analyst @ nohacky :~/briefings $
cat / briefings / crunchyroll-supply-chain-breach.html
analyst@nohacky:~/briefings/crunchyroll-supply-chain-breach.html
reading mode 42 min read
category Supply Chain
secondary Threat Intel
published March 2026
read_time 42 min
chain_origin March 2025
affected_users 6.8M confirmed

The Breach That Started a Year Before Crunchyroll Knew About It

On March 12, 2026, a Telus Digital employee in India opened a phishing email, and 6.8 million Crunchyroll subscribers became collateral damage. But the real clock started ticking twelve months earlier — when a threat actor quietly compromised a chatbot company's GitHub repository and nobody noticed for three months. This is the full attack chain: from a developer platform in March 2025 to an anime subscriber's inbox in March 2026, every link sourced and traced.

When Crunchyroll finally acknowledged its breach on March 23, 2026, the company attributed the incident to a third-party vendor and described the scope as primarily limited to customer service ticket data. That statement is technically accurate and substantively misleading. It identifies the symptom — a compromised BPO partner — without acknowledging that the root cause predates Crunchyroll's own breach by a full year, passed through five separate organizations, and was documented, named, and covered extensively in public security advisories that Crunchyroll apparently never acted on.

Eleven days elapsed between the breach date and the company's first public acknowledgment. For context, GDPR requires notification within 72 hours. The 11-day silence isn't a procedural footnote — it is likely the detail that will draw regulatory attention first, and it happened while a threat actor group was actively dumping data from dozens of other victims and running simultaneous extortion campaigns against universities, financial firms, a restaurant chain, and a student information system used by 11 million students.

To understand what actually happened to Crunchyroll's subscribers, you have to start where nobody in the mainstream coverage started: a GitHub account compromise in March 2025.

The Attack Chain: Five Organizations, Twelve Months

The credential chain that eventually reached Crunchyroll's Zendesk environment is not metaphorical. Each link is documented, each transition sourced. Mandiant investigated the origin. Google Threat Intelligence Group published the Salesforce exfiltration details. BleepingComputer spoke directly to ShinyHunters about the Telus intrusion. The threat actor who breached Crunchyroll specifically contacted BleepingComputer and International Cyber Digest. Every step below has primary source attribution.

5 organizations in credential chain
12 months origin to Crunchyroll
6.8M unique emails exposed
700+ orgs hit via Salesforce
~1 PB Telus data claimed stolen
11 days before any disclosure
// interactive attack chain — march 2025 to march 2026 tap any node to expand
01 Mar 2025 Salesloft GitHub compromised UNC6395
UNC6395 gains unauthorized access to Salesloft's GitHub account. The method was never publicly disclosed by Salesloft. The group maintained undetected presence for three months — conducting reconnaissance across Salesloft and Drift application environments, downloading repository content, adding guest users, and staging workflows for later exploitation. The entry point that enabled everything downstream remains unknown.
02 Aug 8–18, 2025 700+ Salesforce orgs hit via Drift OAuth tokens UNC6395
Using OAuth tokens stolen from Drift's AWS environment, UNC6395 authenticated as the trusted Drift application and ran systematic SOQL queries against Salesforce instances. COUNT queries first — to assess data volume — then structured pulls of Users, Cases, Accounts, and Opportunities. Query jobs deleted to cover tracks, but logs were preserved. Named victims include Cloudflare (104 API tokens), Palo Alto Networks, Zscaler, Proofpoint, Qualys, Tenable, CyberArk, BeyondTrust, Workday, and 20+ others. The primary objective was not the Salesforce data itself — it was the credentials embedded in that data.
03 Aug 20, 2025 Salesloft takes Drift offline. Advisories published. Response
Salesloft and Salesforce revoke all Drift OAuth tokens and remove Drift from AppExchange. Google publishes advisory naming UNC6395 and confirming 700+ affected organizations. FINRA issues formal cybersecurity alert. Unit 42 and Mandiant publish threat briefs. The security community treats this as a significant supply chain event. However, the credential exposure does not end when the tokens are revoked — some credentials were already in ShinyHunters' possession.
04 Late 2025 ShinyHunters pivots into Telus Digital via Trufflehog ShinyHunters
ShinyHunters finds Telus Digital's GCP credentials buried in the Salesloft/Drift stolen Salesforce data — likely included in a support ticket or internal configuration. Those credentials grant access to Telus Digital's BigQuery instance. After downloading that data, they run Trufflehog — a legitimate open-source credential scanning tool — against the downloaded dataset. Trufflehog verifies 800+ credential types against live APIs, producing a sorted list of still-active keys. Each valid credential becomes a key to another system. The group pivots through multiple Telus systems over months without detection.
05 Jan 2026 Telus breach surfaces. ShinyHunters campaign intensifies. ShinyHunters
BleepingComputer first hears about the Telus breach. Telus does not respond to media inquiries. Simultaneously, the ShinyHunters campaign is running at industrial volume: SoundCloud (29.8M records), Betterment (1.4M), Panera Bread (5.1M), Match Group (10M+), Harvard, UPenn, Canada Goose, Crunchbase, Figure Technologies. The group is operating openly and publicly while major organizations remain unaware their data is being actively processed.
06 Feb 2026 $65M demand to Telus. Ignored. Campaign continues. ShinyHunters
ShinyHunters demands $65M from Telus. Telus does not respond. The campaign expands: Wynn Resorts ($1.5M demand, 800K employee records), CarGurus (12.5M records), Mercer Advisors. Mandiant publishes "Vishing for Access" formally documenting the ShinyHunters-branded SaaS campaign. Voice phishing now accounts for 11% of all initial intrusion vectors — second only to spear phishing.
07 Mar 9, 2026 Sony named as target. Three days before the breach. ShinyHunters
ShinyHunters tells The Register they have breached "almost 400 websites and about 100 essential high profile companies" — explicitly naming Sony as one. This was published in mainstream security media. Three days later, a Telus Digital employee handling Crunchyroll (a Sony subsidiary) support tickets is targeted by a separate threat actor exploiting the same compromised BPO environment.
08 Mar 12, 2026 ~9PM EST Crunchyroll Zendesk accessed. 8M records downloaded. Crunchyroll
A separate threat actor phishes a Telus Digital employee in India via a malware-laced email. The infostealer captures the employee's Okta SSO credentials. Those credentials provide access to Crunchyroll's Zendesk, Wizer, MaestroQA, Mixpanel, Google Workspace Mail, Jira Service Management, and Slack. Over 24 hours, approximately 8 million support ticket records are downloaded — containing 6.8 million unique email addresses, names, login usernames, IP addresses, and geographic locations. A $5 million extortion demand is sent and ignored.
09 Mar 13, 2026 Access revoked. 11 days of silence begin. Crunchyroll
Crunchyroll detects and revokes the attacker's access. Investigation begins internally. No public statement is issued. No direct notification is sent to subscribers. GDPR's 72-hour notification clock began running at this moment. The company will not make any public acknowledgment for eleven more days — and even then, only in response to journalist inquiries after the breach had been published by International Cyber Digest.
10 Mar 18, 2026 Infinite Campus hit. 11M students at risk. ShinyHunters
ShinyHunters breaches Infinite Campus, a student information system used by approximately 11 million students across US school districts, via a Salesforce account compromise. A ransom deadline of March 25 is set. The campaign is ongoing while Crunchyroll's 6.8 million subscribers remain uninformed about their own exposure.
11 Mar 22–23, 2026 Evidence published. Crunchyroll finally responds. Crunchyroll
International Cyber Digest publishes breach evidence on X, triggering media coverage. Crunchyroll issues its first public statement eleven days after breach detection — exclusively to journalists who requested comment. No direct subscriber email notification. No dedicated breach notification page. Subscribers learn about the compromise from security journalists, anime forums, and cybersecurity accounts. Narrative control had already transferred to the threat actor.

