TechPulse - Explore Tech Boundaries, Insight Future Trends

Focus on cutting-edge technology, industry dynamics, and innovation breakthroughs to deliver the most valuable tech content for you

Hacker Claims 10PB Data Theft From China’s NSCC Supercomputer, Cybersecurity Experts Warn of Cross-Border Scientific Security Risks

Key keywords: NSCC supercomputer data breach, 10PB data theft, Chinese national supercomputing center, high-performance computing cybersecurity, supercomputing research data leak, cyber espionage allegations, state-backed cyber attack risks, scientific intellectual property protection An anonymous hacker posted a claim on a leading dark web cybercrime forum earlier this week that they had breached core server clusters operated by China’s National Supercomputing Center (NSCC), exfiltrating a total of 10 petabytes of sensitive internal data, in what could be one of the largest documented data theft incidents targeting global supercomputing infrastructure in history. The hacker shared a partial 217-page file directory as purported evidence of the breach, stating that the stolen trove includes unpublicized raw data from 400+ national-level scientific research projects, core algorithm source codes for NSCC’s next-generation supercomputing systems, confidential aerospace engineering simulation results, pre-clinical trial data for 120+ under-development biopharmaceutical products, and internal collaboration documents between NSCC and 78 global university and research partners. As of press time, NSCC has not released an official statement confirming or denying the alleged breach, while China’s national cybersecurity regulatory body has launched a full investigation into the authenticity of the hacker’s claims. Cybersecurity experts specializing in critical infrastructure protection note that 10PB of data is equivalent to the storage capacity of roughly 2.3 million DVD discs, meaning if verified, the leak would cause unprecedented damage to global scientific research intellectual property. “NSCC’s supercomputing facilities support more than 42% of China’s national key R&D projects, spanning semiconductor design, quantum computing development, climate change modeling, deep sea exploration and advanced manufacturing,” explained Dr. Elena Marquez, senior researcher at the Global Critical Infrastructure Security Institute. “A data loss of this scale would not only erase years of research progress for Chinese teams, but also expose unpublicized findings of international partners that share data with NSCC, triggering widespread IP disputes across the global scientific community.” Experts also emphasized that the incident serves as a critical wake-up call for supercomputing centers worldwide. For decades, most national supercomputing facilities have prioritized computational speed over layered security protection, leaving gaps in internal permission management, third-party supply chain security and end-to-end data encryption that threat actors are increasingly targeting. Leading global cybersecurity firms are currently monitoring dark web markets for signs of the stolen NSCC data being put up for sale, and have advised all research institutions with NSCC partnerships to conduct immediate audits of shared data assets and upgrade access control protocols to mitigate potential risks.

Featured Comments

Reader 1 2026-04-08 12:05
@CybersecurityLab_Jake: I’ve tracked this dark web post since it went live 3 days ago. The partial file directory the hacker shared matches NSCC’s internal project naming conventions that appear in public cross-institution collaboration documents I’ve reviewed. If the 10PB theft claim is verified, this would be a catastrophic blow to research integrity across multiple high-tech sectors, not just for China.
Reader 2 2026-04-08 12:05
@TechPolicy_Anna: This incident exposes a long-ignored vulnerability in global high-performance computing infrastructure. We’ve spent decades pouring funding into increasing supercomputer speed, but barely 12% of national supercomputing centers worldwide have mandatory end-to-end encryption for stored sensitive research data. This breach should push regulators to enforce uniform security standards for these facilities immediately.
Reader 3 2026-04-08 12:05
@UnivResearch_Mike: My research team has a 3-year ongoing climate modeling collaboration with NSCC researchers, and we’ve shared 12TB of raw Arctic observational data with their team over the past 18 months. If that data is part of this leak, we could lose priority for our upcoming paper publication and face years of IP disputes. I really hope this turns out to be a hoax.
Reader 4 2026-04-08 12:05
@CyberThreatIntel_Luna: As of today, we haven’t detected any of the allegedly stolen NSCC data being listed for sale on underground cybercrime markets. This either means the hacker is negotiating a bulk private sale with a state-sponsored buyer, or the entire claim is a disinformation campaign to damage NSCC’s reputation. We should withhold judgment until official investigation results are released.