Crime Crunchyroll Data Breach — Threat Actor Claims Exfiltration of 100 GB of User Data - It was India.

  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
By Guru Baran - March 23, 2026

1774240977698.png

A threat actor has allegedly exfiltrated approximately 100 GB of personally identifiable information (PII) from Crunchyroll, the Sony-owned anime streaming giant, after gaining access through a compromised employee at the platform’s outsourcing partner, Telus.

The breach, which reportedly occurred on March 12, 2026, has not been publicly acknowledged by Crunchyroll as of this writing.

According to the threat actor, who contacted Cyber Digest, the intrusion was made possible after an employee at Telus Crunchyroll’s business process outsourcing (BPO) partner executed malware on their workstation.

This infection provided the attacker with a foothold into Crunchyroll’s internal environment, enabling lateral movement into sensitive customer-facing systems, including the company’s ticketing infrastructure.

This attack vector aligns with a broader pattern observed in the Telus Digital incident confirmed on March 12, 2026, in which threat actors claimed to have stolen data from Telus and numerous companies that rely on the firm for BPO services such as customer support, AI data operations, and content moderation.

Because BPO providers handle authentication and billing tools across multiple client environments, they remain attractive high-value targets for threat actors seeking to maximize breach scope through a single intrusion.

Data Exfiltration by Attackers


Cyber Digest analyzed a sample of the exfiltrated data provided by the threat actor, which contained highly sensitive categories of customer information, including:
  • IP addresses
  • Email addresses
  • Credit card details
  • Customer analytics data (PII)
The threat actor claims a total of 100 GB of data was pulled from Crunchyroll’s customer analytics environment and ticketing system. The nature of the exposed data poses significant risks of identity theft, financial fraud, and targeted phishing campaigns for affected subscribers.

1774241050506.png
Tweet

The threat actor stated that Crunchyroll detected and revoked their access approximately 24 hours after the initial breach on March 12, 2026. Despite the relatively short access window, the volume of data exfiltrated suggests the attacker had pre-planned the operation and moved quickly once inside.

Perhaps more alarmingly, the threat actor told Cyber Digest that Crunchyroll has continued to ignore all communications regarding the incident and has made no public disclosure to affected customers.

This silence is particularly concerning given that Crunchyroll was already subject to a class-action lawsuit in early 2026 over alleged unauthorized sharing of user viewing data with third-party marketing platforms.

Crunchyroll has not responded to requests for comment at the time of publication. Cyber Security News will continue monitoring this developing story.
L|A
 
According to the threat actor, who contacted Cyber Digest, the intrusion was made possible after an employee at Telus Crunchyroll’s business process outsourcing (BPO) partner executed malware on their workstation.
A tale as old as time.
 
I'm just gonna assume that data breaches that ate this massive will continue to be a trend due to outsourcing to retards.
 
Oh my. I can't wait until absolutely nothing of consequence happens to the company for letting this happen!
 
I just realized this is like the 8th fucking data breach under sony in like 15 years, i can not BELIEVE anybody still trusts those fucking hacks.
 
Imagine paying for anime
They went full retard and locked all their shit behind a paywall which is funny because if memory serves they started as a sketchy free streaming site
I'm disappointed so many were dumb enough to sigh and open their wallets instead of finding it elsewhere.
 
Imagine paying for anime
They went full retard and locked all their shit behind a paywall which is funny because if memory serves they started as a sketchy free streaming site
I'm disappointed so many were dumb enough to sigh and open their wallets instead of finding it elsewhere.
Someone has to record it for y'all.
 
the intrusion was made possible after an employee at Telus Crunchyroll’s business process outsourcing (BPO) partner executed malware on their workstation.
This is like the second time this kind of thing has happened (the first I remember being Ubisoft with R6S) and it's entirely because all these companies hire turd-world shitskins to handle sensitives operations.
 
Back
Top Bottom