Denis Calderone, CTO of Suzu Labs, captured the upstream origin when the Telus breach was confirmed: "The Salesloft breach really is the gift that keeps on giving." The credentials used to reach Telus Digital, he noted, traced directly back to the Salesloft compromise that began in early 2025.

That is the attack chain in plain language: a chatbot company's GitHub account, compromised by unknown means in March 2025, set off a credential cascade that reached a Sony-owned anime platform's customer database twelve months later. Crunchyroll's subscribers were not the target. They were the downstream residue of a supply chain that nobody secured at any of its upstream links.

Link One: The Salesloft GitHub Compromise

Salesloft acquired Drift, a conversational marketing and AI chat platform, in February 2024. By March 2025, an unidentified threat actor — tracked by Mandiant as UNC6395 — had obtained unauthorized access to Salesloft's GitHub account and maintained that access through June 2025. Three months of undetected presence in a software development environment.

Salesloft has never publicly disclosed how the initial GitHub access was obtained. Mandiant's investigation confirmed the compromise and its timeline but the root cause statement — the one that would tell the security community exactly which failure enabled this — has never been published. That absence is worth noting. Every downstream organization affected by this chain made security decisions without knowing the actual entry point.

During those three months, the attackers conducted reconnaissance across Salesloft and Drift application environments, downloaded repository content, added guest users, and established workflows that would facilitate the August 2025 exfiltration campaign. This is not opportunistic compromise. This is a deliberately staged operation — understanding the target environment thoroughly before executing.

The August campaign itself ran from August 8 through August 18, 2025. Using OAuth tokens stolen from Drift's AWS environment, UNC6395 authenticated as the trusted Drift application into customer environments and executed systematic SOQL queries against Salesforce data. The specific query syntax Google Threat Intelligence Group published reveals exactly how methodical this was: COUNT queries first, to assess data volumes before committing to full extraction. Then structured pulls of Users, Cases, Accounts, and Opportunities. The attacker demonstrated operational security awareness by deleting query jobs afterward — but logs were preserved, which is why Mandiant could reconstruct the activity.

The primary objective was not the Salesforce data itself. The primary objective was the credentials embedded in that data. AWS access keys with AKIA identifiers. Snowflake tokens. VPN credentials. Passwords stored in support tickets. Cloudflare confirmed that 104 API tokens were discovered and rotated from its own environment. Palo Alto Networks, Zscaler, Proofpoint, Qualys, Tenable, CyberArk, BeyondTrust, Workday, and 17 other named organizations confirmed their Salesforce data was accessed.

key detail

The Salesloft/Drift breach affected an estimated 700+ organizations according to Google Threat Intelligence Group. The Drift platform provided integrations with 58 third-party tools — Salesforce, Google Workspace, Slack, Amazon S3, Microsoft Azure, OpenAI, and others. Google's August 28 update confirmed that any platform integrated with Drift should be treated as potentially compromised, not just Salesforce. This means the true blast radius of the Salesloft origin point extended to dozens of enterprise platforms simultaneously.

