China Telecom and Warner Bros Hacked By @SwaggSec

China Telecom and Warner Bros were hacked and had their data leaked via torrent by a group who calls themselves "Swagg Security" or @SwaggSec. Before this hack the group had also hacked company Foxconn, during the protest against bad working conditions for the workers of the company. The leak is said to contain over 900 administrative usernames and passwords for the control panel of China Telecom. It also contains a more in depth comment about the Telecom attack and data. Their Warner Bro attack contains confidential IT data, which in @SwaggSec words "can be used for a future attack". The leaked data can be obtained at here on TPB , their full press release can be seen at or below

Ladies and Gentlemen, I give you tha’ biggest ISP hacked. We owned their Chinese ass. So we got all ’em Chinese up in our shit, screwin’ with the Pentagon…What do we do notin’? Wrong mofo, you call up SwaggSec and tell ’em to hack China Telecom. We own their asses. And know what they do, when we leave them a little message? Nothing, they don’ tell anyone. They just move their shitty SQL serva’ and preten’ it’s all over. But with SwaggSec it’s never over. We give ’em the taste of the people, the people they don’ care about. And it’s funny, now what’s going to happen? All their passwords in the hands of the people they don’ care about? What do you is gonna’ happen? We gonna’ laugh as we end them once and for all. Oh and we don’ stop with one hack, they have a slow ass serva’ anyways. We hacked Warner Bros too. Not just some lil’ webserver, we hack the whole intranet. We see how they work and all. Funny thing, is that Warner Bros’ IT knew about the hacks, according to their data and did nothing. They don’ give a shit. Now they gonna’ get their ass owned. Hacking China Telecom, was as simple as we assumed it would be. As BBC reported, China and Brazil are the most vulnerable to a cyber attack. I assume China neglected the international news source’s article. China Telecom’s SQL server had an extremely low processing capacity, and with us being impatient, after about a month straight of downloading, we stopped. However, a few times we accidentally DDoS’d their SQL server. I guess they thought nothing of it, until we left them a little message signed by SwaggSec. They realized they were hacked, and simply moved their SQL server. No changing of admin passwords, or alerting the media. At any moment, we could have and still could destroy their communication infrastructure leaving millions without communication. Warner Bros’ also approaches the same technique of confidentiality and ignorance when it comes to their own security vulnerabilities. When we hacked their intranet, we were surprised to see their IT department’s well documented "confidential" data about the "critical vulnerabilities" on their servers and sites. However, their IT department’s ignorance to fix any of the vulnerabilities they were aware about, granted us complete access to their servers. Although we were going to include a much larger leak from Warner Bros, we decided to stick within our time frame in hand. Besides, there are plenty of other ignorant companies to own. In the torrent below, you will find over 900 admin users for China Telecom. The login for this resides at and we encourage you, the people, who China Telecom ignored, to access and tamper with their data. The torrent also contains a more in depth statement about China Telecom, and all their databases and tables. Warner Bros also makes an appearance in the torrent, with another in depth statement, and all their critical "confidential" IT data, and some other miscellaneous data we decided to quickly throw in from their server. Remember, damage is bliss and I trust those who read this, will do so. Without further hesitation, the leaks. The Hackers with Swagger, Swagg Security Torrent to China Telecom and Warner Bros Leak and Dump(Please Seed): -:-– -:- /Ignore the description of the torrent on ThePirateBay, they screwed it up/

About the author: Lee J

Security Analyst, Developer, OSINT,

Comments are closed.