Powered by MOMENTUMMEDIA
For breaking news and daily updates, subscribe to our newsletter

6.8m Crunchyroll subscribers allegedly impacted in cyber attack

Anime streaming service Crunchyroll has confirmed that it suffered a cyber attack, with hackers claiming to have breached a third-party vendor’s internal network and accessed user data.

Wed, 25 Mar 2026
6.8m Crunchyroll subscribers allegedly impacted in cyber attack

Earlier this week, reports suggesting that threat actors had stolen the data of around 6.8 million Crunchyroll users surfaced, almost half of the company’s 15-million-strong worldwide user base.

Following those reports, which originated when the hacker reportedly contacted publication BleepingComputer with claims of the cyber attack last week, Crunchyroll said it had launched an investigation into the alleged incident.

“We are aware of recent claims and are currently working closely with leading cyber security experts to investigate the matter,” Crunchyroll told BleepingComputer.

 
 

“Our investigation is ongoing, and we continue to work with leading cyber security experts. At this time, we believe that the information is primarily limited to customer service ticket data following an incident with a third-party vendor,” it later wrote in a statement to media.

“We have not identified evidence of ongoing access to systems in relation to these claims. We are continuing to monitor the situation closely.”

According to the threat actor, Crunchyroll suffered the data incident after they breached the Okta SSO account of a Crunchyroll support agent.

The staffer was reportedly an employee of Telus International, a business process outsourcing firm that has access to Crunchyroll support tickets. According to the hacker, they deployed malware that infected the staffer’s device and took their credentials, leading to the access.

In screenshots reportedly sent to BleepingComputer, the credentials granted access to a number of applications, including Google Workspace Mail, Jiro Service Management, Slack, Mixpanel, MaestroQA, Wizer, and Zendesk.

According to the publication, the Zendesk access was used to download 8 million support tickets, which allegedly contained 6.8 million unique email addresses.

Samples also reportedly contained user names, login names, email addresses, general geographic locations, IP addresses, and support ticket contents.

BleepingComputer said that some reports claim credit card information was exposed, but noted the only financial data exposed was that shared in support tickets, and this only contained basic data such as expiration dates and the last four digits of a card number. Only a handful contained full card numbers.

All the support tickets reference Telus, which backs the threat actor’s claims. The hackers said they had access revoked after 24 hours, meaning data stolen is relevant up to mid-2025.

The threat actor also said it had sent extortion emails to Crunchyroll demanding US$5 million in exchange for the data not to be leaked. The company has reportedly not responded.

BleepingComputer said it was told that the hack was separate from a recent alleged breach of Telus Digital, which was claimed by ShinyHunters.

It is currently not publicly known which threat actor launched the recent Crunchyroll attack.

Cyber DailyWant to see more stories from trusted news sources?
Make Cyber Daily a preferred news source on Google.

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
Tags: