Cybersecurity2 hrs ago

GFN.AM breach exposes pre‑March 2026 GeForce NOW user data

Unauthorized access to GFN.AM's database from March to May 2026 leaked emails, phone numbers and names of early GeForce NOW users.

Peter Olaleru/3 min/GB

Cybersecurity Editor

TweetLinkedIn
GFN.AM breach exposes pre‑March 2026 GeForce NOW user data
Source: PlayOriginal source

GFN.AM’s database was accessed without permission from March 9 to early May 2026, exposing personal details of users who signed up before that date.

Context GFN.AM, the UK‑based provider for NVIDIA’s GeForce NOW cloud gaming service, announced the breach on May 5, 2026. The company detected the intrusion on May 2, revealing a 54‑day window during which attackers could view or copy data.

Key Facts - Unauthorized entry began on March 9, 2026 and persisted for roughly two months before discovery. - The compromised backend database contained email addresses, phone numbers (for mobile‑operator registrations), dates of birth, full names of Google Sign‑In users, and GFN.AM usernames. - Only accounts created on or before March 9 were affected; newer registrations remain untouched. - Passwords were not part of the leaked fields, limiting immediate credential‑theft risk. - No technical details on the entry method—such as a stolen credential, unpatched CVE, or misconfiguration—were disclosed.

What It Means The exposed data set is valuable for phishing, SIM‑swap and broader social‑engineering attacks. Attackers can combine email, phone number and name to craft convincing messages that bypass basic security checks. Users who logged in via Google should audit their Google account activity, as their full names were among the leaked items.

Mitigations – What Defenders Should Do 1. Patch and harden any database‑exposure vectors; review firewall rules and enforce least‑privilege access for backend services. 2. Deploy detection signatures for abnormal database queries and exfiltration patterns, referencing MITRE ATT&CK technique T1041 (Exfiltration Over Command‑and‑Control Channel). 3. Enable multi‑factor authentication (MFA) on all linked accounts, especially Google and email services, to block credential‑stuffing attempts. 4. Monitor for credential‑reuse across other services; encourage users to change passwords where the same email appears. 5. Alert users to watch for unsolicited calls or SMS referencing GFN.AM and to place fraud alerts with banks if additional personal data is suspected. 6. Conduct a post‑mortem to identify the root cause—whether a compromised credential, CVE‑related flaw, or misconfiguration—and apply remediation.

Security teams should treat supplier‑side breaches as a reminder to audit third‑party access regularly. The next step will be watching for any follow‑up disclosures from GFN.AM or regulatory filings that could reveal the attack’s origin and further mitigation guidance.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...