Regional Cloud Gaming Breach Exposes User Data in Armenia


NVIDIA Confirms Limited Exposure Affecting GeForce NOW Partner Infrastructure

NVIDIA has confirmed that a data breach involving user information affected systems operated by a regional GeForce NOW partner in Armenia rather than the company’s primary global infrastructure.


The incident surfaced after threat actors claiming affiliation with the ShinyHunters cybercrime brand advertised an alleged database of GeForce NOW users for sale on underground forums.


Company Says Core NVIDIA Systems Were Not Compromised


Breach Linked to Third-Party Alliance Partner

According to NVIDIA, the compromise was limited to infrastructure operated by GFN.am, an Armenian GeForce NOW Alliance provider. The company stated that its internally managed services and core NVIDIA systems were not impacted.


Regional Users Most Likely Affected

The exposure primarily impacts users registered through the Armenian GeForce NOW partner platform rather than the broader global GeForce NOW user base.


Stolen Information Allegedly Includes Personal User Records


Threat Actors Claimed Access to Large Database

The attackers alleged they obtained extensive user information, including:


- Full names
- Email addresses
- Usernames
- Dates of birth
- Membership status
- Two-factor authentication metadata


The database was reportedly offered for sale for approximately $100,000 in cryptocurrency on cybercrime forums.


Passwords Reportedly Not Exposed

Despite the scale of the claims, NVIDIA and regional provider GFN.am indicated that passwords were not compromised during thep incident.
However, cybersecurity experts warn that exposed email addresses and account metadata may still increase phishing and social engineering risks for affected users.


Cybercriminal Branding Adds Confusion


Questions Around ShinyHunters Attribution

Researchers noted uncertainty surrounding the authenticity of the actors using the ShinyHunters name. Some analysts believe the forum account may belong to an impersonator rather than the original group associated with previous high-profile breaches.


Leak Forums Continue Driving Extortion Campaigns

Even without confirmed attribution, the incident reflects a broader trend in which threat actors use underground forums to pressure victims, sell stolen data, and amplify public attention around breaches.


Third-Party Providers Increasingly Under Scrutiny


Supply Chain Risks Extend Beyond Core Infrastructure

The breach highlights the growing cybersecurity risks tied to regional partners and third-party service operators. While major companies may maintain strong internal defenses, weaker external providers can still become entry points for attackers.


Cloud Gaming Ecosystems Depend on Distributed Operations

Services like GeForce NOW often rely on local alliance partners to operate infrastructure in specific regions, creating additional complexity in maintaining consistent security standards worldwide.


Recommendations for Potentially Affected Users


Monitor Accounts for Suspicious Activity

Users associated with GFN.am are being encouraged to remain alert for phishing attempts, suspicious emails, or unusual login activity.


Enable Strong Authentication Protections

Although passwords were reportedly not exposed, enabling or maintaining multi-factor authentication remains an important defensive measure.