
NVIDIA has confirmed in a press release for BleepingComputer that GeForce NOW consumer data has been uncovered in a knowledge breach.
The gaming and {hardware} large has clarified that the affect is restricted to Armenia, and was brought on by a compromise of the infrastructure operated by a regional associate.
The corporate added that its personal community was not impacted by the incident.
“Our investigation discovered no affect on NVIDIA-operated companies. The difficulty is restricted to methods run by a third-party GeForce NOW Alliance associate based mostly in Armenia. We’re working carefully with the associate to help their investigation and backbone. Impacted customers can be notified by GFN.am,” the corporate stated.
The assertion is available in response to a publish final week on a hacker discussion board from a menace actor utilizing the ShinyHunters nickname, claiming to have breached the GeForce NOW service and stolen tens of millions of consumer information.
Nonetheless, the ShinyHunters actor who revealed the breach on the hacker discussion board is believed to be an imposter.
Based on the menace actor, the stolen data consists of full names, electronic mail addresses, usernames, dates of beginning, membership standing, and 2FA/TOTP standing.
The menace actor additionally posted samples of the stolen information and provided the complete database for $100,000 paid in Bitcoin or Monero.
The NVIDIA GeForce NOW cloud gaming service lets customers stream to their methods video games working on extra highly effective {hardware} utilizing NVIDIA GPUs in a datacenter.
GFN.am is the Armenian regional operator for GeForce NOW, answerable for working NVIDIA’s service within the nation.
Alliance associate environments can function impartial authentication methods, native buyer databases, regional billing platforms, and domestically managed infrastructure.
A assertion posted by GFN.am confirms a cybersecurity incident that occurred between March 20 and 26 and uncovered the next data:
- Full title (if utilizing a Google account)
- E-mail tackle
- Telephone quantity (if registered by means of a cellular operator)
- Date of beginning
- Username
GFN.am has clarified that no account passwords have been uncovered within the incident, and any customers who registered to the service after March 9 are usually not impacted.
Based on NVIDIA’s assist web page, GFN.am can also be answerable for managing GeForce NOW operations in Azerbaijan, Georgia, Kazakhstan, Moldova, Ukraine, and Uzbekistan, however no affect on these international locations has been confirmed.
BleepingComputer discovered that the menace actor’s publish has now been faraway from the hacker discussion board.
It’s unclear if the database has been offered to a purchaser or if the vendor or discussion board directors deleted it.
Replace [14:14]: Added data that the menace actor could also be a ShinyHunters impersonator.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Autonomous Validation Summit (Might 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.

