@HopelessDemigod Some analysis from a rando on the forum, so take it for what it's worth (probably summarized by AI):
"The ad appeared on a darknet forum. A user named airborneshark1 offered access to the dataset for a nominal $3,000, but only to "view the list." A couple of months later, the post was updated and converted into an auction. Now, the entire archive is being sold.
The hackers call themselves Flaming China. Judging by their Telegram activity, the name is new and likely a temporary cover.
We're talking about the National Supercomputer Center in Tianjin. The state-owned center serves universities, state-owned companies, and research projects. Its computing power is used to calculate climate models, complex physical processes, and the behavior of materials. Military contractors and weapons developers also actively use the infrastructure.
The Internet is dead. At least save the channel. It's impossible to verify the entire leak, but the published samples appear credible. In February, the attackers released several gigabytes of data. This included screenshots of internal directories, user credentials, and fragments of working files. Such evidence is typically published to confirm a hack.
The contents were varied. The archive included reports and instructions in PDF format, files with radar system test results, and files with computational model results. Some documents were dated 2024 and 2025.
Some of the materials relate to modeling of damage factors. The documents describe calculations of the impact of warheads on various targets and structures. Such data is typically used in weapons development.
Among the samples was a file marked "Top Secret for 10 Years," meaning "Top Secret for 10 Years." The document is a report on testing a fortification-busting munition. Inside are models of equipment, including the American HIMARS system, an aircraft carrier, and various types of bunkers. The archive also includes a short animated video showing the simulation results.
Separately, there are data from radar systems and sets of tables related to stealth technologies. One file mentions the American X-47B drone, but without further explanation, it's difficult to understand the context.
The main question remains: did the attackers actually obtain 10 petabytes or was this an attempt to inflate the price? Unloading such a volume undetected is nearly impossible without prolonged access to the system. Such an operation could have taken months and likely required the involvement of someone within the organization.
Even if the actual volume is smaller, the published samples indicate deep penetration into the center's infrastructure. The attackers appear to have gradually expanded their access and explored internal storage systems.
Against this backdrop, personnel decisions in China are also attracting attention. Several weeks after the leak, the Chinese Academy of Sciences suspended several high-ranking officials involved in military technology development. No one has confirmed a direct connection, but the coincidence is intriguing."