· 52 comments · Save ·
News & Current Events Apr 9, 2026 at 3:28 AM

A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data

Posted by avatar6556


A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data | CNN
CNN
A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data | CNN
A hacker has allegedly stolen a massive trove of sensitive data – including highly classified defense documents and missile schematics – from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China.

🚩 Report this post

52 Comments

Sign in to comment — or just click the box below.
🔒 Your email is never shown publicly.
Gloomy-Restaurant-42 2 days ago +89
Now I don't feel so paranoid about keeping all of my sensitive data in a superDUPERcomputer. Sometimes you get what you pay for.
89
justfortheese 2 days ago +14
Well, that's until a super duper hacker comes along!
14
Gloomy-Restaurant-42 2 days ago +6
A superduperhacker? That sounds ridiculous.
6
ApprehensiveGold2773 2 days ago +14
Behold, China's superduperhacker number one, w1nn13th3p00h
14
Gloomy-Restaurant-42 2 days ago +10
Oh, bother!
10
NutsyFlamingo 2 days ago +7
That’s why I always find all the traffic lights in the pictures before I open so I know it’s safe
7
Gloomy-Restaurant-42 2 days ago +2
How do we know the traffic lights themselves are safe? What if clicking each single square that contains a bicycle actually downloads a malicious worm DDOS superdupervirus? These are questions we would be fools to ignore.
2
hippodribble 2 days ago +5
Have you ever seen a worm riding a bike? I think not.
5
Gloomy-Restaurant-42 2 days ago +3
A worm, no. I did once see a group of worms writhe into a pair of lycra shorts and do 30 minutes next to me in a spin class. Yes, they went faster than me. 😳
3
Late_Blooomer 2 days ago +3
“Sensitive Data” gay p*** hard drive
3
Gloomy-Restaurant-42 2 days ago +2
You think I got that kinda memory around the house? Nah, that's all on the cloud. And bookmarks. And browser history. And a handwritten log of good URLs.
2
DissKhorse 2 days ago +1
[This is like a trace buster buster.](https://www.youtube.com/watch?v=2VY_xxL2jL0)
1
visionsofblue 1 day ago +1
You should be using a Super Dee Dooper Dee Booper Special Deluxe a la Peter T. Hooper computer if you really want security.
1
Cogitoergosumus 2 days ago +36
8 petabytes of data is basically the whole kit and koboodle
36
hotlavatube 2 days ago +6
Well it's a certainly large amount of data, though I've known astronomy and volcanology institutions that collect data on that order of magnitude on a regular basis. For example, a high-density 3D seismic survey of land can be on the order of 1-10 Pb of data.
6
gta0012 2 days ago +11
It's just not a realistic amount tbh. How long do you think a transfer would take to move those files off site? That's assuming this deep deep system is connected to the Internet with no monitoring to see ALL 8-10 PB being transferred over months. Walk out the building with a USB key? Lol how big is the trench coat this dude wore. I just can't fathom how this could be real.
11
Ok-Way7122 2 days ago +19
Something doesn't add up - the "hacker" did not download 10 peta**bytes** because if they had a 1 gigabit connection they'd need 3 years to get that amount of data in a country with notoriously poor connections when the quoted time was 6 months, again, they did not have 6gbps download speed. Inside job.
19
withlovefromspace 1 day ago +1
I agree that it's unrealistic but they could have dumped the data in parallel to many different connections/servers/other compromised computers.
1
sweetbeems 2 days ago +6
I’m sure it’s the amount of data that was compromised and could’ve been downloaded, not actually downloaded. Or the journo is a liar
6
Squirll 2 days ago +6
I do not think ive ever seen that phrase written out and I apparently did not realize how it was spelled out.
6
GigaSoup 2 days ago +21
Neither did the person you're replying to because it's caboodle not koboodle 
21
fluid_alchemist 2 days ago +3
How many units are in a caboodle?
3
jaspersgroove 1 day ago +2
Oodles
2
Squirll 2 days ago +3
Still so unknown to me I couldn't tell which one of you is correct! lol Bone Apple tea!
3
HugsForUpvotes 2 days ago +3
Is that 8000 terabytes?
3
mixxituk 2 days ago +1
I don't know if 8 is both the kit and caboodle Maybe one caboodle and half a kit at best
1
djflamingo 1 day ago
