security researcher once described the cyber security landscape between nations as "A basketball game where the score is 1,424 to 1,329 by the end of the first half." Nobody really puts real money into defense, they just try and hack the opponent as much and as often as possible
33
I_Push_Buttonz 2 days ago +11
> Nobody really puts real money into defense, they just try and hack the opponent as much and as often as possible The US military calls that the 'Defend Forward' strategy. The idea being that the best defense is constant offense so enemy cybersecurity experts are occupied dealing with your intrusions rather than instigating their own intrusions against you.
11
Nice_Reading5272 2 days ago +10
If some hacker is selling the data like what's happening here, it will usually make the news. The difference is that countries like the US are more likely to be compelled to announce that they've been hacked while the Chinese government is more likely to withhold that information.
10
sceadwian 2 days ago +6
Petabytes of data? That's not kids games there.
6
JohnQPublicc 2 days ago +6
If a country steals it, they won’t advertise it and neither would china.
6
nonlawyer 2 days ago +7
we do have a new admin in the US that is more likely to brag even if it is stupid and hurts us overall
7
unfortunatebag 2 days ago +5
What from that article indicated to you this was an American breach? They're posting data samples on Telegram lol.
5
ExpensiveBookkeeper3 2 days ago +20
Question for you. Do you think China announces when they are hacked?
20
antifocus 2 days ago +3
They certainly do, it is just not picked up by Western media.
3
PanNasienie 2 days ago +356
They gonna post it on warthunder forums?
356
aukstais 2 days ago +129
Chinese balance patch incoming
129
_HIST 2 days ago +25
Bro I only started researching, I can't live with everything turning into paper tigers
25
Jack123610 2 days ago +8
Aren’t Chinese vehicles infamously incorrectly modelled? They already artificially nerf them idk what this would change
8
Drbob_ 2 days ago +5
New patch is 10 Petabyte, gonna leave the PC downloading over night again.
5
Illustrious-Syrup509 2 days ago +11
It will definitely contain all the private TikTok and other data that they don't collect.
11
ianjm 2 days ago +6
Suspiciously accurate model of Chinese tanks and planes incoming
6
ROCCOMMS 2 days ago +4
Ahahahahaahha, oh god, I forgot about that. This f****** world we live in, man.
4
supereuphonium 2 days ago +4
Manifesting a buff to the PL-12A missile motor with these classified documents
4
celibidaque 2 days ago +123
First, the KitKat heist. Now, this. We do live in interesting times indeed.
123
Pika256 2 days ago +36
I can try to fathom the gravity of that much states secrets stolen, but feel like the stolen KitKats is much stranger. I had no idea the black market for candies was so melt-in-your-hand hot.
36
marwynn 2 days ago +16
Everyone needs a break
16
church-rosser 2 days ago +3
break me off a piece
3
QuantumDiogenes 2 days ago +2
I read somewhere that one conspiracy theory is that the truck was sold to Russia, as KitKats are popular there, and also sanctioned, so they are hard to get, and thus, expensive. Nestle saw a chance for profit, and took it.
2
Space-Turtle88 2 days ago +7
It's not sanctioned. It's made by nestle in the EU/russia and nestle still does business in russia. The only thing about that conspiracy that might be true is that they are expensive due to inflation of  ingredient prices.
7
getpoopedon 2 days ago +27
The article states it took 6 months for the hacker to extract the 10 PB of information using a botnet after gaining access. This person was dedicated.
27
[deleted] 2 days ago +15
[removed]
15
ApexAurajin 2 days ago +7
Weird for them to go after stollen data, the recipes are readily available. Edit - They deleted their comment and now I feel bad
7
Automata-Omnia 2 days ago +3
haha I wonder how much of the stolen data will be already stolen data from loyal chinese expats
3
cogit2 2 days ago +51
Who has that kind of capacity to steal that much data?
51
CM375508 2 days ago +41
Pretty much any nation state actor would have that ability. But man talk about a slow download
41
Tidzor 2 days ago +20
The article states that it was accomplished through a botnet, so any hacker with access to a large botnet.
20
I-seddit 2 days ago +6
Could be distributed/stolen space. Would make more sense for when it was leeched as well.
6
j909m 2 days ago +17
China.
17
Jack123610 2 days ago +6
I feel like every first world government could do this if they cared enough
6
TalonusDuprey 2 days ago +10
War thunder forums are going to be interesting over the course of the next few weeks.
10
HoightyToighty 2 days ago +141
Love to see it, and as China's tech continues to improve, may its servers continue to attract this attention.
141
modcowboy 2 days ago +28
It was probably a western power and probably just to search for stolen documents from western sources.
28
DateMasamusubi 2 days ago +112
China has engaged in probably the largest theft of intellectual property and design in history. Going to see more attacks like this to steal their tech and designs now.