Salesloft took Drift offline entirely in September 2025. FINRA issued a formal cybersecurity alert to all member firms. Unit 42 at Palo Alto Networks published a threat brief. Google and Mandiant published advisory after advisory. The security community treated this as a significant supply chain event. The credential exposure it created, however, did not end when the tokens were revoked. Some of those credentials — specifically, GCP credentials belonging to Telus Digital — were already in ShinyHunters' possession.

Link Two: Telus Digital and the Trufflehog Pivot

ShinyHunters told BleepingComputer exactly how they got into Telus Digital: they found the company's Google Cloud Platform credentials inside the Salesloft/Drift stolen Salesforce data. Those credentials were likely included in a support ticket or internal configuration shared through Salesforce — the kind of sensitive material that routinely ends up in CRM case notes because nobody thinks to treat a support ticket as a potential credential exposure surface.

The GCP credentials gave ShinyHunters access to Telus Digital's cloud environment, including a large BigQuery instance. After downloading that data, they ran Trufflehog — the same open-source secret-scanning tool used by security professionals to find exposed credentials — against the downloaded dataset to identify additional authentication materials. Trufflehog supports over 800 credential types and, critically, verifies discovered credentials by testing them against live APIs. An attacker running Trufflehog against a downloaded BigQuery instance gets a sorted, verified list of every still-active credential embedded in that data. From there, each valid credential becomes a key to another system.

This is what the Qualys blog called "credential discovery preceding exploitation, and authentication preceding impact." The technique is not sophisticated in the sense of requiring custom malware or zero-day exploits. It is sophisticated in the sense of being patient, methodical, and automated. ShinyHunters did not hack Telus Digital. They authenticated into Telus Digital using credentials that Telus Digital had inadvertently placed in data that another company (Salesloft) had inadvertently exposed.

The multi-month dwell time — BleepingComputer first heard about the Telus breach in January 2026, but the GCP credential origin traces back to the August 2025 Salesloft exfiltration — allowed for a staggering scale of extraction. ShinyHunters claims nearly one petabyte of data. Reuters confirmed samples shared by the group include data spanning at least two dozen companies including personally identifiable information, call center recordings, FBI background check information, and source code across multiple Telus business divisions. The 28 company names that ShinyHunters shared with BleepingComputer were withheld pending independent verification. Crunchyroll is the first to be publicly identified.

"This is not smash-and-grab ransomware. It is strategic, disciplined, and optimized for maximum leverage." The hallmarks of this breach — multi-month dwell time, massive data volumes, and delayed detection — suggest the abuse of legitimate access rather than overt technical exploitation. Attackers no longer need to break in if they can blend in. — Fritz Jean-Louis, Principal Cybersecurity Advisor, Info-Tech Research Group

Telus Digital is a BPO company. That classification matters enormously for understanding why this breach scaled the way it did. BPO providers handle customer support, content moderation, AI training data, fraud detection, and call center operations for multiple clients simultaneously. Because of this, they require privileged access to authentication workflows, billing systems, CRM platforms, and ticketing infrastructure across every client relationship they maintain. A single compromise at a BPO cascades to every downstream organization — not through hacking each one individually, but because the BPO already has legitimate access to all of them.

structural risk

The BPO industry is worth over $280 billion globally. The security model underlying most BPO relationships — where individual client organizations have no direct visibility into the BPO's security posture, no contractual right to audit in real time, and no technical control over how their data is stored and accessed — creates massive concentrations of multi-client data in environments that are architecturally designed to be broadly accessible. This is not a Telus Digital-specific problem. It is a structural property of outsourced operations at scale.

ShinyHunters: Not a New Threat, Not a Random One

Coverage of the Crunchyroll breach treated ShinyHunters as background context. The group deserves substantially more attention, because understanding their operational history makes the timing and targeting of the Telus breach far less surprising than the coverage suggested.

ShinyHunters emerged in 2020 — the name taken from the Pokémon practice of seeking rare "shiny" specimens — and within their first two weeks of public activity had offered over 200 million stolen user records for sale on dark web marketplaces. Their initial wave hit Tokopedia (91 million records), Unacademy (11 million), Wattpad (270 million), Microsoft's GitHub repositories, and dozens of smaller targets. By mid-2020 they had leaked databases from 25 companies containing over 386 million user records, offered free of charge.

In 2024, the group executed what became one of the most significant breaches in recorded history: the Snowflake customer database intrusions, hitting Ticketmaster (560 million records, 1.3 TB of data), Santander Bank (30 million customer records), and at least 165 other Snowflake customers — reached through compromised credentials at a third-party contractor called EPAM Systems, a Snowflake elite partner. The structural pattern is identical to what happened with Salesloft and Telus: a contractor's credentials, compromised through one means, used to reach multiple downstream organizations through a trusted platform relationship.

In August 2025, ShinyHunters formalized a coalition with Scattered Spider and Lapsus$ under the "Scattered LAPSUS$ Hunters" brand, announced via Telegram. The channel ran for four days before Telegram banned it, but in those four days they claimed breaches of Gucci, Chanel, Victoria's Secret, Subaru, Coca-Cola Europacific Partners, and Neiman Marcus, and announced a ransomware-as-a-service platform they claimed would target VMware ESXi hypervisors at the kernel level. They described their strategy explicitly, promising to "go quiet for a while, then return with another long campaign" they called Snowflake 3.0, predicting it would be significantly worse.

