5.5 million users
Discord has confirmed a limited data breach stemming from a security incident at a third-party support vendor, identified as Zendesk. While Discord states passwords and authentication tokens were not exposed, threat actors claim to have accessed the data of 5.5 million users, including emails, IP addresses, and the content of support tickets. This incident primarily affects users who have interacted with Discord's Trust & Safety or other support services. The breach underscores the significant risks posed by third-party vendors and the importance of robust supply chain security management. Discord has revoked the vendor's access and is notifying affected users.
The breach was not a direct compromise of Discord's core infrastructure but a supply chain attack targeting one of its vendors. Threat actors gained unauthorized access to Discord's Zendesk customer support portal. By compromising this third-party platform, the attackers were able to access and exfiltrate data associated with user support requests. The exposed data includes personally identifiable information (PII) such as usernames and email addresses, as well as potentially sensitive conversations contained within support tickets. The attackers' claim of 5.5 million affected users, if accurate, represents a significant data leak that could be leveraged for targeted phishing campaigns, social engineering, and other malicious activities.
The attack vector was the compromise of a trusted third-party relationship, a common tactic for bypassing an organization's primary security controls. The threat actors likely gained access to Discord's Zendesk instance through stolen credentials or by exploiting a vulnerability in the vendor's environment, though Zendesk denies the latter.
T1199 - Trusted Relationship: The attackers exploited the trusted relationship between Discord and its support vendor, Zendesk, to gain access to user data.T1078 - Valid Accounts: The compromise likely involved the use of legitimate, albeit stolen, credentials for the third-party support platform.T1005 - Data from Local System: Attackers accessed and collected data stored within the Zendesk support portal, including support tickets and associated user information.T1041 - Exfiltration Over C2 Channel: The stolen data was exfiltrated from the compromised support environment to attacker-controlled infrastructure.The primary impact on affected users is an increased risk of targeted phishing and social engineering attacks. With access to email addresses and the context of past support tickets, attackers can craft highly convincing fraudulent communications pretending to be from Discord support. This could lead to account takeovers if users are tricked into revealing their passwords or clicking on malicious links. For Discord, the incident carries reputational damage and erodes user trust, despite the breach originating from a third party. It also highlights operational dependencies and risks that require significant resources to investigate and remediate.
Organizations should monitor for signs of compromised third-party accounts:
| Type | Value | Description |
|---|---|---|
| log_source | Zendesk Audit Logs |
Monitor for anomalous login locations, times, or IP addresses for support agent accounts. |
| log_source | Cloud Access Security Broker (CASB) Logs |
Look for unusual data access patterns or large data downloads from sanctioned cloud applications like Zendesk. |
| network_traffic_pattern | Unusual API activity |
Monitor API calls to and from third-party platforms for excessive data retrieval or unusual user agent strings. |
Detecting this type of breach requires visibility into the activity of third-party services.
Response actions should include immediate revocation of the compromised account's access, initiation of a forensic investigation with the third-party vendor, and prompt notification to affected users with clear guidance on how to protect themselves.
Strengthening security against third-party risks requires a multi-layered approach.
Enforcing MFA on all third-party service accounts significantly reduces the risk of compromise via stolen credentials.
Mapped D3FEND Techniques:
Implement the principle of least privilege for vendor accounts, ensuring they only have access to the data necessary for their function.
Organizations must enforce Multi-factor Authentication (MFA) on all accounts accessing third-party services like Zendesk, especially those with access to sensitive customer data. For this specific Discord incident, had MFA been enforced on the vendor's support accounts, a simple credential compromise would have been insufficient for attackers to gain access. Implementation should prioritize strong MFA methods such as FIDO2 security keys or time-based one-time password (TOTP) apps over less secure methods like SMS. This policy should be contractually mandated for all third-party vendors and regularly audited for compliance. Deploying a Single Sign-On (SSO) solution with conditional access policies can further strengthen this control by restricting access based on location, device health, and time of day, providing a robust defense against unauthorized access to critical cloud-based support portals.
To mitigate the impact of a third-party breach like the one affecting Discord, organizations must strictly enforce the principle of least privilege through robust User Account Permissions. Within the Zendesk platform, Discord should have configured roles that limit vendor access to only the specific data and functions required for their job. For example, access to view or export bulk user data should be highly restricted or disabled entirely for standard support roles. Regular access reviews, conducted quarterly, are essential to identify and remove excessive permissions. By minimizing the access scope of each vendor account, the potential 'blast radius' of a single account compromise is significantly reduced, preventing attackers from accessing a large dataset of 5.5 million users.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats