BREAKING: Crunchyroll Data Breach Exposes 100GB of Customer Data via Indian Outsourcing Partner

The CyberSec Guru

Updated on:

Crunchyroll Data Breach

If you like this post, then please share it:

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Why your support matters: Zero paywalls: Keep the content 100% free for learners worldwide, Writeup Access: Get complete writeup access within 12 hours of machine drop along with scripts and commands.

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

TL;DR

  • Crunchyroll, the world’s leading anime streaming service, has reportedly suffered a massive data breach.
  • A “supply chain” attack targeting an employee at Telus Digital, an outsourcing partner in India.
  • Approximately 100 GB of sensitive data, including emails, IP addresses, customer analytics, and potentially partial credit card details stolen.
  • A sophisticated phishing campaign led to a malware infection on a partner workstation, allowing attackers to harvest Okta credentials.
  • All Crunchyroll users are strongly advised to reset their passwords immediately and enable Multi-Factor Authentication (MFA).
  • UPDATE: A threat actor “hubert” is selling Crunchyroll Zendesk Database containing 2,000,000 support tickets and 1,394,207 unique email addresses.
  • UPDATE: TELUS themselves have Officially confirmed that a breach occurred where 1 petabyte of overall data was stolen that same day
Crunchyroll
Crunchyroll

UPDATE: A threat actor “hubert” is selling Crunchyroll Zendesk database. Allegedly, it contains more than 2,000,000 support tickets and 1,394,207 unique email addresses. Exhaustive list was provided as proof as json data. Asking price? $2,000.

UPDATE: TELUS themselves have Officially confirmed that a breach occurred where 1 petabyte of overall data was stolen that same day.

ORIGINAL STORY BELOW

How One Phishing Email Compromised Millions of Weebs

In a startling revelation that has sent shockwaves through the global anime community, Crunchyroll has become the latest victim of a high-stakes supply chain cyberattack. While the company itself maintains a robust security posture, the “weakest link” proved to be an external one: a business process outsourcing (BPO) partner located in India.

The breach, which reportedly saw the exfiltration of 100 gigabytes of highly sensitive customer data, serves as a grim reminder of the vulnerabilities inherent in modern globalized tech infrastructure.

The Anatomy of the Attack: From Phish to PII

The breach did not begin with a direct assault on Crunchyroll’s servers in California. Instead, it started with a meticulously crafted, spoofed phishing email sent to an employee at Telus Digital (formerly Telus International), a major BPO provider that handles customer support and ticketing for Crunchyroll.

According to cybersecurity analysts and leaked reports from the threat actors themselves, the sequence of events was as follows:

  1. The Hook: An employee in India received a spoofed email that appeared to be a legitimate internal communication.
  2. The Detonation: The employee, believing the email to be authentic, executed a malicious attachment. This “detonated” an infostealer malware on their local workstation.
  3. Credential Harvest: Once active, the malware bypassed local defenses to scrape session tokens and login credentials. Crucially, it captured the employee’s Okta credentials.
  4. The Infiltration: Using these valid (but stolen) credentials, the threat actor bypassed standard authentication and gained direct access to Crunchyroll’s internal environment.
  5. Data Exfiltration: For roughly 24 hours, the attacker moved laterally through the system, focusing on the Zendesk ticketing system and customer analytics databases.
An infographic showing the flow of the attack
An infographic showing the flow of the attack

What Data Was Stolen? A 100GB Treasure Trove

Initial samples provided by the threat actors suggest a wide-reaching compromise. The 100 GB haul is not just a collection of names and email addresses; it is a deep dive into a customer’s streaming habit, personal information and financial data.

1. Personally Identifiable Information (PII)

The most immediate risk to users comes from the exposure of:

  • Full Names and Email Addresses: Perfect fuel for future, more targeted phishing campaigns.
  • IP Addresses: Which can be used to approximate user locations and track digital footprints.
  • Account History: Details on subscription tiers and account age.

2. The Financial Risk: Credit Card Details

Perhaps the most alarming claim is the theft of credit card information. While modern systems typically “mask” credit card numbers (showing only the last four digits), the ticketing system often contains unencrypted logs or “receipt” snapshots that may have been swept up in the exfiltration. If full card details were present in support tickets (where users occasionally send screenshots to resolve billing issues), the risk of financial fraud is extreme.

3. Customer Analytics & Support Tickets

By gaining access to the ticketing system, the attacker has access to every conversation users have had with Crunchyroll support. This includes:

  • Personal complaints.
  • Billing disputes.
  • Verification documents (if any were uploaded).

