NVIDIA Confirms GeForce NOW Data Breach Exposes Armenian Users’ PII
NVIDIA confirms a breach at partner GFN.am exposed names, emails, birth dates and phone numbers of Armenian GeForce NOW users. No passwords or payment data were taken.

TL;DR
NVIDIA confirmed that a breach of its Armenian partner GFN.am exposed personal data of GeForce NOW users, but no passwords or payment information were taken.
Context On May 8, 2026 NVIDIA announced a security incident affecting its cloud‑gaming service in Armenia. The compromised system belonged to GFN.am, a regional alliance partner that runs the GeForce NOW platform locally. The breach was isolated to GFN.am’s infrastructure; NVIDIA’s global network remained untouched.
Key Facts - The intrusion occurred between March 20 and March 26, 2026. - Exposed records include full names (for Google‑authenticated accounts), email addresses, usernames, dates of birth and phone numbers (for mobile‑operator registrations). - Users who signed up after March 9, 2026, are not affected. - No authentication credentials, passwords or payment card data were compromised. - The attacker claimed affiliation with the “ShinyHunters” group on a hacker forum, but technical evidence linking the real group is lacking. - MITRE ATT&CK analysis maps the activity to the “Trusted Relationship” technique (T1199), where attackers exploit the trust between a vendor and its third‑party provider, and to data‑collection (T1213) and exfiltration over web services (T1567). - The breach is confined to Armenian users; no spillover to other countries served by GFN.am (Azerbaijan, Georgia, Kazakhstan, Moldova, Ukraine, Uzbekistan) has been observed.
What It Means The leaked data raises the risk of targeted phishing, SIM‑swap fraud and identity‑theft scams for the affected users. Because passwords and payment details remain secure, the immediate financial threat is limited, but attackers can leverage the personal identifiers to craft convincing social‑engineering attacks. The incident underscores the security challenges of multi‑vendor ecosystems, where a partner’s weakness can expose a vendor’s customer base.
Mitigations - For users: Enable two‑factor authentication on linked Google accounts, monitor email and phone activity for unexpected messages, and consider credit‑monitoring services. - For defenders: Review and tighten access controls for third‑party integrations, enforce least‑privilege principles, and implement continuous monitoring for anomalous data‑exfiltration patterns (e.g., large outbound transfers over HTTP/HTTPS). - For partners: Conduct regular security assessments of partner environments, apply patch management promptly, and adopt zero‑trust network segmentation to limit lateral movement. - Detection: Deploy signatures for MITRE ATT&CK T1199 and T1213 behaviors, and configure alerts for bulk data queries from authentication databases.
Looking Ahead Watch for any follow‑up disclosures from NVIDIA or GFN.am regarding remediation steps and for evidence of the stolen database being used in phishing campaigns targeting Armenian gamers.
Continue reading
More in this thread
Identity Fraud Losses Hit $27.3 Billion in 2025 as Breaches Reach Record Levels
Peter Olaleru
Identity Fraud Losses Hit $27.3 B in 2025 After Record Healthcare Breach
Peter Olaleru
Instructure CEO Steve Daly apologizes for communication gaps after Canvas cyberattack exposes user data
Peter Olaleru
Conversation
Reader notes
Loading comments...