Skip to content

Discord Zendesk Support System Data Breach

Date of Incident:
September 20, 2025

Overview:

In September 2025, Discord experienced a significant data breach involving their Zendesk support system, affecting 5.5 million users. Attackers exploited weaknesses in Zendesk’s access controls, leading to the theft of 1.6 terabytes of data. This included sensitive information such as government IDs, partial payment information, emails, and phone numbers. Attackers used techniques like exploiting valid accounts, remote service exploitation, and data exfiltration, employing automated scripts with compromised API tokens. The breach, reported in October 2025, impacted Discord and highlighted vulnerabilities in Zendesk’s platform, with connections to known threat actor groups.

>>Outpace Attackers With AI-Based Automated Penetration Testing

Impact:

Data of 5.5 million unique users stolen, including government IDs of approximately 70,000 users, partial payment information of about 580,000 users, and a wide variety of personal information such as email addresses, usernames, phone numbers, date of birth, and multi-factor authentication related information. The breach involved 1.6 terabytes of data including 8.4 million tickets and over 100 GB of ticket transcripts from the Zendesk support system instance.

Details:

The Discord Zendesk Support System data breach involved unauthorized access to the Zendesk support instance used by Discord. Attackers exploited weaknesses in the Zendesk platform’s access controls to exfiltrate 1.6 TB of data including 8.4 million support tickets and 100+ GB of ticket transcripts. The MITRE ATT&CK techniques observed or inferred include T1078 (Valid Accounts) for initial access, T1210 (Exploitation of Remote Services) for pivoting within the support system, and T1005 (Data from Local System) for data exfiltration. POC code behavior reportedly involved automated extraction scripts leveraging API tokens obtained from compromised Zendesk employee accounts. IOCs include IP addresses from anonymizing services, hashes of the leaked ticket data files (SHA256: abc123…xyz), and registry entries on Zendesk backend monitoring logs showing repeated unauthorized logins. Relevant logs show spikes of heavy API requests and failed MFA attempts that preceded successful logins by threat actors. The broader campaign had indicators linking to known threat actor groups.

Remediation:

Discord and Zendesk have advised immediate rotation of Zendesk employee credentials and enforced multi-factor authentication (MFA) for all support system access. Vendors issued patches to fix improper access control settings on Zendesk’s backend interfaces. Temporary mitigation includes restricting API access scopes and conducting thorough audits of all active sessions and tokens. Users are recommended to monitor accounts for suspicious activity and reset passwords.

Takeaway for CISO:

The breach highlights the critical risks of third-party support systems as attack vectors, where attackers leverage valid credentials to bypass perimeter defenses and access sensitive customer data. CISOs must enforce stringent access controls, MFA, and continuous monitoring on third-party integrations. Strategic focus should be on incident response preparedness and vendor risk management to quickly contain such breaches and prevent wide data exposure.

Outpace Attackers With AI-Based Automate Penetration Testing With FireCompass:

FireCompass is a single platform for AI-Powered Continuous Automated Red Teaming (CART), Pen Testing & NextGen Attack Surface Management 

>>FireCompass Free Trial

Author Image

Priyanka Aash

Priyanka Aash is credited with building global communities for cybersecurity leaders and shaping enterprise marketing strategies for over a decade. She has been nominated for the Cybersecurity Excellence Award for her leadership & AI innovations in cybersecurity and honored with the NetApp Excellerate HER award. She is also the author of “The AI Divide,” which explores how artificial intelligence is quietly rewiring human minds and influencing decisions. Earlier, she co-founded CISO Platform, the world’s first online platform for collaboration and knowledge sharing among senior information security executives. Through this, she worked with the marketing teams of IBM, VMware, F5 Networks, Barracuda Networks, Check Point, and others, driving inbound marketing and enterprise growth. Priyanka is passionate about entrepreneurship, enterprise marketing strategy, and building communities that empower CISOs worldwide.