Armenia probes alleged sale of 8 million government records on hacker forum

Hackers are offering for sale what they claim is a large trove of Armenian government-related data, prompting officials in Yerevan to open an investigation into a potential breach.

The alleged seller, using the alias dk0m, said it gained access to a government notification system used to distribute official communications, including legal and administrative notices.

The dataset, advertised on an underground forum for $2,500, is said to contain about 8 million records linked to official notifications, including communications from police and judicial bodies.

In a statement on Saturday, the Public Relations and Information Center of Armenia (PRIC) — a government-linked strategic communications body — denied that the country’s government email infrastructure had been breached, but said attackers may have accessed data from another state platform.

“A preliminary review suggests that the leaked files were obtained from the electronic civil litigation platform,” PRIC said, adding that an internal probe is under way to confirm the source of the data and how it was accessed.

Cybersecurity researchers at CyberHUB-AM, a non-governmental group focused on digital security, said dk0m is a known broker on underground cybercrime forums, with a history of selling government-related data dating back to at least 2024.

According to the researchers, the actor typically relies on infostealer malware — tools designed to harvest saved credentials and session cookies from infected devices — to identify access to sensitive government portals before packaging and reselling the data.

They noted that dk0m has previously advertised data linked to ministries in countries including Argentina, Ukraine and Brazil, often sharing samples or database structures to bolster credibility.

Screenshots dating back to August 2024 suggest the actor may already have possessed Armenian government-related data, raising the possibility that the latest offer is an attempt to monetize material obtained earlier, the group said.

If the dataset is authentic, researchers warned it could expose Armenian citizens to heightened cyber risks.

“Official-looking data tied to courts, enforcement services or police structures significantly lowers the barrier for social engineering attacks,” CyberHUB-AM said.

“Citizens could be targeted with highly convincing scam messages referencing real case numbers, fines or enforcement actions, increasing the likelihood of panic-driven responses or compliance.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Next Post

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Related Posts

Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators

Security teams are still catching malware. The problem is what they're not catching. More attacks today don't arrive as files. They don't drop binaries. They don't trigger classic alerts. Instead, they run quietly through tools that already exist inside the environment — scripts, remote access, browsers, and developer workflows. That shift is creating a blind spot. Join us for a deep-dive
Read More

Is Your Google Workspace as Secure as You Think it is?

The New Reality for Lean Security Teams If you’re the first security or IT hire at a fast-growing startup, you’ve likely inherited a mandate that’s both simple and maddeningly complex: secure the business without slowing it down. Most organizations using Google Workspace start with an environment built for collaboration, not resilience. Shared drives, permissive settings, and constant
Read More

DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide

The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign codenamed DarkSpectre that has impacted 2.2 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox. The activity is assessed to be the work of a Chinese threat actor that Koi Security is tracking under the moniker DarkSpectre. In all, the
Read More