That statement was made in August 2025. Telus Digital was confirmed breached in March 2026. The pattern they described — operate, go quiet, return at scale — is exactly what the January-March 2026 campaign represents.

Between January and March 25, 2026 (the date of this analysis), ShinyHunters confirmed or claimed breaches resulting in over 50 million records leaked from more than 15 named organizations. They were operating at industrial volume, publicly, using a playbook documented in detail by Mandiant, CISA, the FBI, and GTIG. The Crunchyroll breach occurred in the middle of this campaign, not before it.

Mandiant's M-Trends 2026 report, published March 23, 2026 — two days before this writing — confirms the scale of the shift. Voice phishing surged to become the second most common initial infection vector in 2025, at 11% of intrusions, up from statistical insignificance in prior years. The median time between an initial access event and handoff to a secondary threat group collapsed from over eight hours in 2022 to 22 seconds in 2025. The infrastructure is pre-staged. The moment access is confirmed, everything is already in place to execute.

Link Three: How Crunchyroll's Users Were Exposed

The specific mechanics of the Crunchyroll breach differ from the ShinyHunters campaign in one important way: the attacker who hit Crunchyroll used phishing and malware rather than voice phishing and OAuth abuse. A Telus Digital employee in India executed malware from a spoofed phishing email. The infostealer captured the employee's Okta SSO credentials. Those credentials provided access to Crunchyroll's support systems — specifically Zendesk — along with Wizer, MaestroQA, Mixpanel, Google Workspace Mail, Jira Service Management, and Slack.

BleepingComputer confirmed via ticket samples that the support tickets all reference Telus, which corroborates the threat actor's claim that they compromised a BPO employee rather than Crunchyroll's own infrastructure directly. The attacker downloaded approximately 8 million support ticket records over 24 hours before their access was revoked. Of those records, 6.8 million contain unique email addresses along with names, login usernames, IP addresses, and geographic locations. Credit card information appeared only where customers had manually included it in support messages — in a small number of cases, full card numbers were present; in most cases only the last four digits or expiration dates.

The relationship between this attacker and ShinyHunters' Telus operation is ambiguous by design. The Crunchyroll intruder contacted International Cyber Digest independently, described a phishing-based entry, and claimed 100 GB over 24 hours. ShinyHunters gained access to Telus through GCP credentials from Salesloft and operated undetected for months. They are different operational signatures. This could be a separate opportunistic actor who found the same compromised Telus environment that ShinyHunters had already compromised through a different pathway. It could also be one component of the ShinyHunters operation, with the separate disclosure serving as leverage pressure after Crunchyroll ignored contact attempts.

The $5 million extortion demand that went unanswered is relevant here. ShinyHunters' documented methodology after a refused ransom demand is public data release or dark web sale. The Crunchyroll data — 6.8 million email addresses, names, IP addresses, geographic locations, support ticket contents — represents a high-value dataset for credential stuffing, targeted phishing, and social engineering campaigns against the subscriber base of one of the world's largest anime streaming platforms.

regulatory exposure

GDPR requires notification to a supervisory authority within 72 hours of becoming aware of a personal data breach. Crunchyroll serves users in EU member states. The breach occurred on March 12. The company confirmed it to journalists on March 23 — eleven days later. CCPA requires notification of California residents "in the most expedient time possible." The company had no notification page, no direct user communication, and no guidance for subscribers for over a week after internal containment. This notification timeline is the legal exposure point, regardless of the data scope. Crunchyroll is already facing a class-action lawsuit filed in early 2026 alleging unauthorized sharing of user viewing data with third-party marketing platforms. A second action involving 6.8 million records and an 11-day delay significantly compounds that posture.

Trufflehog: The Defensive Tool That Became a Pivot Mechanism

One technical dimension of this breach chain deserves dedicated attention because it represents a pattern appearing across multiple concurrent campaigns and has implications beyond this specific incident.

Trufflehog is a legitimate, widely used open-source secret scanning tool developed by Truffle Security. With 24,500 GitHub stars and over 250,000 daily scans, it is a standard component of DevSecOps workflows. Its key capability — what distinguishes it from simpler pattern-matching tools — is live credential verification. When Trufflehog finds an AWS access key, it calls the GetCallerIdentity API to confirm the key is still active before flagging it. It supports over 800 credential types. It leaves a detectable "TruffleHog" user-agent string in cloud provider logs.

When ShinyHunters ran Trufflehog against the downloaded Telus Digital BigQuery data, they were not exploiting a vulnerability in the tool. They were using a defensive utility offensively — as a credential sorter, separating active keys from revoked ones and providing a prioritized list of immediately exploitable credentials. The same tool that security teams run to find their own exposed credentials was used to find Telus Digital's.

This is not an isolated case. The Shai-Hulud npm worm, which compromised over 500 npm packages in September 2025 and had a second wave in November 2025, deployed Trufflehog as a core component of its credential harvesting payload. The worm's bundle.js payload specifically downloaded and executed Trufflehog to scan developer machines for GitHub tokens, npm tokens, and AWS credentials, storing results in truffleSecrets.json before exfiltrating to attacker infrastructure. The Crimson Collective threat group used Trufflehog to harvest AWS credentials from Red Hat's GitLab repositories, resulting in the theft of approximately 570 GB of data from 28,000 repositories.