Full list of details that’s confirmed to have been stolen (depending on the tickets)

  • Complete credit card details
  • Passwords in plain text
  • Email address
  • IP Address with IP geolocation
  • Phone number
  • Full name
  • Staff or support agent email
  • Billing details
  • Browser fingerprints
  • Physical address
  • Internal API URLs

The “Supply Chain” Problem: Why Outsourcing is a Target

This incident highlights a growing trend in the cyber-underworld: targeting the “middleman.” Why spend months trying to hack a multi-billion dollar giant like Sony (Crunchyroll’s parent company) when you can hack a support partner with potentially looser endpoint security?

Telus Digital handles massive volumes of data for dozens of Fortune 500 companies. By compromising a single workstation at such a firm, hackers gain a “backdoor” into multiple high-value targets.

A map showing the connection between Silicon Valley tech giants and BPO hubs
A map showing the connection between Silicon Valley tech giants and BPO hubs

The “Identity as the New Perimeter”

We spoke with several cybersecurity experts regarding the Crunchyroll incident. The consensus is clear: traditional firewalls are no longer enough.

“This is a classic case where the system trusted the attacker because they had the right keys,” says a lead analyst. “Once they had the Okta credentials, they weren’t ‘hacking’ anymore they were just simply, easily ‘logging in.’ This underscores why hardware-based MFA (like Yubikeys) is becoming non-negotiable for anyone with administrative access to customer data.”

What Should Crunchyroll Users Do Right Now?

If you have an active Crunchyroll account, or have had one in the last five years, you should assume your data was part of the 100 GB leak.

1. Reset Your Password Immediately

Even if you think your account is safe, change your password. Use a unique, complex string of characters that you do not use for any other service.

2. Check Your “Device Management”

Log in to your Crunchyroll account settings and look for the Device Management tab. Click “Deactivate All Devices” to force a logout of every session, including potential unauthorized ones.

3. Enable 2FA (If Available)

While Crunchyroll has been slow to roll out robust two-factor authentication for all users, ensure any linked accounts (like Google or Apple ID) have 2FA enabled.

4. Monitor Your Bank Statements

Keep a close eye on the credit or debit card you use for your subscription. If you see even a $1.00 “test charge” that you don’t recognize, contact your bank immediately to freeze the card.

5. Be Wary of “Crunchyroll” Emails

Expect a surge in phishing. You may receive emails that look like they are from Crunchyroll support asking you to “click here to secure your account.” Do not click. Go directly to crunchyroll.com in your browser.

Frequently Asked Questions (FAQ)

Is Crunchyroll safe to use right now?

Yes, the platform’s streaming services are operational. The breach affected stored data and support systems, not the live video delivery infrastructure. However, your account may be at risk if you haven’t changed your password.

Did the hackers get my password?

The hackers obtained Okta credentials of an employee, which gave them access to the database. Whether they were able to extract hashed user passwords from the analytics data is currently being investigated.

Was my credit card stolen?

Threat actors claim to have credit card details. While Crunchyroll typically uses secure payment processors, data stored in support tickets or analytics logs could contain sensitive financial snippets.

Why was India involved in this breach?

Crunchyroll, like many global companies, outsources its customer service and data entry to partners like Telus Digital, which has major operations in India. The breach happened at the partner level, not Crunchyroll’s HQ.

Will I get a notification if my data was stolen?

Under GDPR and CCPA regulations, Crunchyroll is legally obligated to notify users if their PII was compromised. Watch your inbox for an official “Notice of Data Breach.”

A Wake-Up Call for the Streaming Giant

The Crunchyroll breach is a landmark case for 2026. It proves that even the most beloved brands are only as secure as their least-secure partner. As the investigation continues, the pressure is on Sony and Crunchyroll to provide transparency and better protection for the millions of fans who trust them with their data.

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Your contribution powers free tutorials, hands-on labs, and security resources.

Why your support matters:
  • Writeup Access: Get complete writeup access within 24 hours
  • Zero paywalls: Keep the content 100% free for learners worldwide

Perks for one-time supporters:
☕️ $5: Shoutout in Buy Me a Coffee
🛡️ $8: Fast-track Access to Live Webinars
💻 $10: Vote on future tutorial topics + exclusive AMA access

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

If you like this post, then please share it:

News

Discover more from The CyberSec Guru

Subscribe to get the latest posts sent to your email!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from The CyberSec Guru

Subscribe now to keep reading and get access to the full archive.

Continue reading