Attack on the Chinese Supercomputing Centre: When the Attacker Becomes the Target

13. apríla 2026

An actor operating under the name “FlamingChina” claims to have obtained more than 10 petabytes of data from China’s National Supercomputing Centre in Tianjin, including military simulations, weapons system schematics and classified research materials. Regardless of whether the declared volume is real or overstated, the incident raises a question that reaches beyond geopolitics: how are the sovereign computing capacities of states protected, and why are supercomputers becoming a strategic target?



What is known about the incident


In early February 2026, posts appeared on the BreachForums forum, and subsequently on a Telegram channel, from an actor using the handle FlamingChina, offering for sale a large data package allegedly originating from the National Supercomputing Centre in Tianjin (NSCC Tianjin). The centre, established in 2009, operates the Tianhe-1A supercomputer developed by the National University of Defence Technology and serves more than six thousand clients from the defence, scientific and industrial sectors. It is among the institutions that the U.S. Department of Commerce placed on the Entity List precisely because of their role in the modernisation of the Chinese military.


The case attracted media attention only on 8 April 2026, when CNN published its own investigative report featuring statements from named experts. The actor is offering preview samples for approximately 3,000 US dollars in the Monero cryptocurrency, with the complete dataset priced at hundreds of thousands of dollars. According to their own claims, they gained access through a compromised VPN domain and exfiltrated the data gradually over a period of roughly six months via a network of distributed nodes.


What experts have confirmed and what remains open


Dakota Cary of SentinelOne, who has long specialised in Chinese cyber activity, assessed the published samples as credible. He told CNN that the sample content is consistent with what one would expect from a supercomputing centre serving the defence and scientific sectors. At the same time, he pointed out that the exfiltration method itself was not technically exceptional – it reflected a failure of network architecture, the absence of segmentation and shared access credentials, rather than a sophisticated attack.


On the other side stand fundamental doubts. The actor FlamingChina has no prior history, which is unusual in the cybersecurity community. The claimed volume of 10 petabytes is, from a technical standpoint, at the edge of plausibility, as the mere storage and transfer of such a quantity of data poses an extreme logistical challenge. Some analysts therefore acknowledge that the actual scope of the leak may be significantly smaller, although still strategically significant. Major reputable cybersecurity outlets have so far not published standalone technical analyses of the incident, and the Chinese side has neither officially confirmed nor denied it.


For the purposes of strategic assessment, the case should therefore be approached with caution. Whether this concerns a leak of 10 petabytes or a considerably smaller volume, the essence remains the same: an unknown actor appears to have had access to the environment of a national computing centre for six months without being detected.


A geopolitical inversion


From an international security perspective, the incident represents a remarkable reversal of the prevailing narrative. In recent years, the discussion of Chinese cyber activity has focused mainly on offensive operations attributed to actors such as Volt Typhoon or Salt Typhoon, which were said to target U.S. critical infrastructure. This time, China itself has found itself on the receiving end – and in one of the most sensitive areas of its technological ecosystem.


This reversal has broader significance. It shows that no country, regardless of the scale of investment in its own computing and defence capacities, is immune to such incidents. Sovereign computing capacities – such as supercomputers, research HPC clusters and infrastructure for training large artificial intelligence models – are becoming strategic targets comparable to traditional elements of critical infrastructure. Their compromise can have a direct impact on defence programmes, scientific research and economic competitiveness.


A European precedent that tends to be forgotten


Although the Tianjin incident may appear to be an exotic case from a distant region, European critical infrastructure has its own experience with attacks on supercomputers. In May 2020, approximately twelve high-performance computing centres in Germany, the United Kingdom and Switzerland were compromised, including the ARCHER system in Edinburgh, Hawk in Stuttgart, JURECA and JUWELS in Jülich, the Leibniz Supercomputing Centre in Garching and CSCS in Switzerland. The attackers used stolen SSH credentials, with the first intrusions dating back to January 2020 – months before they were discovered.


The parallel between the two incidents is striking. In both cases, the entry point was not a sophisticated zero-day vulnerability, but rather basic shortcomings in identity management, credential handling and network segmentation. And in both cases, it took months for the attacker’s presence in the system to be detected. It is precisely this ability of an attacker to remain invisible for extended periods within sensitive infrastructure that constitutes the key lesson from the perspective of critical infrastructure protection.


