Back to Exposure Report
User database May 14, 2026 Cloud Gaming Platform

NVIDIA GeForce NOW Alliance Partner (Armenia)

ShinyHunters compromised an NVIDIA GeForce NOW Alliance Partner in Armenia. User database exposed including authentication details, 2FA status, and membership information for cloud gaming customers.

First namesEmail addressesNicknamesUsernamesDates of birthMembership detailsTwo-factor authentication statusInternal roles
1

What happened?

In May 2026, ShinyHunters breached an NVIDIA GeForce NOW Alliance Partner operating in Armenia. GeForce NOW delivers cloud gaming through regional partners who manage local infrastructure and customer relationships. The attackers compromised the partner's user database and authentication systems, exfiltrating customer account information including two-factor authentication status and internal role assignments.

2

What data was actually inside?

First names, email addresses, usernames, and nicknames tied to GeForce NOW accounts. Dates of birth used for age verification and account recovery. Membership details showing subscription tiers, payment status, and service access levels. Two-factor authentication status revealing which accounts have 2FA enabled and which rely on password-only protection. Internal role designations identifying administrator accounts and privileged users.

The 2FA status field is particularly valuable to attackers. It's a target prioritization list—accounts without two-factor authentication are easier to compromise through credential stuffing. Combined with email addresses and usernames, attackers know exactly which accounts to target first and which require more sophisticated bypass techniques.

3

Who gets hurt and how?

GeForce NOW users in Armenia and potentially broader regions served by the compromised partner now have their account information and security posture exposed. Email addresses enable phishing campaigns targeting gamers with fake NVIDIA security notifications or subscription offers. Dates of birth combined with names aid identity verification bypass for account takeovers.

Users who reuse passwords across services face credential stuffing attacks. Attackers will test every email and username combination from this breach against other gaming platforms, email providers, and financial services. The 2FA status tells them which targets are worth the effort—accounts without two-factor authentication fall quickly to automated credential testing.

4

What did they think they were doing right?

NVIDIA partners with regional Alliance Partners to deliver GeForce NOW in markets worldwide. These partners operate local infrastructure, handle customer support, and manage user accounts under NVIDIA's technical framework. The Alliance Partner model enables global reach while allowing regional operators to manage customer relationships.

The compromised partner stored 2FA status in their user database—evidence they were tracking security settings and potentially encouraging adoption of two-factor authentication. Internal role fields suggest role-based access control for administrative functions. These are security-conscious database design choices. But security metadata becomes attack intelligence when the database itself is compromised.

5

What did they not know about their own data?

Alliance Partners inherit customer data from NVIDIA's global platform while managing local accounts and regional operations. The user database contained authentication status, role assignments, and membership information—operational data the partner needed for service delivery. But the same database that enables customer management also creates a complete map of account security for attackers.

The presence of 2FA status fields raises data minimization questions. Did the partner need to store which specific accounts had two-factor authentication enabled in a queryable database field? Or could that information have been stored in the authentication system itself, separated from the main user database? The breach exposed not just who the customers are, but which ones are vulnerable.

If your business runs on databases, you probably have similar records—customer data, credentials, financial information. Do you know what's actually in yours?

6

What does attribution look like the morning after?

ShinyHunters added another gaming platform breach to their portfolio. The Armenia-based Alliance Partner must notify affected users that their account information and security settings are now public. NVIDIA faces questions about Alliance Partner security requirements, oversight, and data protection standards. Users receive notification letters weeks after attackers have already begun credential stuffing campaigns.

For users, the breach creates ongoing account security risk. Even those with strong passwords and two-factor authentication enabled now appear in attacker databases as GeForce NOW customers. Their email addresses will be targeted with gaming-themed phishing campaigns. Their usernames will be tested across other platforms. The exposure is permanent, but the security response expires when the free credit monitoring period ends.

7

What would have changed the outcome?

Recognizing that 2FA status is security intelligence and separating it from the main user database accessible to attackers.

An organization that inventoried its user database would have identified the 2FA status field as sensitive security metadata. They could have moved authentication details to a separate, more heavily protected system. Access controls could have limited which applications and users could query security settings. Even if attackers compromised the main user database, they wouldn't get a prioritized target list of accounts without two-factor authentication.

Alliance Partners operate user databases for service delivery. But not all data needed for customer management belongs in the same system with the same access controls. Not knowing which database fields create attack intelligence means learning from ShinyHunters' exfiltration strategy.

NVIDIA GeForce NOW found out the hard way.

Your team could spend the next 6 months rebuilding systems, notifying customers, and answering legal questions. Or you could spend 24 hours finding out what's actually at risk.