Steadvar — News without the noise

Privacy · Terms · About

© 2026 Steadvar. All rights reserved.

Former IT Workers Deleted Federal Database After Firing, Now Face Prison

CrimeTechnology7h ago
Share

Similar Articles

Canadian Citizen Sues DHS and Google Over Surveillance Attempt

CrimePolitics6d ago

Suspect Charged with Murder in Deaths of Two USF Doctoral Students

Crime4/25/2026

Former NIAID Advisor Charged with Hiding COVID-19 Records

CrimeHealth4/28/2026

Florida Attorney General Investigates ChatGPT's Alleged Role in Student Killings

CrimeTechnology4/27/2026

Lawsuits Allege OpenAI Failed to Report Threat Before Canadian School Shooting

TechnologyCrime4/29/2026

Two brothers fired from a federal contractor used stolen credentials to wipe a Homeland Security database and steal hundreds of government files, leading to their arrest and convictions on cybercrime and weapons charges.

Facts First

  • Two former IT workers for a federal contractor deleted a DHS database after being fired.
  • The brothers used stolen passwords and custom scripts to access government systems and steal over 1,800 files.
  • Muneeb Akhter pled guilty; Sohaib Ak hter was found guilty by a jury.
  • The men were arrested with seven firearms after a search warrant at their home.
  • Both face sentencing in July; could receive years in prison.

What Happened

Two IT specialists, Muneeb and Sohaib Akhter, were fired from their jobs at a federal contractor in February 2025. Minutes after their termination, they used a stolen password to access their former employer's network and issued a command that deleted approximately 96 databases, including a critical U.S. Department of Homeland Security system. Within an hour, they also downloaded over 1,800 government files to a USB drive. Federal agents later executed a search warrant at their home, seizing seven firearms and ammunition. Both brothers were indicted and have since been convicted on multiple cybercrime and weapons charges.

Why this Matters to You

This case demonstrates how disgruntled insiders with technical access can inflict significant damage on government systems holding sensitive citizen data. The swift action to delete databases and exfiltrate files highlights a vulnerability in how organizations manage access during employee offboarding. The presence of firearms underscores the potential for broader threat beyond digital sabotage.

What's Next

Muneeb and Sohaib Akhter face sentencing on July 11. Muneeb, pleaded guilty, faces up to three years. Sohaib, who was convicted at trial, faces up to two years. The court's decision will signal the consequences for such insider attacks. The company that employed them may face scrutiny over its security practices.

Perspectives

“
Security Analysts maintain that deactivating credentials prior to termination is a necessary security measure rather than a lack of compassion, as employees with active system access pose significant risks.
“
Criminal Strategists debated the efficacy of different illicit tactics, with one suggesting a 'kill script' for blackmail and another viewing such actions as 'proof of guilt' or suggesting the deletion of filesystems as a 'smart idea'.
“
Legal Observers view the decision to proceed pro se as a potentially fatal mistake, sarcastically labeling it a 'smart idea' while comparing the defendant to 'intelligent-but-overconfident defendants' who face the 'kiss of death' in federal court.