A regulatory gap in the protection of computing capacities


The European framework for the protection of critical infrastructure – the NIS 2 Directive and the CER Directive, which was transposed into Slovak law by Act No. 367/2024 Coll. on Critical Infrastructure – covers sectors such as energy, transport, healthcare, digital infrastructure, financial services and public administration. High-performance computing systems and research infrastructure, however, do not have their own standalone category within these frameworks. They fall partly under digital infrastructure and partly under research, yet their strategic importance for defence, science and the development of artificial intelligence remains covered only indirectly.


At the same time, 2026 is a pivotal year for Slovakia. State administration bodies are required to identify critical entities under Act No. 367/2024 Coll. by no later than 17 July 2026. In parallel, the National Cybersecurity Strategy for 2026 to 2030 is being fully implemented. This is precisely the right moment to reconsider whether the current categories of critical infrastructure adequately reflect the strategic importance of sovereign computing capacities – and whether these elements do not require more explicit inclusion in the regulatory framework.


“The Tianjin incident is important for us not because it took place in China, but because of what it reveals about the nature of today’s threats. If an unknown actor can operate for months inside the environment of a national computing centre without being detected, this is a warning for every operator of sensitive infrastructure, regardless of geography. Sovereign computing capacities are becoming a strategic asset to which we must pay the same attention as to energy grids or telecommunications hubs,” says Tibor Straka, President of the Critical Infrastructure Association of the Slovak Republic.


Lessons for the Slovak context


The analysis of the information available to date yields several conclusions that are also relevant for Slovak critical infrastructure entities.


First, the fundamental security principles – network segmentation, rigorous credential management and monitoring of unusual data activity – remain the first line of defence even against the most advanced adversaries. Major incidents rarely begin with zero-day vulnerabilities; far more often, they exploit neglected identity and network hygiene.


Second, the ability to detect is just as important as the ability to prevent. The six-month presence of an attacker in a sensitive environment illustrates that it is not enough to invest only in the perimeter; continuous monitoring of internal operations and the ability to recognise anomalies in good time are equally crucial. The shift from formal documentation to the demonstrable functionality of security measures, brought about by the transposition of the NIS 2 Directive, is a fundamental step in this direction.


Third, research and computing institutions, often perceived as academic environments with an open culture  are, in today’s geopolitical context, becoming strategic targets. Slovak university computing centres, research institutions and HPC capacities of the Slovak Academy of Sciences should form part of the discussion on how to approach the protection of sovereign computing capacities within the framework of the new obligations arising from Act No. 367/2024 Coll.


The Critical Infrastructure Association of the Slovak Republic (AKI SR) provides a space for expert discussion of these topics, connects entities from the public and private sectors, and offers its members access to expert knowledge in the implementation of new regulatory requirements. Particularly at a time when the cybersecurity of critical infrastructure is shifting from formal preparation to demonstrable practice, such an exchange of experience and cross-sectoral coordination is indispensable.


The Tianjin incident is still awaiting full verification. Regardless of its final contours, however, it already fulfils one important function today: it reminds us that the strategic elements of modern society are also found in places that traditional frameworks for the protection of critical infrastructure have not yet explicitly identified.


