logoalt Hacker News

Twin brothers wipe 96 government databases minutes after being fired

243 pointsby jnordyesterday at 10:28 PM166 commentsview on HN

Comments

zuzululutoday at 10:45 PM

I'm just amused how these people were even hired to begin with ? They don't seem to be Americans? How were they even allowed to work on sensitive systems? Why was this even allowed? So many questions.

    At 4:58 pm, he wiped out a Department of Homeland Security database using the command “DROP DATABASE dhsproddb.”

    At 4:59 pm, he asked an AI tool, “How do i clear system logs from SQL servers after deleting databases?” He later asked, “How do you clear all event and application logs from Microsoft windows server 2012?”

    In the space of a single hour, Muneeb deleted around 96 databases with US government information.
scottlambtoday at 6:47 PM

> [Opexus] said that “the individuals responsible for hiring the twins are no longer employed by Opexus.”

Getting close to the classic Monty Python line: "Those responsible for sacking the people who have just been sacked, have been sacked."

Jokes aside, stuff like this sucks because I suspect many employers will take from it the most extreme, dehumanizing lessons, e.g.: (a) make firings [edit: including lay-offs] as abrupt as possible including terminating all access immediately, (b) never give second chances to anyone with any sort of criminal record (even say decades old marijuana posession or something).

I'd prefer a more balanced version: limit unilateral access to sensitive systems in general (not just of recently-fired employees), when someone is fired immediately shut off particularly sensitive credentials if they do exist (but not their general-purpose login/email account), avoid hiring people convicted of wire fraud as sysadmins, hash your @!#$ing passwords, etc.

show 5 replies
soVeryTiredtoday at 7:01 PM

> On March 12, 2025, a search warrant was executed at Sohaib’s home in Alexandria. Agents grabbed plenty of tech gear but also turned up seven firearms and 370 rounds of .30 caliber ammunition. Given his former crimes, Sohaib should have had none of this.

For god's sake, don't commit crimes while you're committing crimes.

show 2 replies
chatmastatoday at 12:25 AM

> At 4:58 pm, he wiped out a Department of Homeland Security database using the command “DROP DATABASE dhsproddb.”

This article is hilarious. The two bickering brothers remind me of the guys in the Oceans movies played by Casey Affleck and Scott Caan. It’s amazing they got this close to sensitive data.

show 3 replies
giantg2today at 7:09 PM

How did they get access to 5k passwords? Are they being sent/stored in cleartext? This is the most baffling part of the article for me.

The second part I'm unclear about is how you could pass SOC2 when you aren't terminating account access simultaneously with the employment termination.

show 5 replies
chrisrayesterday at 11:00 PM

I have no problem with my credentials being revoked everywhere before I know about a layoff. I don't really care how I learn about it, just please don't make me come in to the office.

show 3 replies
PowerElectronixtoday at 9:10 PM

He may be a bad person but he has a very pretty handwriting.

show 1 reply
JumpCrisscrosstoday at 9:27 PM

> Muneeb and Sohaib Akhter, now both 34, had been in trouble before. Back in 2015, the brothers pled guilty in Virginia to a scheme involving wire fraud and computers. Muneeb was sentenced to three years in prison, while Sohaib got two.

After their stints in jail, the brothers worked their way back into the tech world. In 2023, Muneeb got a job with a Washington, DC, firm that sold software and services to 45 federal clients; Sohaib got a job at the same company a year later.

What in the actual fuck. I'm all for giving people second chances. But maybe some ringfencing?

show 2 replies
libpcaptoday at 6:31 PM

Nice handwritings, though.

capibara13today at 6:54 PM

A true professional always makes sure to leave their workspace completely spotless before going home

show 1 reply
nostrademonstoday at 5:58 PM

> Muneeb Akhter asked Sohaib Akhter for the plaintext password of an individual who submitted a complaint to the Equal Employment Opportunity Commission’s Public Portal, which was maintained by the Akhters’ employer. Sohaib Akhter conducted a database query on the EEOC database and then provided the password to Muneeb Akhter.

WTF?

dzongatoday at 7:30 PM

prosecute the company too.

storing passwords in plaintext should be persecuted & having unlimited access to customer databases.

iJohnDoetoday at 3:30 AM

It’s crazy that people are desperate for jobs and these clowns get hired.

show 1 reply
waterTanukitoday at 12:16 AM

> On Feb. 1, 2025, Muneeb Akhter asked Sohaib Akhter for the plaintext password of an individual who submitted a complaint to the Equal Employment Opportunity Commission’s Public Portal, which was maintained by the Akhters’ employer. Sohaib Akhter conducted a database query on the EEOC database and then provided the password to Muneeb Akhter. That password was subsequently used to access that individual’s email account without authorization.

It should be a federal crime with prison time to make a DB for a federal agency and not hash and salt passwords or other auth credentials.

show 2 replies
kaikaiyesterday at 11:26 PM

How on earth did someone previously convicted of what sounds like hacking get job access to so many prod government databases? Wild that it took them so long to get caught.

show 3 replies
nrmitchitoday at 8:38 PM

This whole story is just line after line of utter incompetence.

The "after they were fired" sounds catchy, but isn't even the biggest failure.

This organization shouldn't be permitted anywhere near government, or any non-public, data/information.

ge96today at 7:47 PM

Some good handwriting

game_the0rytoday at 6:44 PM

No back ups? Skill issue.

show 2 replies
kittikittitoday at 8:28 PM

This is very surprising that they would pass a background check. I've been denied an offer because of a low credit score multiple times.

taffydavidtoday at 8:24 PM

> While this was going on, the brothers held a running conversation. (The government is not clear about whether this took place over text, instant message, or in person.)

Explain to me how we can have a transcript of a conversation without knowing whether it was in person or not. I'm baffled by this sentence.

show 1 reply
cyanydeezyesterday at 11:18 PM

so, apparently, the passwords were stored in cleartext.

show 1 reply
jongjongtoday at 10:15 PM

This makes sense but also an employee who is dishonest is also a security risk; fired or not.

It's ridiculous that companies don't seem to care about ethics. They never seem to select candidates based on proven ethics. They don't even ask any such questions.

For example, I've been in at least 2 situations where I had the ability to inflict major damage to companies which had treated me very poorly and I could have legally gotten away completely whilst doing variants of 'the wrong thing' and profiting but I didn't do it because I have principles. Unfortunately it seems that few people do nowadays. Leaders are fooling themselves if they think they can completely factor out ethics and make it all about aligning incentives. Incentive alignment creates its own problems as this alignment requires constant maintenance and it's both expensive and detrimental in the long run. These people will tend to sabotage every aspect of their responsibilities which isn't directly measured... In order to gain leverage. It's not clever. It's crooked. Should not be rewarded.

My experience as a software developer is that managers alway have lots of blind spots and the wrong people will take advantage of all of them, even when it negatively impacts the company.

paulsuttertoday at 7:26 PM

Deleting data like that is a crime investigated by the FBI. In a very sad story, a brilliant former coworker made a mistake of deleting data after leaving employment and ended up in prison. Brilliant guy, momentary mistake. Overzealous employer.

dioniantoday at 7:53 PM

The penmanship of the guy is extremely neat, like, uncannily so

ck2today at 7:34 PM

imagine the delete-fest the current whitehouse is going to do in a few years

all with pardons waiting so they can't be convicted

they might not even wait a few years

show 2 replies
htx80nerdtoday at 8:19 PM

>Muneeb and Sohaib Akhter

typical american names

show 1 reply