Nah, i recently met a sys admin of what was the most powerful computer on earth and they do petabytes PER RUN. They have to use a node of the supercomputer just to manage the main clusters memory use.
0
Candid_Koala_3602 2 days ago +14
8 pentabytes of purely distilled information- damn imagine an AI with access to that as its training.
14
jinzokan 2 days ago +9
May you live in interesting times....
9
RarelyReadReplies 2 days ago +6
Whoever said that is an a******... I just want to be able to have a decent quality of life. Sincerely, Every underpaid worker 
6
Bubbles_2025 2 days ago +3
The Kimberly-Clark Warehouse worker said something similar and felt underpaid. He went the wrong direction though.
3
jinzokan 2 days ago +2
I hear ya. That's why we need to promote good politicians actually trying to make a difference and vote out these greedy corporate cum socks.
2
Candid_Koala_3602 2 days ago
So it goes.
0
cosmicrae 1 day ago +1
The worlds first Anime AI /s
1
PostGamePong81 2 days ago +16
Caveat - I know nothing about computers or hacking, but this news and the Claude AI news about finding 20 year old security vulnerabilities seems to be quite the coincidence. \*\*\* What’s most surprising about the vulnerability Nicholas shared is how little oversight Claude Code needed to find the bug. He essentially just pointed Claude Code at the Linux kernel source code and asked, “Where are the security vulnerabilities?” I have so many bugs in the Linux kernel that I can’t report because I haven’t validated them yet… I’m not going to send \[the Linux kernel maintainers\] potential slop, but this means I now have several hundred crashes that they haven’t seen because I haven’t had time to check them. —Nicholas Carlini, speaking at \[un\]prompted 2026
16
DigitaIBlack 2 days ago +15
That's a pretty big flipping caveat. It very well could be a coincidence... a vast majority of CVEs are not discovered by AI. Yes, AI could have been involved but it's a stretch to immediately link a hack to AI. It's worth noting that: 1. People have also started using AI to scan for vulnerabilities to help prevent this. Especially open source projects where there's a million eyeballs on a lot of the libraries etc. And as for the closed source stuff... you can't exactly just point Claude at it like he did with the Linux kernel. 2. >I have so many bugs in the Linux kernel that I can’t report because I haven’t validated them yet… I’m not going to send \[the Linux kernel maintainers\] potential slop This is also worth noting. Yes, AI is a great tool to find vulnerabilites but it spits out a ton of nonsense. Many companies are killing or reworking their bug bounty program in response to the flood of AI nonsense they're getting.
15
PostGamePong81 1 day ago +1
Yeah, I am not saying it is AI, just that I noticed this happy little coincidence today and found it interesting. I gave the caveat so people understood that I am just an overage joe who read two interesting articles!
1
DigitaIBlack 1 day ago +1
Right but I wouldn't say it's even "quite the coincidence"
1
[deleted] 2 days ago +1
[deleted]
1
DigitaIBlack 2 days ago +3
...why can't it be a coincidence?
3
8hotsteamydumplings 2 days ago +3
Do a Omar and sell it back to them
3
Chucktayz 2 days ago +3
Be cool if someone hacked and released the Epstein files
3
H1Ed1 2 days ago +4
This is unsurprising after living in China and seeing their government websites and sofwares still being run on and optimized for internet explorer.
4
Misfiring 2 days ago +2
Don't they use their own browser there?
2
osoBailando 2 days ago +1
how much?? and in what form of payment?? *ofc asking for a friend 🤪
1
Madismas 1 day ago +1
I would have thought the going pri e was tens of millions.
1
kosmokramr 1 day ago +1
China got a taste of their own medicine
1
Old_news123456 1 day ago +1
Can nobody hack the Epstein files?! Seriously?  Hack and release that!!!
1
Ok_Document_9713 2 days ago +4
About time, sick of hearing only about US being breached. But its also probably because China limits what the media can actually report.
4
tweakwerker 2 days ago +14
China has been reporting about the US hacking China for a long time. It's the US media that rarely reports on it so that the US can continue looking like an innoncent victim.
14
weedmode420 1 day ago
Shouldn't you be worrying about your fuel shortages? Lol, imagine needing to deploy your military already
0
madasfire 2 days ago +1
Did they try turning it off and then back on?
1
← Back to Board