China's largest supercomputer hacked

5,595 Views | 50 Replies | Last: 1 mo ago by ts5641
Jeeper79
How long do you want to ignore this user?
AG
The Collective said:

I just learned the term petabyte
A few years ago, I had to sum up how much data my division of the companies was using in cloud storage for budgetary purposes. It was between 3 and 4 petabytes. Wouldn't surprise me if it's doubled since then.
P.H. Dexippus
How long do you want to ignore this user?
AG
The Collective said:

I just learned the term petabyte

Rocky is asleep on the job
annie88
How long do you want to ignore this user?
AG
You know with encryption becoming so much more advanced, but yet hackers as well, I will say I think about all our money and everything tied up electronically. I do most of my banking online and feel mostly okay, but you never know.

As Sheldon said, when the robots take over, it will be the ATMs first.
I don’t get enough credit for the things I manage not to say.
cecil77
How long do you want to ignore this user?
AG
TyHolden said:

The Collective said:

I just learned the term petabyte

A zetabyte is 1000x the size of a petabyte. I've never dealt with one of those.


FIFY: A zetabyte is 1000000x the size of a petabyte.

1000 petabytes is an exabyte.
The Sun
How long do you want to ignore this user?
Jeeper79 said:

The Collective said:

I just learned the term petabyte
A few years ago, I had to sum up how much data my division of the companies was using in cloud storage for budgetary purposes. It was between 3 and 4 petabytes. Wouldn't surprise me if it's doubled since then.


My company's SAP systems were up to 10 petabytes about 10 years ago.
HalifaxAg
How long do you want to ignore this user?
AG
Two things:

1. How much of this can be traced back to Hilldawg?

2. At least, we now know what mfbarnes has been up too...
Science Denier
How long do you want to ignore this user?
AG
I wonder if they found Hillary's emails.
kag00
How long do you want to ignore this user?
AG
This the security flaw Anthropic is going crazy about? Did they accidentally break in and take all that data?
YouBet
How long do you want to ignore this user?
AG
cecil77 said:

TyHolden said:

The Collective said:

I just learned the term petabyte

A zetabyte is 1000x the size of a petabyte. I've never dealt with one of those.


FIFY: A zetabyte is 1000000x the size of a petabyte.

1000 petabytes is an exabyte.


Like anyone could possibly know that.
smucket
How long do you want to ignore this user?
AG
HTownAg98 said:

BQ_90 said:

so you're saying taiwan123 wasn't a good password

Answering the security question "what is the name of your family pet?" with "Dinner" probably wasn't any better.

Quick aside, I have a friend in Dallas who is Chinese and named his chihuahua Dinner. Laughs aplenty at the dog park.
The world looks yellow to a jaundiced eye
one safe place
How long do you want to ignore this user?
I hacked into their supercomputer a couple of times but cannot read Hanzi at all. Was pretty easy, the password was moo goo gai pan.
91AggieLawyer
How long do you want to ignore this user?
AG
How much of anything that was actually on the Super Computer would be useful to anyone without a supercomputer? I mean, first, do they really put things that hackers are looking for like banking and credit card data (or other, similar examples) on there, and second, if you do get access to code for a super computer, wouldn't you need the same or similar machine to run it?
flakrat
How long do you want to ignore this user?
AG
aggiehawg said:

Quote:

This center supports thousands of clients, including research institutes, aerospace programs, and defense-linked organizations.

What's reportedly in the data:
- Documents marked "secret" in Chinese
- Missile and bomb schematics
- Aerospace and aviation research
- Bioinformatics and fusion simulation data
- Files linked to major state entities like AVIC and COMAC

Cybersecurity experts who reviewed sample data say it matches what you would expect from such a facility, though the full breach is not independently verified.

Even more concerning:
- The attacker claims access lasted months without detection
- Sample datasets were posted online via Telegram
- Full access is reportedly being sold for hundreds of thousands of dollars in crypto

At this stage, the scale and origin are still being verified. But if even partially true, it points to a serious vulnerability in infrastructure tied to China's scientific and defense ecosystem.

If a centralized system like this can be penetrated, what does that say about the security of the data it was processing?

Hope that is true.

The sad part, there's probably a lot of US intellectual property / classified tech in that breach. Now, instead of China having the stolen goods, the whole world has it.
AggieMD95
How long do you want to ignore this user?
AG
Maybe it will show how may people the slaughtered in tienamen square

And how many they killed w their Wuhan virus ?
flakrat
How long do you want to ignore this user?
AG
AggieMD95 said:

Maybe it will show how may people the slaughtered in tienamen square

And how many they killed w their Wuhan virus ?

That'd be something! China Wikileaks, coming soon!
ts5641
How long do you want to ignore this user?
If it's can we get back some of our stolen technology?
Refresh
Page 2 of 2
 
×
subscribe Verify your student status
See Subscription Benefits
Trial only available to users who have never subscribed or participated in a previous trial.