GFN Cloud Internet Services, operating as the regional NVIDIA GeForce NOW cloud gaming partner, GFN.AM has officially confirmed a significant data breach.
The security incident exposed personal information of users registered on their streaming platform.
While the company has now secured its database, the delayed discovery of the network intrusion highlights ongoing challenges in protecting sensitive user data within the gaming industry.
NVIDIA Confirms GeForce Data Breach
According to the official security advisory, unauthorized access to the company’s internal database initially occurred on March 9, 2026.
However, network administrators did not discover the malicious intrusion until nearly two months later, on May 2, 2026. The extended dwell time allowed unauthorized third parties to access user records without immediate detection.
The company clarified that the breach is isolated to historical data, meaning only users who registered before the March 9 intrusion date are affected. Anyone who created an account after the attack occurred remains completely secure.
A critical positive note from the investigation is that user account passwords remain completely secure and were not compromised during the attack.
Instead, the leaked database contains specific personal identifiers that cybercriminals frequently use for targeted social engineering.
The exposed information includes user email addresses and the designated GFN.AM account usernames and dates of birth.
Furthermore, users who registered their accounts through a mobile operator had their phone numbers leaked. Individuals who utilized the Google single sign-on feature also had their real first and last names exposed to unauthorized attackers.
Upon discovering the database intrusion in early May, GFN.AM immediately initiated its incident response protocols.
The internal security team successfully identified and eliminated the vulnerabilities that enabled unauthorized database access. To prevent similar situations in the future, the organization has deployed additional technical and organizational security measures.
These upgrades are designed to significantly strengthen the overall protection architecture of their internal information systems. The company has formally apologized to the affected gaming community for the security lapse.
Although authentication credentials were not stolen, cybersecurity researchers warn that the exposed data creates a substantial risk for subsequent attacks.
Threat actors can easily use the stolen combinations of real names, dates of birth, phone numbers, and email addresses to craft highly personalized phishing emails or SMS messages.
Affected gamers should remain highly vigilant against unexpected communications claiming to be from NVIDIA or GFN.AM support teams.
Please monitor your communication channels for suspicious activity and enable two-factor authentication on all connected accounts to ensure maximum security.