Popular anime streaming platform Crunchyroll is investigating a breach after hackers claimed to have stolen personal information for approximately 6.8 million people.
"We are aware of recent claims and are currently working closely with leading cyber security experts to investigate the matter," Crunchyroll told BleepingComputer.
This statement comes after a threat actor contacted BleepingComputer last Thursday and claimed they breached Crunchyroll on March 12th at 9 PM EST, after gaining access to the Okta SSO account of a support agent working for Crunchyroll.
This support agent is allegedly an employee of the Telus International business process outsourcing (BPO) company, who has access to Crunchyroll support tickets. The threat actors claimed to have used malware to infect the agent's computer and gain access to their credentials.
From screenshots shared with BleepingComputer, these credentials gave access to various Crunchyroll applications, including Zendesk, Wizer, MaestroQA, Mixpanel, Google Workspace Mail, Jiro Service Management, and Slack.
Using this access, the attackers say they downloaded 8 million support ticket records from Crunchyroll's Zendesk instance. Of these records, there are allegedly 6.8 million unique email addresses.
Samples of the support tickets seen by BleepingComputer and then deleted contain a wide variety of information, including the Crunchyroll user's name, login name, email address, IP address, general geographic location, and the contents of the support tickets.
While other reports on the incident claim that credit card information was exposed, BleepingComputer has confirmed that credit card details were exposed only when the customer shared them in the support ticket.
For the most part, this included only basic information, such as the last four digits or expiration dates, and only a few contained full card numbers, according to the threat actor.
The support tickets seen by BleepingComputer all reference Telus, supporting the threat actor's claim that they compromised a BPO employee.
... continue reading