NVIDIA has confirmed in an announcement for BleepingComputer that GeForce NOW person info has been uncovered in an information breach.
The gaming and {hardware} large has clarified that the impression is proscribed to Armenia, and was attributable to a compromise of the infrastructure operated by a regional associate.
The corporate added that its personal community was not impacted by the incident.
“Our investigation discovered no impression on NVIDIA-operated providers. The difficulty is proscribed to techniques run by a third-party GeForce NOW Alliance associate based mostly in Armenia. We’re working carefully with the associate to assist their investigation and backbone. Impacted customers will likely be notified by GFN.am,” the corporate mentioned.
The assertion is available in response to a publish final week on a hacker discussion board from a risk actor utilizing the ShinyHunters nickname, claiming to have breached the GeForce NOW service and stolen tens of millions of person information.
Nevertheless, the ShinyHunters actor who revealed the breach on the hacker discussion board is believed to be an imposter.
In response to the risk actor, the stolen info consists of full names, e mail addresses, usernames, dates of beginning, membership standing, and 2FA/TOTP standing.
The risk actor additionally posted samples of the stolen information and supplied the complete database for $100,000 paid in Bitcoin or Monero.
The NVIDIA GeForce NOW cloud gaming service lets customers stream to their techniques video games operating on extra highly effective {hardware} utilizing NVIDIA GPUs in a datacenter.
GFN.am is the Armenian regional operator for GeForce NOW, chargeable for working NVIDIA’s service within the nation.
Alliance associate environments can function impartial authentication techniques, native buyer databases, regional billing platforms, and domestically managed infrastructure.
A assertion posted by GFN.am confirms a cybersecurity incident that happened between March 20 and 26 and uncovered the next info:
- Full title (if utilizing a Google account)
- E-mail tackle
- Telephone quantity (if registered by means of a cell operator)
- Date of beginning
- Username
GFN.am has clarified that no account passwords had been uncovered within the incident, and any customers who registered to the service after March 9 usually are not impacted.
In response to NVIDIA’s assist web page, GFN.am can also be chargeable for managing GeForce NOW operations in Azerbaijan, Georgia, Kazakhstan, Moldova, Ukraine, and Uzbekistan, however no impression on these nations has been confirmed.
BleepingComputer discovered that the risk actor’s publish has now been faraway from the hacker discussion board.
It’s unclear if the database has been bought to a purchaser or if the vendor or discussion board directors deleted it.
Replace [14:14]: Added info that the risk actor could also be a ShinyHunters impersonator.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Autonomous Validation Summit (Could 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.