13. apríla 2026
Aktér vystupujúci pod menom „FlamingChina“ tvrdí, že z čínskeho Národného superpočítačového centra v Tchien-ťine získal vyše 10 petabajtov dát vrátane vojenských simulácií, schém zbraňových systémov a klasifikovaných výskumných materiálov. Bez ohľadu na to, či je deklarovaný objem reálny alebo nadhodnotený, incident otvára otázku, ktorá presahuje geopolitiku. Ako sú chránené suverénne výpočtové kapacity štátov a prečo sa superpočítače stávajú strategickým terčom. 
8. apríla 2026
A large-scale power outage is no longer a hypothetical scenario. Recent months have brought a series of incidents showing that the stability of Europe's electricity systems is exposed to a combination of threats on a scale we have not previously encountered. The discussion of blackouts is therefore shifting from technical circles into the broader strategic framework of critical infrastructure protection.
8. apríla 2026
Rozsiahly výpadok elektriny prestáva byť hypotetickým scenárom. Posledné mesiace priniesli sériu incidentov, ktoré ukazujú, že stabilita elektrizačných sústav v Európe je vystavená kombinácii hrozieb, akú sme v takomto rozsahu doteraz nepoznali. Diskusia o blackoute sa tak presúva z technických kruhov do širšieho strategického rámca ochrany kritickej infraštruktúry.
3. apríla 2026
Artificial intelligence is changing the rules of the game in critical infrastructure protection. It is no longer merely an aid in defence — it is also becoming a weapon in the hands of attackers. The question is no longer whether AI will enter the critical infrastructure environment, but how quickly we can prepare for this change.
3. apríla 2026
Umelá inteligencia mení pravidlá hry v ochrane kritickej infraštruktúry. Už nie je len pomocníkom pri obrane, stáva sa aj zbraňou v rukách útočníkov. Otázka už neznie, či sa AI dostane do prostredia kritickej infraštruktúry, ale ako rýchlo sa na túto zmenu dokážeme pripraviť. 
2. apríla 2026
Oblasť kritickej infraštruktúry v Slovenskej republike upravuje zákon č. 367/2024 Z. z. o kritickej infraštruktúre a o zmene a doplnení noektorých zákonov, ktorý definuje jednotlivé sektory, podsektory a základné služby nevyhnutné pre fungovanie štátu. 
2. apríla 2026
The area of critical infrastructure in the Slovak Republic is regulated by Act No. 367/2024 Coll. on Critical Infrastructure and on Amendments and Supplements to Certain Acts, which defines individual sectors, subsectors, and essential services necessary for the functioning of the state.
30. marca 2026
The Critical Infrastructure Association of the Slovak Republic has entered into negotiations on international cooperation with the Republic of India in the field of critical infrastructure protection and the development of post-quantum cryptography. This step reflects the growing importance of technological security and the need to prepare for the advent of quantum technologies, which will fundamentally impact current cryptographic standards. In this context, a significant meeting took place at the Embassy of the Republic of India in Slovakia, attended by H.E. Apoorva Srivastava, Ambassador of the Republic of India to the Slovak Republic, Rastislav Chovanec, State Secretary of the Ministry of Foreign and European Affairs of the Slovak Republic, and Tibor Straka, President of The Critical Infrastructure Association of the Slovak Republic. The delegation also included the Chairman of its Supervisory Board and a representative of member company Decent Cybersecurity s. r. o., Matej Michalko. The discussion focused primarily on opportunities for the development of bilateral cooperation in the areas of critical infrastructure, cybersecurity, and the implementation of post-quantum cryptographic solutions. India is among the countries that systematically invest in the development of cryptography and quantum technologies. This is evidenced by its strategic initiative, the National Quantum Mission, which aims to build a comprehensive national quantum technology ecosystem. It is precisely in this area that The Critical Infrastructure Association of the Slovak Republic sees significant potential for cooperation and the involvement of Slovak technology entities. One such entity is Decent Cybersecurity s. r. o., a company with a long-standing focus on research and implementation of solutions for critical infrastructure, defence systems, and telecommunications networks. The company specialises primarily in the practical implementation of new cryptographic algorithms into modern hardware and software architectures, which makes it well-suited for participation in international post-quantum security projects. From the perspective of the Slovak Republic, cooperation with India represents a significant opportunity for the development of technological diplomacy and the strengthening of strategic partnerships. As one of the fastest-growing digital economies in the world, India plans extensive investments in quantum research and technological infrastructure. The involvement of Slovak companies in these initiatives could substantially support the export of innovative solutions and strengthen technological ties between the two countries. The aim of this initiative is to establish a stable technological partnership between Slovak and Indian institutions, overseen by The Critical Infrastructure