(Image credit: Bloomberg Creative - Getty Images) Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter The biggest gaming news, reviews and hardware deals Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.

Become a Member in Seconds Unlock instant access to exclusive member features.

Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

You are now subscribed Your newsletter sign-up was successful Want to add more newsletters? Join the club Get full access to premium articles, exclusive features and a growing list of member rewards.

.

Explore An account already exists for this email address, please log in.

Subscribe to our newsletter Earlier this year, dark web hackers claimed to have exfiltrated a huge amount of data from the National Supercomputing Center (NSCC) in Tianjin, China.

The hacker group FlamingChina claims that it stole 10 petabytes of data pertaining to advanced science and defence agencies within China.

However, a number of security researchers have since cast doubt on the leak's legitimacy.As far as I can tell, NetAskari was the first to bring the data leak to wider attention back in February 2026 via X, before further delving into a sample of the leaked files on their SubStack.According to them, a dark web forum user going by the handle 'airborneshark1' initially offered a sample of the full leak for $3,000 USD (in cryptocurrency, of course), before offering up all 10 petabytes to the highest bidder.

.

NetAskari was able to obtain a multi-gigabyte sample of the allegedly stolen data ## Editor's Note Stay tuned for more updates as this story develops. Source: [PC Gamer](https://www.pcgamer.com/hardware/hackers-claim-theyve-breached-a-chinese-supercomputer-and-are-demanding-huge-amounts-of-crypto-for-the-data-but-security-researchers-are-sceptical/)