Truffle Security's own blog acknowledged this directly in September 2025, noting that supply chain attacks were "following the same playbook: breach, find secrets, pivot deeper." Their observation across multiple incidents was that threat actors had turned to publicly available tools — including TruffleHog — to uncover credentials. Their recommendation: defenders should run Trufflehog against their own environments before attackers do.

For organizations that use BPO providers, this creates a specific audit imperative. If your data — including support tickets, CRM records, API configurations, or any other structured data — passes through a third-party service, you should assume that service's data can be scanned by credential-harvesting tools. Support tickets in particular are credential goldmines. Users routinely paste configuration details, API keys, partial credentials, and billing information into support messages. Zendesk, ServiceNow, and similar platforms accumulate years of this material, indexed and searchable. An attacker with SSO access to a support platform doesn't need to breach a database. They just run a search.

The (B2)ⁿ Problem: Why "Third-Party Incident" Understates the Risk

When Crunchyroll attributed the breach to a third-party vendor incident, they used language that appears in almost every modern data breach disclosure. It is technically defensible and structurally misleading, because it suggests a bilateral relationship — Crunchyroll, Telus — when the actual exposure path involves five separate organizational trust boundaries.

Silverfort's analysis of the Salesloft breach introduced a framing that applies equally here: the (B2)ⁿ crossing attack, or what they call cross-vendor lateral movement. The attack chain is not Attacker → Telus → Crunchyroll. It is Attacker → Salesloft GitHub → Drift OAuth → Salesforce (700 orgs) → Telus Digital GCP → Telus BigQuery → Trufflehog credential discovery → Additional Telus systems → Telus employee's Okta → Crunchyroll Zendesk → Subscriber data. Each business-to-business integration created a trust relationship that the attacker inherited once they compromised any single node in the chain.

The practical implication is that Crunchyroll's own security posture was essentially irrelevant to this outcome. Even if Crunchyroll had achieved perfect internal security — hardware keys for every employee, zero-trust architecture, comprehensive monitoring — none of those controls would have intercepted a credential chain that entered their environment from a BPO partner's compromised SSO account. The attack bypassed Crunchyroll's perimeter entirely because it arrived through a trusted authentication pathway.

This is the point that the Blacksmith Infosec analysis made with particular precision after the Salesloft breach: "A vendor's security is indistinguishable from their own." A compromise of any upstream vendor is functionally a compromise of every downstream enterprise that trusts it. The modern enterprise doesn't control its own attack surface in any meaningful sense. It controls the nodes it can directly monitor, but it has limited visibility into — and zero direct security authority over — the vendors those vendors use, and the credentials those nested vendor relationships create.

Crunchyroll in 2026: A Company Already Under Pressure

The breach landed at a particularly difficult moment. In early 2026, Crunchyroll was already facing a class-action lawsuit alleging that it shared user viewing data, device IDs, and anime streaming history with third-party marketing platforms without subscriber knowledge or consent. The plaintiffs are seeking $2,500 per violation under the Video Privacy Protection Act. In 2023, Crunchyroll settled a substantially similar VPPA lawsuit for $16 million. The company also raised subscription prices for its Fan Tier membership for the first time in seven years as of February 2026.

Into this context, Crunchyroll waited 11 days to tell its 15 to 17 million subscribers that a breach had occurred, and even then characterized the scope as "primarily limited to customer service ticket data" — without providing subscribers any guidance on what data was specifically exposed or what actions they should take. No direct email notification. No dedicated breach notification page. Statements only to journalists who asked.

The company's silence during those 11 days is not legally neutral. The 72-hour GDPR notification requirement applies from the moment an organization becomes aware of a breach, not from when an investigation concludes. Crunchyroll detected and revoked the attacker's access on approximately March 13. Eleven days later, users were learning about the breach from security journalists, anime forums, and social media posts by cybersecurity accounts, not from Crunchyroll itself.

The extortion angle adds another dimension. The attacker demanded $5 million and was ignored. Ignoring extortion demands is consistent with FBI and CISA guidance and avoids setting a precedent for payment. But silence as a strategy accelerates the path to public data exposure, which is exactly what happened — International Cyber Digest published breach evidence on March 22, triggering the media coverage that forced Crunchyroll's hand. The company's silence did not contain the incident. It transferred narrative control to the threat actor.

What This Means Going Forward

The Crunchyroll breach is not a story about anime fans and compromised passwords. It is a case study in the structural vulnerabilities of modern enterprise architecture, executed by a threat actor group that has been operating publicly and continuously since 2020, using a playbook documented in detail by Google, Mandiant, Palo Alto Networks, and CISA.

Several implications are worth drawing out explicitly because they appear nowhere in the mainstream coverage.

The Salesloft remediation was incomplete. Telus Digital's GCP credentials were in the Salesloft/Drift stolen data. The credentials were apparently never rotated in the window between the August 2025 Salesloft breach and ShinyHunters' access to Telus in late 2025. Salesloft revoked OAuth tokens. They did not — could not — mandate that every organization whose data was accessed rotate every credential that might have been present in that data. The breach notification process is reactive. By the time an organization receives notification that their Salesforce data was accessed, the attacker may already have enumerated every credential in that data and begun pivoting.

Trufflehog in logs is a detection signal, not a guarantee of attack. The tool leaves a "TruffleHog" user-agent string in AWS CloudTrail and other cloud provider logs. Organizations that had deployed proper API-level telemetry monitoring could have seen Trufflehog running against credentials in their environment. A key open question about the Telus breach is whether any log-level signals of Trufflehog activity were present and undetected, or whether the BigQuery access simply never generated the expected alerts.

BPO contracts need security clauses that currently don't exist at scale. The typical BPO relationship includes service level agreements, data handling provisions, and confidentiality requirements. What it does not typically include is a contractual obligation to notify the client within 24 hours of any security incident affecting client data, a right to audit the BPO's security posture continuously rather than annually, or technical controls preventing BPO agents from bulk-downloading client data to personal devices. These are not unreasonable requirements. They are simply absent from most contracts because the risk was underestimated until breaches like this one made it visible.

The 28 unnamed Telus clients are still unnamed. As of this writing, Crunchyroll is the only organization publicly identified from ShinyHunters' claimed list of 28 Telus Digital BPO clients whose data was stolen. The other 27 have not been disclosed. Their subscribers — across telecommunications, financial services, healthcare, and media — may be unaware that their data passed through Telus Digital's compromised environment. The dwell time was months. The data is already in attacker hands. Notification processes that lag behind attacker exploitation timelines are functionally notification-as-liability-management, not notification-as-user-protection.

The credential chain is still active. ShinyHunters told The Register on March 9, three days before the Crunchyroll breach, that their "recon and exploitation has been going on for several months now" across approximately 100 high-profile companies. On March 18, they breached Infinite Campus. On March 25, the Infinite Campus ransom deadline. The campaign is ongoing. The 28 Telus client names are likely being used for follow-on operations — targeted phishing against the customer bases of those organizations, credential stuffing against platforms where the stolen emails have accounts, and social engineering leveraging the detailed support ticket content.

Key Takeaways

  1. Supply chain breaches have a longer clock than anyone discloses. The Crunchyroll breach date is March 12, 2026. The actual origin date is March 2025, when Salesloft's GitHub was compromised. Every breach notification timeline that starts at the moment of direct victim contact understates the actual duration of exposure by the full length of the upstream credential chain.
  2. Credential harvesting is the objective, not the method. In both the Salesloft and Telus incidents, data exfiltration was not the end goal — it was the means to find more credentials. The stolen Salesforce data was scanned for AWS keys. The Telus BigQuery data was scanned with Trufflehog. Each credential discovery event is itself a new breach origin for whoever those credentials unlock. Organizations that audit their own data stores for embedded credentials — using the same tools attackers use — can break the chain before it reaches them.
  3. The (B2)ⁿ trust model requires rethinking third-party risk governance. Third-party risk assessments that evaluate a vendor's security posture annually cannot detect credential exposure that originated in a different vendor's environment six months ago. The risk model needs to include fourth-party visibility — who your vendors use — and continuous monitoring rather than point-in-time assessment.
  4. Vishing surged to become the second most common initial infection vector in 2025, per Mandiant's M-Trends 2026 report. The Crunchyroll attacker used email-delivered malware. ShinyHunters uses vishing. Both techniques exploited the same structural weakness: SSO credentials granting broad access across connected platforms without independent verification at each application. FIDO2 security keys and passkeys are the only currently available MFA methods resistant to the real-time phishing proxy attacks these groups deploy. Push-based and SMS-based MFA are not.
  5. The 11-day notification delay has legal consequences. GDPR's 72-hour notification requirement is not contingent on the completion of a forensic investigation. An organization that has detected and contained a breach — and Crunchyroll had, by March 13 — has a legal obligation to notify under EU regulation. The delay is a regulatory exposure that will be evaluated independently of the breach's technical scope.
  6. ShinyHunters explicitly named Sony as a target three days before the Crunchyroll breach. The March 9 Register interview, the public Telegram channel, the documented pattern of targeting — none of this was obscure threat intelligence. It was published in mainstream security media. Whether any of that intelligence was being monitored and acted upon at Crunchyroll or Sony is a question the eventual regulatory and litigation processes will likely answer.

Crunchyroll's subscribers did not have their data stolen in a Crunchyroll breach. Their data was taken because a chatbot company's developer account was compromised in March 2025, triggering a credential cascade through five organizations across twelve months. The subscriber had no visibility into any of it. They had no relationship with Salesloft. They had no knowledge of Drift. They had never heard of Telus Digital. They trusted Crunchyroll with their email address, their IP address, their geographic location, and in some cases their payment information — and Crunchyroll, in turn, trusted a BPO whose security was only as strong as its vendors' vendors.

That is not an indictment specific to Crunchyroll. It is a description of how modern enterprise data architecture works. What is specific to Crunchyroll is the 11-day silence while 6.8 million subscribers remained uninformed, the absence of proactive user notification even after confirmation, and the continued absence — as of this writing — of any direct communication to the subscriber base advising them of what was exposed and what to do about it.

The clock that started in March 2025 is still running.