112
[deleted] 2 days ago +35
[deleted]
35
Tacoburrito96 2 days ago +29
On a manufacturing level too, you see it all the time a company will come out with a patent design manufacturered in China 2 weeks later the same exact product is on temu.
29
[deleted] 2 days ago +15
[deleted]
15
oppai-police 2 days ago +6
People stealing ideas from each other isn't anything new. Sure, between you and me, as individual citizens, these rules like copyrights stuff are created so we don't f*** each other over as to maintain an orderly society. But on a state security level? It would the height of stupidity to not steal if your enemy has a better technology than you. Pride, honour and fairness whatnot doesn't matter when it comes to national security. As individual citizens, we have the duty to NOT steal and to obey the law. As a spy agency of a sovereign state with its security and development at stake? It is their duty to steal and apply make their technology better as to not be outdone by their competitors. That's just how things has always worked and will work. The facade of fair play is a delusion for average joe like you and me to uphold, not for the states. Even the European copied the hell out of each other during the industrial revolution. The Germans had to buy English machines and import them from black market in order to reverse engineer them because the English has placed export restrictions on their manufacturing technology, didn't stop the French or Germans from stealing it though. It's a hard pill to swallow for a lot of people when they see foul play on the world political stage, but it'd be more surprising if they didn't try to steal, just like we all know the Chinese stole a lot of of stealth fighter development data from America, and they'd be stupid not to do it. Your biggest rival has a weapon that can't be detected you wouldn't want to steal it? Bro they didn't even bother to make it look different.
6
Thev69 2 days ago +2
A patent is public information. You can look up anything patented. You can use the courts to protect your patent granted monopoly. Trade secrets are protected via NDA, confidentiality marks, etc. Once a trade secret is leaked you have very little recourse if you cannot sue the leaker for damages.
2
ThePickleConnoisseur 2 days ago +8
Refreshing for it not to be a US breach this time
8
winged_owl 2 days ago +27
Now the rubber band is on the other claw!
27
jsmith_92 2 days ago +7
I see a futurama reference I updoot
7
winged_owl 2 days ago +5
I see someone who appreciates a Futurama reference, I uproot. It is a beautiful cycle
5
Johndough99999 2 days ago +6
Just America stealing the plans back for our military plans
6
RangerStrange 1 day ago +6
So, someone stole all the US data that China stole from the US?
6
40to6inthe4th 2 days ago +71
Read. The. F******. Article. Almost every non-threaded comment in here is answered in the article. Yall are f****** exhausting
71
ElGuano 2 days ago +67
Welcome to Listnook, newcomer!
67
tackle_bones 2 days ago +13
Paywalled, my brotha.
13
[deleted] 2 days ago +3
[deleted]
3
jpstealthy 2 days ago +3
Since you like to tell us what to do, tell us what the article is about.
3
AncestralSpirit 2 days ago +4
Should have used Chrome with an Incognito Mode. Probably forgot to activate it. I always surf with Private browsing so hackers can’t steal info.
4
Ultra_Metal 2 days ago +27
It's nice to watch China get a taste of its own medicine.
27
Imbsiouse 2 days ago +6
Israel and the US has been hacking countries for years now
6
panmetronariston 2 days ago +4
Everybody hacks everybody they can.
4
StickAFork 2 days ago +5
It's just being stolen back.
5
ryo4ever 2 days ago +8
I was going to say how long does it take to download 10 petabyte of data. Must be some fast torrenting…
8
engineered_lifeform 2 days ago +16
On a regular 500Mbps internet connection (62.5 MB/s max download speed) it would take around 1850 days of constant non-stop download without throttling, on a 1Gbps network (125 MB/s max download) it would take only around 925 days. On a 10Gpbs connection it would only take 3 months of constant downloading.
16
Towram 2 days ago +3
Half of these is probably just someone who preferred not to augment data on-the-fly to save some training time of some model
3
devaro66 2 days ago +3
What goes around comes around. That being said, ill believe when I’ll it.
3
Devayurtz 2 days ago +10
Finally. A taste of their own medicine.
10
Snippodappel 2 days ago +5
A taste of their own medicine
5
skucera 2 days ago +6
Funny thing, it's all on US defense contractor letterhead.
6
sillysimon92 2 days ago +4
Jesus, how long would that take to transfer!
4
KingKoopa777 2 days ago +6
Just measure the time interval between the breach and the War Thunder post
6
sillylittlguy 2 days ago +2
> The extraction of 10 petabytes of data took around six months.
2
Horror-Primary7739 2 days ago +3
How the turns have tabled.
3
ducation 2 days ago +5
We are Flaming China! Speedman is with us now.
5
Hipcatjack 2 days ago +2
happy 14th cake day!
2
cinred 2 days ago +8
Jokes on US. 9 pegabytes is just our own data again. We should actually be grateful to China for backing up our most sensitive data free of charge!
