Crunchyroll Breach Exposes 1.2M User Records
In March 2026, the anime streaming service Crunchyroll suffered a data breach alleged to have impacted 6.8M users . The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the conten...
Overview
In March 2026, the popular anime streaming service Crunchyroll suffered a significant data breach. The incident, which involved the company’s Zendesk customer support system, initially suggested a potential impact on 6.8 million users. A confirmed subset of over 1.19 million user records, including sensitive support ticket contents, has since been verified and added to the Have I Been Pwned notification service.
What Was Exposed
The breach exposed a range of personal data extracted from user interactions with Crunchyroll’s support team. For the 1.2 million verified accounts, the compromised information includes:
- Email Addresses & Names: Your primary contact information and identity.
- IP Addresses & Geographic Locations: Data that can pinpoint your approximate physical location and internet service provider.
- Support Ticket Contents: The full text of any messages you sent to Crunchyroll support, which could include detailed account issues, personal complaints, or other private information shared in confidence.
Potential Impact
The combination of exposed data creates a high-severity risk. While financial data was not involved, the information is a goldmine for targeted phishing attacks. Criminals can use your name, email, and specific details from your support tickets to craft highly convincing “Crunchyroll” scam emails, increasing the chance you’ll click malicious links or divulge passwords. Your IP address and location can also be used for broader digital profiling or targeted harassment.
Recommendations
If you have ever contacted Crunchyroll support, take these steps immediately:
- Change Your Crunchyroll Password: Immediately update your password on the Crunchyroll website and app. Use a strong, unique password you don’t use anywhere else.
- Enable Two-Factor Authentication (2FA): If Crunchyroll offers 2FA, activate it now. This adds a critical second layer of security to your account.
- Beware of Targeted Phishing: Be extremely cautious of any emails claiming to be from Crunchyroll, especially those referencing past support issues. Do not click links or download attachments. Go directly to the official website to manage your account.
- Monitor Other Accounts: If you reused your Crunchyroll password elsewhere, change it on those sites immediately, starting with email and financial services.
How to Check If You’re Affected
The simplest way to check if your data was part of this breach is to visit the Have I Been Pwned (HIBP) website. Go to haveibeenpwned.com and enter your email address. The service will tell you if your information was found in the Crunchyroll breach dataset. You can view the specific breach entry here: https://haveibeenpwned.com/Breach/Crunchyroll.
Security Insight
This breach highlights the critical but often overlooked risk posed by third-party support systems like Zendesk. Companies must ensure these integrated platforms have security standards matching their own. The exposure of full support ticket conversations is particularly damaging, turning a routine customer service interaction into a serious privacy violation. For more on evolving digital threats, follow our cybersecurity news coverage.
Further Reading
Investigate Breaches Safely with NordVPN
Researching exposed data, paste sites, or threat actor infrastructure? Route your OSINT traffic through a VPN to avoid attribution and keep your investigation IP separate from your corporate network.
Get NordVPN for ResearchAffiliate link — we may earn a commission at no extra cost to you.
Never miss a data breach report
Get real-time security alerts delivered to your preferred platform.
Related Breach Reports
In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak . The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M uniqu...
In March 2026, Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service,...
In February, the AI-powered comic generation platform KomikoAI suffered a data breach . The incident exposed 1M unique email addresses along with names, user posts and the AI prompts used to generate content. The exposed data enables the mapping of individual AI prompts to specific email addresses.
In February 2026, Dutch telco Odido was the victim of a data breach and subsequent extortion attempt . Following the incident, 1M records containing 317k unique email addresses were published, with the attackers threatening to leak additional data in the following days. That threat was subsequently ...