// credential chain clock — origin: march 1, 2025 — still running
000 days
:
00 hours
:
00 minutes
:
00 seconds
Since the Salesloft GitHub compromise — the origin event of the credential chain that reached Crunchyroll's 6.8 million subscribers. The 28 unnamed Telus BPO clients have still not been publicly identified.
// knowledge check — test your understanding

Frequently Asked Questions

What data was stolen in the Crunchyroll breach? +
The attacker downloaded approximately 8 million support ticket records from Crunchyroll's Zendesk instance, containing 6.8 million unique email addresses along with names, login usernames, IP addresses, geographic locations, and the full contents of support tickets. Credit card information was exposed only where customers had manually included it in support messages. In a small number of tickets, full card numbers were present; most contained only the last four digits or expiration dates. Passwords and primary payment vault data were not directly exposed through this incident.
How did the attackers access Crunchyroll's systems? +
A threat actor sent a phishing email containing malware to a Telus Digital employee in India on March 12, 2026. Telus Digital is the business process outsourcing company that handles customer support operations for Crunchyroll. The malware captured the employee's Okta single sign-on credentials, giving the attacker access to Crunchyroll's Zendesk support system along with several connected applications including Slack, Mixpanel, MaestroQA, Wizer, and Google Workspace Mail. The attacker maintained access for approximately 24 hours before detection and removal.
Is the Crunchyroll breach connected to the Telus Digital breach? +
The two breaches share the same BPO environment but appear to involve distinct threat actors using different methods. ShinyHunters breached Telus Digital through GCP credentials discovered in previously stolen Salesforce data, operating undetected for months and claiming nearly one petabyte of stolen data. The Crunchyroll breach was carried out by a separate actor who used a phishing email to compromise a specific Telus employee's Okta account — a faster, more targeted operation yielding 100 GB in 24 hours. Both incidents were confirmed on March 12, 2026. Whether the two actors coordinated or independently exploited the same compromised BPO environment remains unconfirmed by either company.
Who is ShinyHunters and are they behind the Crunchyroll breach? +
ShinyHunters is a financially motivated cybercrime group active since 2020, responsible for some of the largest data thefts on record including Ticketmaster (560 million records), Santander Bank, and the 2025 Snowflake customer database intrusions. The group is tracked by Google's Threat Intelligence Group under multiple designations including UNC6240. ShinyHunters is confirmed behind the Telus Digital breach — they provided BleepingComputer with specific technical details about how they obtained GCP credentials from the Salesloft/Drift stolen data and used Trufflehog for lateral credential discovery. The Crunchyroll breach was carried out by a different actor who contacted BleepingComputer and International Cyber Digest independently. The two incidents are related through the shared Telus Digital environment but are not confirmed to be a single coordinated operation.
Why did Crunchyroll take 11 days to notify users? +
Crunchyroll detected and contained the breach on approximately March 13, 2026, but issued no public statement until March 23 — eleven days later — and only after journalists requested comment following public reporting by International Cyber Digest and BleepingComputer. GDPR requires notification to a supervisory authority within 72 hours of becoming aware of a personal data breach affecting EU residents. As of the publication of this analysis, no direct subscriber notification email had been sent. The company's statements were issued exclusively to media outlets that requested comment.
What is the connection between the Salesloft Drift breach and Crunchyroll? +
The Salesloft Drift breach in August 2025 is the upstream origin of the credential chain that eventually reached Crunchyroll. When UNC6395 compromised Salesloft's GitHub account in March 2025 and used stolen OAuth tokens in August 2025 to access Salesforce data at 700+ organizations, that stolen data included Google Cloud Platform credentials belonging to Telus Digital. ShinyHunters found those credentials, used them to enter Telus Digital's cloud environment, then ran Trufflehog to discover additional credentials and pivot through multiple Telus systems over months. Because Crunchyroll's BPO partner was Telus Digital, the Salesloft breach — with which Crunchyroll had no direct relationship — ultimately enabled the compromise of Crunchyroll's subscriber data through a five-organization credential chain.
What should Crunchyroll users do after this breach? +
Change your Crunchyroll password immediately, and update any other account that shares the same email address and password. Enable two-factor authentication on Crunchyroll and on accounts at other services where you use the same credentials. Monitor bank and credit card statements for unauthorized activity, particularly if you have ever shared payment details in a Crunchyroll support ticket. Be alert to phishing emails referencing your Crunchyroll account — attackers with support ticket content know what shows you have watched and what issues you have raised, which makes social engineering attempts significantly more convincing. Check Have I Been Pwned at haveibeenpwned.com to see whether your email address appears in this or other recent breaches.
What is Trufflehog and how was it used offensively? +
Trufflehog is a legitimate open-source secret scanning tool developed by Truffle Security, widely used by security teams to find exposed credentials in code repositories, cloud storage, and data dumps. Its key differentiator is live credential verification — when it finds an AWS access key, it calls the GetCallerIdentity API to confirm the key is still active before flagging it. ShinyHunters used Trufflehog offensively against the Telus Digital BigQuery data they had downloaded, converting a defensive tool into a credential-sorting mechanism that identified which stolen keys were still valid and immediately exploitable. The same offensive technique appeared in the Shai-Hulud npm worm and the Crimson Collective attack on Red Hat's GitLab repositories during the same period, confirming a broader trend of defenders' tools being weaponized within supply chain operations.

Sources

The following primary and secondary sources were used in the research and writing of this analysis. URLs are provided as plain text for reference.

