Netcrook Logo
👤 SECPULSE
🗓️ 13 Jan 2026   🌍 Asia

Armenia’s Data Under Siege: Inside the Shadowy Market for Stolen Government Records

A notorious cybercriminal claims to be selling millions of Armenian government records, raising alarms about state security and citizen safety.

It began with a brazen post on a hacker forum: 8 million Armenian government records, available for the right price. As officials in Yerevan scrambled to assess the damage, the digital underworld watched with interest - and Armenian citizens were left to wonder if their most sensitive information was now a commodity in the global cybercrime bazaar.

The Anatomy of a Digital Heist

The seller, operating under the alias “dk0m,” is no stranger to the illicit trade of government data. According to Armenian cybersecurity group CyberHUB-AM, dk0m has a track record stretching back to at least early 2024, specializing in brokering sensitive state information across multiple continents. This time, the target appears to be Armenia’s official notification systems - platforms used to relay court rulings, police notices, and administrative updates to citizens and institutions.

For just $2,500, the dataset was advertised to include millions of records tied to legal and enforcement communications. If legitimate, this cache could provide scammers with unprecedented ammunition: real court case numbers, police notifications, and administrative actions to craft highly convincing phishing messages. The danger isn’t just theoretical - CyberHUB-AM warns that the data could “significantly lower the barrier for social engineering attacks,” making it easier for criminals to trick Armenians into handing over money or sensitive information.

How Did It Happen?

While the Armenian government’s main email infrastructure appears intact, early statements from the Public Relations and Information Center (PRIC) suggest the breach may have occurred through the country’s electronic civil litigation platform. Attackers often rely on infostealer malware - malicious programs that silently harvest passwords and session cookies from infected computers. With these digital keys, criminals can slip into government portals, extract data, and later auction it off to the highest bidder.

Screenshots dating back to August 2024 indicate that dk0m may have been sitting on Armenian records for months, possibly waiting for the right moment - or buyer - to cash in. The government has launched an internal investigation, but the damage may already be done. The incident is a stark reminder of how digital vulnerabilities can be exploited by persistent, skilled adversaries who profit from selling the building blocks of trust.

Aftermath and Broader Implications

Beyond immediate fallout, the breach raises urgent questions about the security of government digital infrastructure. If official notifications can be so easily compromised, what else might be at risk? The episode is a wake-up call for Armenia - and for any nation relying on electronic systems to serve its citizens. As governments digitize, the value of their data rises in the eyes of criminals, making robust cybersecurity not just a technical necessity, but a matter of public trust and safety.

WIKICROOK

  • Infostealer malware: Infostealer malware is malicious software that covertly gathers sensitive information, like passwords and financial data, from infected computers.
  • Social engineering: Social engineering is the use of deception by hackers to trick people into revealing confidential information or providing unauthorized system access.
  • Session cookies: Session cookies are temporary files that keep you logged in to websites. If stolen, they can let attackers impersonate you online.
  • Phishing: Phishing is a cybercrime where attackers send fake messages to trick users into revealing sensitive data or clicking malicious links.
  • Notification system: A notification system securely delivers official messages or documents from governments to citizens, ensuring timely and authenticated communication via digital platforms.

As the investigation unfolds, Armenia stands at a crossroads: double down on digital defenses, or risk becoming a recurring headline in the global chronicles of cybercrime.

Armenia cybercrime data breach

SECPULSE SECPULSE
SOC Detection Lead
← Back to news