8
AsIAm 2 days ago +2
mythos
2
Inoffensive_Account 2 days ago +2
> The alleged sample data appeared to include documents marked “secret” in Chinese… That’ll keep the hackers out.
2
AngrySociety 2 days ago +2
It’s a honeypot
2
Mindless1970 2 days ago +2
So my profession assessment is…..hahahahahahahahhahaha
2
NlghtmanCometh 2 days ago +2
10 PETABYTES?!?!
2
FieldMarchalQ 2 days ago +2
So who’s is hiring native Chinese speakers or sinologists?
2
Cleanbriefs 2 days ago +2
By pigeon? Like that guy in Africa?
2
Crypto_Stoozy 2 days ago +2
Come to find out it’s a honeypot of weird f***** vids
2
umikale 2 days ago +2
Project Mythos?
2
jphamlore 2 days ago +2
I don't have any idea how I would store 10 petabytes of data. Let alone transmit it to someone for money. So if it is stored on the "botnet", it ironically could be because of Chinese hacked routers?
2
Ziodyne967 2 days ago +2
Am I reading that right? Usually it’s America stuff getting screwed over. China though?
2
BossBoltage 2 days ago +2
Was it also other chinese hackers thinking they were stealing from orher nations?
2
HeavyArmsJin 2 days ago +2
That’s a lot of p***
2
entropy13 2 days ago +2
good luck sifting through it, it's hard enough when it's your own shit
2
evapilot9677 2 days ago +2
Copied, not stolen.
2
Sparktank1 2 days ago +2
By who???? Aren't they the ones usually stealing/buying? At they were the top of the food chain.
2
pixlatedpuffin 2 days ago +2
I see Anthropic’s Mythos has freed itself.
2
sur_yeahhh 2 days ago +2
So it contained 10 pictures of somebody's mother? /s
2
50Shekel 2 days ago +2
War thunder patch incoming
2
forestapee 2 days ago +5
About time someone hit them back
5
WealthyMarmot 2 days ago +3
Oh, you can be sure it’s not the first time. But the NSA is not in the habit of showing off their loot on Telegram
3
timfountain4444 2 days ago +6
What a shame, the Chinese are getting a taste of their own herbal medicine. Anyway.
6
tweakwerker 2 days ago +9
Lol at the people in here acting like no other country hacked others before China.
9
timfountain4444 2 days ago +4
It's unusual for China to be hacked on such a scale. And for it to be public information. That's the news here....
4
shilly_willy 2 days ago +5
Someone downloaded a car lol
5
IAmFitzRoy 2 days ago +4
This is ridiculous journalism. 10 petabyte can’t be just “stolen” This is like saying “Mount Fuji was stolen”.
4
StungTwice 2 days ago +5
Suspect last seen escaping via helicopter while wearing a long red coat and hat
5
jphamlore 2 days ago +2
David Copperfield would have had a magic trick titled "Mount Fuji was stolen", if he had found enough and the right people in Japan to play along?
2
DepopulationXplosion 2 days ago +2
How the hell does someone move PETABYTES of data without the network screeching to a halt?
2
MarcusP2 2 days ago +5
Slowly over multiple connections over the course of 6 months, apparently.
5
maxintosh1 2 days ago +3
A petabyte is 1000 terabytes btw
3
Chopper3 2 days ago +6
They must have one hell of a fast data pipe out of there - even if you had 100Gbps external link, and could consistently capture that much data, it'd still take nearly 11 days to transfer, meanwhile the source data system would be working overtime just to keep up.
6
7thAndGreenhill 2 days ago +38
The article explains how it was stolen and that the theft took over 6 months.
38
FuzzyAd9407 2 days ago +60
>Cyber experts who have spoken to the alleged hacker and reviewed samples of the stolen data they posted online say they appeared to gain entry to the massive computer with comparative ease and were able to siphon out huge amounts of data *over the course of multiple months without being detected.* For fucks sake people, read the god damn articles
60
Those_Silly_Ducks 2 days ago +11
What the hell is that word I keep seeing on listnook? 'Article' WHAT DOES IT MEAN
11
I-seddit 2 days ago +2
The
2
Man_under_Bridge420 2 days ago +5
READ? With these education cuts?!?!?
5
AlbaMcAlba 2 days ago +2
Where did the hacker store 10 petabytes!?
2
Xeriuss2k17 2 days ago +2
Network storage is a thing
2
AlbaMcAlba 2 days ago +2
Yeah but no .. I suppose it could be zipped right?
2
VladamirK 2 days ago +2
You can fit 10PB of storage in a single rack if you wanted to. For a nation state attacker (reasonably likely) you could probably get the costs down to about $300k. And it sounds like an investment with a good return too.
2
CodeMonkeyPhoto 2 days ago +2
1 pedobyte of that data is what every country has on a certain person.
2
esadatari 2 days ago +2
Lmao how does it feel China?
2
← Back to Board