Primary Sources — Crunchyroll Breach +
  • BleepingComputer — Crunchyroll probes breach after hacker claims to steal 6.8M users' data (Lawrence Abrams, March 23, 2026)
    bleepingcomputer.com
  • TechCrunch — Crunchyroll confirms data breach after hacker claims unauthorized access (Jagmeet Singh, March 24, 2026)
    techcrunch.com
  • TechRadar — Crunchyroll investigating breach which reportedly hit 6.8 million users (Sead Fadilpasic, March 25, 2026)
    techradar.com
  • PCMag — Crunchyroll Investigating Possible Breach Involving 100GB of User Data (Michael Kan, March 2026)
    pcmag.com
  • Polygon — Crunchyroll's data breach is 'limited to customer service ticket data' (March 24, 2026)
    polygon.com
  • CNET — Crunchyroll Responds to Claims of Data Breach (Kourtnee Jackson, March 24, 2026)
    cnet.com
  • Screen Rant — Crunchyroll Officially Responds to Data Breach With New Statement (March 23, 2026)
    screenrant.com
  • Anonhaven — Crunchyroll breached through Telus Digital outsourcer, 100 GB of data reportedly stolen (Adam Bream, March 23, 2026)
    anonhaven.com
Primary Sources — Telus Digital Breach +
  • BleepingComputer — Telus Digital confirms breach after hacker claims 1 petabyte data theft (Lawrence Abrams, March 12, 2026)
    bleepingcomputer.com
  • CBC News — Telus probes cybersecurity incident that ShinyHunters group claims responsibility for (Reuters/CBC, March 12, 2026)
    cbc.ca
  • The Register — Outsourcer Telus admits to attack, possibly by ShinyHunters (Jessica Lyons and Connor Jones, March 15, 2026)
    theregister.com
  • CSO Online — Telus Digital hit with massive data breach (Paul Barker, March 12, 2026)
    csoonline.com
  • Breached.Company — Inside the Telus Digital Breach: How ShinyHunters Stole Nearly 1 Petabyte Through a Single Credential
    breached.company
Primary Sources — Salesloft Drift Breach +
  • Google Cloud Blog / Mandiant — Widespread Data Theft Targets Salesforce Instances via Salesloft Drift (August 26, 2025)
    cloud.google.com
  • The Hacker News — Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data (August 27, 2025)
    thehackernews.com
  • The Hacker News — Salesloft Takes Drift Offline After OAuth Token Theft Hits Hundreds of Organizations (September 3, 2025)
    thehackernews.com
  • Krebs on Security — The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft
    krebsonsecurity.com
  • Unit 42 / Palo Alto Networks — Threat Brief: Salesloft Drift Integration Used To Compromise Salesforce Instances (September 2, 2025)
    unit42.paloaltonetworks.com
  • FINRA — Cybersecurity Alert: Salesloft Drift AI Supply Chain Attack
    finra.org
  • Aviatrix — Salesloft Drift GitHub Breach 2025: Supply-Chain Attack Impacts 22 Companies (January 8, 2026)
    aviatrix.ai
Primary Sources — ShinyHunters and Campaign Context +
  • Google Cloud Blog / Mandiant — Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft (January 31, 2026)
    cloud.google.com
  • The Hacker News — Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms (January 31, 2026)
    thehackernews.com
  • The Register — ShinyHunters claims more high-profile victims in latest Salesforce customers data heist (March 9, 2026)
    theregister.com
  • Google Cloud Blog / Mandiant — M-Trends 2026: Data, Insights, and Strategies From the Frontlines (March 23, 2026)
    cloud.google.com
  • DarkOwl — Actor Spotlight: ShinyHunters (July 11, 2024)
    darkowl.com
  • WIRED — ShinyHunters Is a Hacking Group on a Data Breach Spree (Lily Hay Newman, 2020)
    wired.com
  • Blacksmith Infosec — What the Salesloft Drift Breach Reveals About Trust and Risk (September 17, 2025)
    blacksmithinfosec.com
  • BlackFog — Scattered Spider, Lapsus$, and ShinyHunters Form New Cybercrime Alliance (September 9, 2025)
    blackfog.com
Primary Sources — Trufflehog and Credential Harvesting +
  • Qualys Blog — Cloud Credential Misuse: Detection and Prevention Guide 2026 (February 19, 2026)
    blog.qualys.com
  • Truffle Security — TruffleHog in Your Logs? (Joe Leon, September 17, 2025)
    trufflesecurity.com
  • Expel — Stories from the SOC: The second coming of Shai Hulud (December 23, 2025)
    expel.com
  • GitGuardian — Trivy's March Supply Chain Attack Shows Where Secret Exposure Hurts Most (March 2026)
    blog.gitguardian.com
  • Elastic Security — Credential Access via TruffleHog Execution (detection rule, December 2025)
    elastic.co
  • Cybersecurity News — Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances
    cybersecuritynews.com
Secondary and Contextual Sources +
  • Silverfort — The Salesloft Drift breach: A cross-vendor attack (2025)
    silverfort.com
  • Obsidian Security — BREAKING: UNC6395 — The Biggest SaaS Breach of 2025
    obsidiansecurity.com
  • CBR — Crunchyroll Officially Responds to Report Claiming 100 GB User Data Leak (Leo Reyna, March 23, 2026)
    cbr.com
  • CX Today — Crunchyroll Hack Exposes Customer Support Data in Vendor Security Incident (Nicole Willing, March 25, 2026)
    cxtoday.com
  • Insurance Journal / Reuters — Crunchyroll Probes Breach After Hacker Steals User Data (March 25, 2026)
    insurancejournal.com
  • Logix BPO — TELUS Data Breach Expands to Include Crunchyroll (March 24, 2026)
    logixbpo.com
  • Oasis Security — The Salesloft OAuth compromise: what it changed, and what to do next (Joe Gonzalez, September 2025)
    oasis.security
  • Cybersecurity News — Crunchyroll Data Breach Exposes User Information (March 2026)
    cybersecuritynews.com
— end of briefing — nohacky.com — stay informed, stay protected