Crunchyroll Data Breach Exposes Customer Information via Telus, Reports Say

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Third-party vulnerability: An unidentified threat actor exploited a compromised employee account at an outsourcing partner to infiltrate the platform's infrastructure.
  • Substantial data exfiltration: The unauthorized intrusion resulted in the extraction of approximately 100 GB of sensitive corporate and user data.
  • Ongoing assessment: The alleged customer data compromise purportedly encompasses analytics repositories and ticketing system databases.

Crunchyroll was reportedly breached by an unnamed threat actor that carried out large-scale data exfiltration via a compromised account of its outsourcing partner, Telus. This cybersecurity incident resulted in the alleged exfiltration of ticketing system data and approximately 100 GB of personally identifiable user analytics data.

Technical Analysis of the Security Breach

According to International Cyber Digest, the compromised dataset encompasses comprehensive subscriber analytics, backend ticketing infrastructure records, and personally identifiable information (PII) repositories:

The threat actor allegedly stole 100 GB of Crunchyroll's analytics data, which also includes IP addresses | Source: International Cyber Digest
The threat actor allegedly stole 100 GB of Crunchyroll's analytics data, which also includes IP addresses | Source: International Cyber Digest

Reports say the adversaries compromised employee credentials belonging to the authorized outsourcing partner that maintained privileged access to Crunchyroll's systems.

Data Compromise Scope

This Crunchyroll data compromise story is still developing and maintains a preliminary verification status with an assigned ESIX score of 5.02. The data breach happened on March 12, 2026, and Crunchyroll revoked the unauthorized access after 24 hours, the hackers reportedly told International Cyber Digest. 

Canadian telecommunications and business services firm Telus on March 16 confirmed a ​cybersecurity incident involving unauthorized access to some of its ‌systems, with ShinyHunters claiming to have stolen at least 700 terabytes in a message to Reuters.

The gang also shared samples that suggested at least two dozen companies were affected and included PII, call data and recordings, FBI background check information, and source code spanning multiple business divisions. Reports say the Telus breach started at a third-party itself, Salesforce, as ShinyHunters reportedly found Google Cloud Platform credentials tied to Telus Digital.

Organizations must establish stringent access governance protocols and deploy continuous monitoring capabilities across external vendor ecosystems to mitigate supply chain attack vectors. Users should change their Crunchyroll passwords. 


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: