Crunchyroll Breach and Interactive Social Engineering Trends [Prime Cyber Insights]

This briefing analyzes the significant supply chain breach affecting anime streaming service Crunchyroll, alongside new data from Mandiant’s M-Trends report regarding the rise of interactive social engineering. Crunchyroll confirmed a data breach involving approximately 6.8 million unique email addresses and 8 million support tickets following a compromise at its third-party service provider, Telus Digital. The incident, which allegedly involved a malware infection on a support agent's workstation and the subsequent compromise of an Okta SSO account, highlights the persistent risk of BPO-related supply chain vulnerabilities. Simultaneously, Google Cloud’s Mandiant researchers report that voice phishing, or vishing, has become the primary initial access vector for cloud environment intrusions. The briefing also covers a critical vulnerability in Microsoft Authenticator (CVE-2026-26123) that allows for 2FA bypass via malicious deep links and the sentencing of Russian initial access broker Aleksei Volkov to 81 months in prison for his role in facilitating millions of dollars in ransomware damages.

[00:00] Announcer: From Neural Newscast, this is Prime Cyber Insights, Intelligence for Defenders, Leaders, and Decision Makers.
[00:11] Aaron Cole: Welcome to Prime Cyber Insights. I'm Aaron Cole.
[00:15] Aaron Cole: We're tracking a significant breakdown in third-party trust as Crunchyroll confirms a multi-million user data breach.
[00:23] Lauren Mitchell: I'm Lauren Mitchell.
[00:24] Lauren Mitchell: TechRadar reports this breach stemmed from a malware infection on a support agent's workstation at Telus Digital, leading to the compromise of an Okta SSO account.
[00:37] Aaron Cole: Lauren, the scale is concerning.
[00:39] Aaron Cole: We are looking at roughly 8 million support tickets and 6.8 million unique email addresses
[00:45] Aaron Cole: exfiltrated from Zendesk.
[00:48] Aaron Cole: The adversary allegedly maintained access for 24 hours and demanded a $5 million ransom.
[00:55] Lauren Mitchell: It is a classic supply chain failure, Aaron.
[00:58] Lauren Mitchell: Beyond email addresses, the data includes IP addresses, geographic locations, and internal Slack communications.
[01:06] Lauren Mitchell: This aligns with findings in Google's latest Mtrends report.
[01:10] Aaron Cole: The report highlights that voice phishing or vishing is now the primary initial access method for cloud environments.
[01:18] Aaron Cole: Attackers are socially engineering IT helpdesks to reset MFA devices.
[01:24] Lauren Mitchell: Persistence is the other half of the story.
[01:27] Lauren Mitchell: Mandiant identifies a trend they call living on the edge,
[01:31] Lauren Mitchell: where groups like UNC 6201 utilize backdoors
[01:35] Lauren Mitchell: like brick storm on firewalls and routers.
[01:38] Lauren Mitchell: In some instances, they have maintained access for nearly 400 days.
[01:43] Aaron Cole: That shift toward edge device exploitation makes the discovery of CVE-2026233 in Microsoft Authenticator even more critical.
[01:55] Aaron Cole: Malwarebytes recently interviewed researcher Khalid Muhammad, who discovered the vulnerability.
[02:01] Lauren Mitchell: The vulnerability allowed a malicious app on a mobile device to intercept QR code sign-in flows.
[02:08] Lauren Mitchell: If an agent scanned a legitimate code, the malicious app could hijack the deep link and take over the account, bypassing 2FA.
[02:17] Lauren Mitchell: Microsoft released a patch for this earlier this month.
[02:20] Aaron Cole: On the legal front, the register reports that Russian initial access broker Alexei Volkov was sentenced to 81 months in prison yesterday, March 24th.
[02:30] Lauren Mitchell: Volkov was a key enabler for the Yang-Low Wang Ransomware Group.
[02:35] Lauren Mitchell: His role in selling network access resulted in approximately $9 million in losses.
[02:41] Lauren Mitchell: It represents significant success for cross-border enforcement.
[02:45] Aaron Cole: It underscores that these specialists are as critical as the ransomware crews themselves.
[02:50] Aaron Cole: For practitioners, the priority remains, harden help desk protocols and monitor edge devices.
[02:57] Aaron Cole: I'm Aaron Cole.
[02:59] Lauren Mitchell: And I'm Lauren Mitchell.
[03:00] Lauren Mitchell: Thank you for joining us.
[03:02] Lauren Mitchell: For the full briefing and technical breakdown, visit pci.neuralnewscast.com.
[03:08] Lauren Mitchell: Stay resilient.
[03:09] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed.
[03:13] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com.
[03:17] Announcer: This has been Prime Cyber Insights on Neural Newscast.
[03:21] Announcer: Intelligence for defenders, leaders, and decision makers.

Crunchyroll Breach and Interactive Social Engineering Trends [Prime Cyber Insights]
Broadcast by