Armenia probes alleged sale of 8 million government records on hacker forum

Hackers are offering for sale what they claim is a large trove of Armenian government-related data, prompting officials in Yerevan to open an investigation into a potential breach.

The alleged seller, using the alias dk0m, said it gained access to a government notification system used to distribute official communications, including legal and administrative notices.

The dataset, advertised on an underground forum for $2,500, is said to contain about 8 million records linked to official notifications, including communications from police and judicial bodies.

In a statement on Saturday, the Public Relations and Information Center of Armenia (PRIC) — a government-linked strategic communications body — denied that the country’s government email infrastructure had been breached, but said attackers may have accessed data from another state platform.

“A preliminary review suggests that the leaked files were obtained from the electronic civil litigation platform,” PRIC said, adding that an internal probe is under way to confirm the source of the data and how it was accessed.

Cybersecurity researchers at CyberHUB-AM, a non-governmental group focused on digital security, said dk0m is a known broker on underground cybercrime forums, with a history of selling government-related data dating back to at least 2024.

According to the researchers, the actor typically relies on infostealer malware — tools designed to harvest saved credentials and session cookies from infected devices — to identify access to sensitive government portals before packaging and reselling the data.

They noted that dk0m has previously advertised data linked to ministries in countries including Argentina, Ukraine and Brazil, often sharing samples or database structures to bolster credibility.

Screenshots dating back to August 2024 suggest the actor may already have possessed Armenian government-related data, raising the possibility that the latest offer is an attempt to monetize material obtained earlier, the group said.

If the dataset is authentic, researchers warned it could expose Armenian citizens to heightened cyber risks.

“Official-looking data tied to courts, enforcement services or police structures significantly lowers the barrier for social engineering attacks,” CyberHUB-AM said.

“Citizens could be targeted with highly convincing scam messages referencing real case numbers, fines or enforcement actions, increasing the likelihood of panic-driven responses or compliance.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

Next Post

CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Related Posts

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed by 22 information disclosure, 21 remote code
Read More

From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware

A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL. "The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, completely
Read More