ShinyHunters Claims NVIDIA GeForce NOW User Data Leak Amid Corporate Silence
ShinyHunters posted a dark‑web listing alleging theft of NVIDIA GeForce NOW user data; NVIDIA has not confirmed a breach. Learn the impact and mitigations.
TL;DR
– The cybercrime group ShinyHunters announced on a dark‑web forum that it stole a database of NVIDIA GeForce NOW users, but NVIDIA’s public channels show no evidence of a breach.
### Context During the week of May 2 2026, ShinyHunters uploaded a listing on a well‑known cybercrime forum. The post included sample records and claimed the dataset contained full names, usernames, verified email addresses, dates of birth, membership status, subscription tier, and flags indicating whether two‑factor authentication (2FA) or time‑based one‑time passwords (TOTP) were enabled. No record count, price, or forum name was disclosed.
### Key Facts - Alleged data fields: The claimed dump is unusually granular, exposing personal identifiers and internal account attributes that could aid credential‑stuffing attacks. - NVIDIA’s response: The GeForce NOW status page on May 2 listed only a queue‑time issue in India and a Call of Duty maintenance notice. No security incident, breach advisory, or PSIRT (Product Security Incident Response Team) bulletin referenced the alleged leak. - Threat actor profile: ShinyHunters has been active since 2019, known for exploiting misconfigured Salesforce Experience Cloud endpoints and for voice‑phishing campaigns that impersonate IT support. Law enforcement disrupted part of the group in mid‑2025, but the collective continues to publish data sales. - Potential impact: If the data is authentic, attackers could combine the personal identifiers with the 2FA enrollment flag to target accounts that lack multi‑factor protection, increasing the risk of unauthorized access and subscription fraud.
### What It Means The lack of an official acknowledgment leaves security teams in a gray area. Even without confirmation, the presence of verified emails and birth dates makes the dataset valuable for phishing and credential‑stuffing. The 2FA flag further narrows the attack surface, allowing threat actors to prioritize accounts without additional protection.
### Mitigations – What Defenders Should Do 1. Force password rotation for all GeForce NOW accounts and enforce a minimum password complexity policy. 2. Enable multi‑factor authentication on NVIDIA accounts; if already enabled, consider switching to a hardware token or authenticator app to mitigate reliance on SMS codes. 3. Monitor login anomalies using NVIDIA’s security alerts or third‑party SIEM (Security Information and Event Management) tools; flag attempts from unusual geolocations or IP ranges. 4. Educate users about phishing that references GeForce NOW membership tiers or renewal notices, especially voice calls claiming to be from NVIDIA support. 5. Apply network‑level throttling for repeated failed login attempts to deter credential‑stuffing bots. 6. Review Salesforce Experience Cloud configurations if your organization uses the same platform, ensuring guest‑user access to the `/s/sfsites/aura` API endpoint is locked down (refer to CVE‑2025‑XXXX for similar misconfigurations).
### Looking Ahead Watch for any future NVIDIA security bulletins, dark‑web chatter confirming the dataset’s authenticity, and updates on ShinyHunters’ activity targeting cloud‑based gaming services.
Continue reading
More in this thread
Instructure Canvas Breach Exposes Hundreds of Millions of User Records, ShinyHunters Claims
Peter Olaleru
ShinyHunters Claims 275 Million Canvas Users Exposed in Instructure Breach
Peter Olaleru
ShinyHunters Claims 275 Million User Records Stolen in Instructure Canvas Breach
Peter Olaleru
Conversation
Reader notes
Loading comments...