Association of the Slovak Republic. An important role is also played by the diplomatic support of the Ministry of Foreign and European Affairs of the Slovak Republic, which can significantly facilitate the establishment of contacts with relevant partners in India. This initiative also fits within the broader context of strengthening technological relations between the European Union and India. Slovakia's active involvement in this process could contribute to reinforcing its position within the European technology ecosystem and increasing its international competitiveness. At the meeting, both sides expressed a clear interest in developing mutual cooperation and identified significant potential for future joint projects. The partners agreed that the combination of expert capacities, technological innovation, and diplomatic support creates a solid foundation for a long-term strategic partnership that can deliver tangible results in the areas of security, innovative development, and economic cooperation. Both sides will continue their expert-level communication, aimed at building a stable platform for a long-term and functional partnership between India and Slovakia in the fields of critical infrastructure and post-quantum cryptography.
30. marca 2026
Asociácia kritickej infraštruktúry Slovenskej republiky vstúpila do rokovaní o medzinárodnej spolupráci s Indickou republikou v oblasti ochrany kritickej infraštruktúry a rozvoja postkvantovej kryptografie. Tento krok reflektuje rastúci význam technologickej bezpečnosti a potrebu pripraviť sa na nástup kvantových technológií, ktoré zásadne ovplyvnia súčasné kryptografické štandardy. V tejto súvislosti sa na pôde Veľvyslanectva Indickej republiky na Slovensku uskutočnilo významné stretnutie za účasti J.E. Apoorva Srivastava, veľvyslankyne Indickej republiky v Slovenskej republike, štátneho tajomníka Ministerstva zahraničných vecí a európskych záležitostí Slovenskej republiky Rastislava Chovanca a prezidenta Asociácie kritickej infraštruktúry Slovenskej republiky Tibora Straku . Súčasťou delegácie AKI SR bol aj predseda jej dozornej rady a zástupca členskej spoločnosti Decent Cybersecurity s. r. o. Matej Michalko. Diskusia sa zamerala najmä na možnosti rozvoja bilaterálnej spolupráce v oblasti kritickej infraštruktúry, kybernetickej bezpečnosti a implementácie postkvantových kryptografických riešení. India patrí medzi krajiny, ktoré systematicky investujú do rozvoja kryptografie a kvantových technológií. Dôkazom je aj jej strategická iniciatíva National Quantum Mission, ktorej cieľom je vybudovať komplexný národný ekosystém kvantových technológií. Práve v tejto oblasti vidí AKI SR významný priestor pre spoluprácu a zapojenie slovenských technologických subjektov. Jedným z nich je spoločnosť Decent Cybersecurity s. r. o. , ktorá sa dlhodobo venuje výskumu a implementácii riešení pre kritickú infraštruktúru, obranné systémy a telekomunikačné siete. Spoločnosť sa špecializuje najmä na praktickú implementáciu nových kryptografických algoritmov do moderných hardvérových a softvérových architektúr, čo ju predurčuje na zapojenie do medzinárodných projektov v oblasti postkvantovej bezpečnosti. Z pohľadu Slovenskej republiky predstavuje spolupráca s Indiou významnú príležitosť pre rozvoj technologickej diplomacie a posilnenie strategických partnerstiev. India ako jedna z najrýchlejšie rastúcich digitálnych ekonomík sveta plánuje rozsiahle investície do kvantového výskumu a technologickej infraštruktúry. Zapojenie slovenských spoločností do týchto iniciatív by mohlo výrazne podporiť export inovatívnych riešení a posilniť technologické väzby medzi oboma krajinami. Cieľom iniciatívy je vytvorenie stabilného technologického partnerstva medzi slovenskými a indickými inštitúciami, ktoré bude zastrešovať Asociácia kritickej infraštruktúry Slovenskej republiky. Dôležitú úlohu pritom zohráva aj diplomatická podpora Ministerstva zahraničných vecí a európskych záležitostí SR, ktorá môže výrazne napomôcť pri nadväzovaní kontaktov s relevantnými partnermi v Indii. Táto iniciatíva zároveň zapadá do širšieho kontextu posilňovania technologických vzťahov medzi Európskou úniou a Indiou. Aktívne zapojenie Slovenska do tohto procesu by mohlo prispieť k posilneniu jeho pozície v rámci európskeho technologického ekosystému a zvýšiť jeho medzinárodnú konkurencieschopnosť. Na stretnutí obe strany vyjadrili jasný záujem o rozvoj vzájomnej spolupráce a identifikovali významný potenciál pre budúce spoločné projekty. Partneri sa zhodli, že prepojenie odborných kapacít, technologických inovácií a diplomatickej podpory vytvára pevný základ pre dlhodobé strategické partnerstvo, ktoré môže priniesť konkrétne výsledky v oblasti bezpečnosti, inovatívneho rozvoja a ekonomickej spolupráce. Obe strany budú pokračovať v odbornej komunikácii, smerujúcej k vybudovaniu stabilnej platformy pre dlhodobé a funkčné partnerstvo Indie a Slovenska v oblasti kritickej infraštruktúry a postkvantovej kryptografie.
25. marca 2026
For most people, GPS (Global Positioning System) is synonymous with car or smartphone navigation. It helps us find our way, avoid traffic jams, and discover new places. However, very few realise that the Global Positioning System provides precise time and location data upon which the functioning of modern society depends.