BotBeat
...
← Back

> ▌

CrunchyrollCrunchyroll
POLICY & REGULATIONCrunchyroll2026-03-23

Crunchyroll Investigates Major Data Breach Affecting 6.8 Million Users After BPO Employee Compromise

Key Takeaways

  • ▸6.8 million Crunchyroll users had personal data stolen via compromise of a Telus International BPO support agent's credentials
  • ▸Attackers accessed multiple critical systems including Zendesk, Google Workspace, and Slack through a single compromised employee account
  • ▸Business process outsourcing companies have become prime targets for threat actors due to their access to customer data and authentication systems across multiple clients
Source:
Hacker Newshttps://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/↗

Summary

Popular anime streaming platform Crunchyroll is investigating a significant data breach reportedly affecting approximately 6.8 million users. According to threat actors who contacted BleepingComputer, the breach occurred on March 12th after attackers compromised the Okta SSO account of a support agent employed by Telus International, a business process outsourcing (BPO) company handling Crunchyroll support operations. Using malware-infected credentials, the attackers gained access to multiple Crunchyroll systems including Zendesk, Google Workspace, and Slack, and claim to have downloaded 8 million support ticket records containing user personal information.

The stolen data includes names, login credentials, email addresses, IP addresses, geographic locations, and support ticket contents for 6.8 million unique users. While some reports claimed credit card information was exposed, BleepingComputer confirmed that payment details were only compromised when customers voluntarily shared them in support tickets, with most exposure limited to partial information like last four digits. The threat actors claim to have demanded $5 million in extortion fees but received no response from Crunchyroll. The attackers maintained access for approximately 24 hours before it was revoked, allowing them to steal data up to mid-2025.

  • The incident highlights the security vulnerabilities inherent in outsourcing sensitive support functions, as a single compromised BPO employee can expose millions of users
CybersecurityEntertainment & MediaPrivacy & Data

Comments

Suggested

PerplexityPerplexity
POLICY & REGULATION

Perplexity's 'Incognito Mode' Called a 'Sham' in Class Action Lawsuit Over Data Sharing with Google and Meta

2026-04-05
SourceHutSourceHut
INDUSTRY REPORT

SourceHut's Git Service Disrupted by LLM Crawler Botnets

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Security Researcher Exposes Critical Infrastructure After Following Claude's Configuration Advice Without Authentication

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us