ノーマルビュー

Hacker Steals 10 Petabytes of Data From China's Tianjin Supercomputer Center

著者: BeauHD
2026年4月10日 04:00

🤖 AI Summary

中国天津国家超级计算机中心から、サイバー攻撃者が約10ペタバイトの機密データを盗み出したという報告があります。CNNが引用した情報によると、この大量のデータは防衛文書やミサイル設計図など、高機密な情報を含んでいます。

これらのデータは中国最大規模の盗難事件として知られ、匿名の「FlamingChina」というアカウントがオンラインで一部のサンプルを公開しています。専門家たちは、この攻撃者が国家運営の天津国家高性能計算センターから情報を漏洩させたと推測しています。

サイバーセキュリティ専門家は、FlamingChinaが提示したデータは実際のものだと評価しています。一部のデータには「秘密」と記載された文書や技術的なファイル、兵器(爆弾やミサイル)のアニメーションシミュレーションなどが含まれているとされています。

CNNはFlamingChinaの主張を確認していないものの、複数の専門家からの情報によりこの事件が真実である可能性が高いと指摘しています。また、FlamingChinaは一部データを数千ドルで販売し、完全なアクセスには数十万ドルが必要であると主張しています。

このような大量の機密情報を盗む行為は非常に深刻であり、中国のサイバーセキュリティへの脅威として懸念されています。
An anonymous reader quotes a report from CNN: A hacker has allegedly stolen a massive trove of sensitive data -- including highly classified defense documents and missile schematics -- from a state-run Chinese supercomputer in what could potentially constitute the largest known heist of data from China. The dataset, which allegedly contains more than 10 petabytes of sensitive information, is believed by experts to have been obtained from the National Supercomputing Center (NSCC) in Tianjin -- a centralized hub that provides infrastructure services for more than 6,000 clients across China, including advanced science and defense agencies. Cyber experts who have spoken to the alleged hacker and reviewed samples of the stolen data they posted online say they appeared to gain entry to the massive computer with comparative ease and were able to siphon out huge amounts of data over the course of multiple months without being detected. An account calling itself FlamingChina posted a sample of the alleged dataset on an anonymous Telegram channel on February 6, claiming it contained "research across various fields including aerospace engineering, military research, bioinformatics, fusion simulation and more." The group alleges the information is linked to "top organizations" including the Aviation Industry Corporation of China, the Commercial Aircraft Corporation of China, and the National University of Defense Technology. Cyber security experts who have reviewed the data say the group is offering a limited preview of the alleged dataset, for thousands of dollars, with full access priced at hundreds of thousands of dollars. Payment was requested in cryptocurrency. CNN cannot verify the origins of the alleged dataset and the claims made by FlamingChina, but spoke with multiple experts whose initial assessment of the leak indicated it was genuine. The alleged sample data appeared to include documents marked "secret" in Chinese, along with technical files, animated simulations and renderings of defense equipment including bombs and missiles.

Read more of this story at Slashdot.

Little Snitch Comes To Linux To Expose What Your Software Is Really Doing

著者: BeauHD
2026年4月10日 00:00

🤖 AI Summary

Little Snitch, a popular macOS tool that displays which applications are connecting to the internet, is now being developed for Linux. The project began after the developer experimented with Linux and found it strange not knowing about system connections. Unlike existing tools like OpenSnitch, Little Snitch offers a simple user experience by showing which process is making connections and allowing users to block them with a click.

The Linux version of Little Snitch uses eBPF for kernel-level traffic interception, with core components written in Rust and featuring a web-based interface that can monitor remote servers. Initial tests on Ubuntu revealed that the system was relatively quiet; only nine processes made internet connections over a week, compared to more than 100 on macOS.

The application behaves similarly across platforms: Firefox triggered telemetry and advertising-related connections while LibreOffice made no network connections during testing. The early release is intended as a transparency tool rather than a security firewall.

This development aims to provide users with insight into what their software is doing online, enhancing awareness about internet activity without relying solely on command-line utilities or other existing tools.
BrianFagioli writes: Little Snitch, the well known macOS tool that shows which applications are connecting to the internet, is now being developed for Linux. The developer says the project started after experimenting with Linux and realizing how strange it felt not knowing what connections the system was making. Existing tools like OpenSnitch and various command line utilities exist, but none provided the same simple experience of seeing which process is connecting where and blocking it with a click. The Linux version uses eBPF for kernel level traffic interception, with core components written in Rust and a web based interface that can even monitor remote Linux servers. During testing on Ubuntu, the developer noticed the system was relatively quiet on the network. Over the course of a week, only nine system processes made internet connections. By comparison, macOS reportedly showed more than one hundred processes communicating externally. Applications behave similarly across platforms though. Launching Firefox immediately triggered telemetry and advertising related connections, while LibreOffice made no network connections at all during testing. The early release is meant primarily as a transparency tool to show what software is doing on the network rather than a hardened security firewall.

Read more of this story at Slashdot.

❌