
NVIDIA has confirmed in a press release for BleepingComputer that GeForce NOW person info has been uncovered in an information breach.
The gaming and {hardware} large has clarified that the impression is proscribed to Armenia, and was attributable to a compromise of the infrastructure operated by a regional companion.
The corporate added that its personal community was not impacted by the incident.
“Our investigation discovered no impression on NVIDIA-operated companies. The difficulty is proscribed to techniques run by a third-party GeForce NOW Alliance companion primarily based in Armenia. We’re working intently with the companion to help their investigation and determination. Impacted customers will probably be notified by GFN.am,” the corporate stated.
The assertion is available in response to a put up final week on a hacker discussion board from a risk actor utilizing the ShinyHunters nickname, claiming to have breached the GeForce NOW service and stolen hundreds of thousands of person information.
Nevertheless, the ShinyHunters actor who printed the breach on the hacker discussion board is believed to be an imposter.
In line with the risk actor, the stolen info consists of full names, e-mail addresses, usernames, dates of delivery, membership standing, and 2FA/TOTP standing.
The risk actor additionally posted samples of the stolen information and supplied the complete database for $100,000 paid in Bitcoin or Monero.
The NVIDIA GeForce NOW cloud gaming service lets customers stream to their techniques video games working on extra highly effective {hardware} utilizing NVIDIA GPUs in a datacenter.
GFN.am is the Armenian regional operator for GeForce NOW, accountable for working NVIDIA’s service within the nation.
Alliance companion environments can function impartial authentication techniques, native buyer databases, regional billing platforms, and domestically managed infrastructure.
A assertion posted by GFN.am confirms a cybersecurity incident that came about between March 20 and 26 and uncovered the next info:
- Full identify (if utilizing a Google account)
- E mail tackle
- Cellphone quantity (if registered by way of a cell operator)
- Date of delivery
- Username
GFN.am has clarified that no account passwords had been uncovered within the incident, and any customers who registered to the service after March 9 should not impacted.
In line with NVIDIA’s assist web page, GFN.am can be accountable for managing GeForce NOW operations in Azerbaijan, Georgia, Kazakhstan, Moldova, Ukraine, and Uzbekistan, however no impression on these international locations has been confirmed.
BleepingComputer discovered that the risk actor’s put up has now been faraway from the hacker discussion board.
It’s unclear if the database has been bought to a purchaser or if the vendor or discussion board directors deleted it.
Replace [14:14]: Added info that the risk actor could also be a ShinyHunters impersonator.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Autonomous Validation Summit (Might 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.

