Twin Brothers Accused of Deleting 96 Gov Databases After Termination
Ex‑employees allegedly erased 96 U.S. government databases minutes after being fired, using stolen credentials and custom scripts for fraud and disruption.

Former IT Contractor Convicted of Wiping 96 U.S. Government Databases
TL;DR: Twin brothers Muneeb and Sohaib Akhter are accused of deleting 96 federal databases shortly after their termination, having previously harvested thousands of credentials and abused them for personal gain.
Context
Organizations often disable access for fired employees before they learn of their dismissal, treating lingering credentials as a security risk. The Akhter case illustrates how insider threats can persist even after formal separation when deprovisioning is delayed or incomplete.
Key Facts
In February 2025, Muneeb Akhter asked his brother Sohaib for a complainant’s password from an EEOC database maintained by their employer; Sohaib retrieved it via a query and Muneeb used it to access the individual’s email without authorization. Investigators say Muneeb had collected approximately 5,400 credentials from his company’s network, built Python scripts such as "marriott_checker.py" to test them against sites like Marriott and DocuSign, and successfully logged in hundreds of times, booking travel with stolen airline miles. Minutes after both brothers were fired, they allegedly issued DROP DATABASE commands that erased 96 government-hosted databases.
What It Means
The incident underscores the danger of excessive data access and insufficient monitoring of privileged accounts post‑termination. It shows how stolen internal credentials can be repurposed for credential stuffing and fraud, while destructive actions like database deletion can cause immediate service disruption and data loss.
Mitigations
- Revoke all active sessions and passwords immediately upon termination; automate deprovisioning via identity‑governance tools. - Enforce least‑privilege access and regularly review entitlements for dormant accounts. - Deploy UEBA to detect anomalous login attempts, especially those targeting external services with internal credentials. - Monitor for execution of suspicious scripts (MITRE ATT&CK T1059.003) and database‑deletion commands (T1485). - Apply detection signatures for known malicious tools and review logs for T1078 (Valid Accounts) and T1087 (Account Discovery) activity.
Watch for increased scrutiny of post‑termination access controls and forthcoming federal guidance on insider‑threat mitigation.
Continue reading
More in this thread
Instructure Pays Hackers to Delete Stolen Canvas Data, Experts Warn Payment Doesn’t End Threat
Peter Olaleru
Instructure Pays Hackers to Delete Canvas Data After ShinyHunters Threatens 9,000 Schools
Peter Olaleru
BWH Hotels Confirms Six‑Month Reservation System Breach Exposing Guest Data
Peter Olaleru
Conversation
Reader notes
Loading comments...