Fired Twin Brothers Delete 96 US Federal Government Databases

by Chief Editor

The Evolution of the Insider Threat: Why ‘Nuclear’ Retaliation is the New Security Nightmare

The recent case of the Akhter twins—who managed to wipe 96 government databases mere minutes after their termination—is a wake-up call for every CTO and CISO globally. It highlights a terrifying reality: the most dangerous threat to an organization isn’t always a sophisticated hacker in a distant country, but the person sitting in the cubicle next to you.

As we move further into the era of hyper-connectivity and cloud-based infrastructure, the “disgruntled employee” trope has evolved. We are seeing a shift from simple data theft to “nuclear” retaliation—the intentional destruction of critical infrastructure to inflict maximum damage.

Did you know? According to industry reports, insider threats are becoming more frequent and costly, with some estimates suggesting that the average cost of an insider incident has risen significantly over the last few years due to the increased scale of cloud-hosted data.

The Fatal Flaw: The ‘Forgotten Account’ Syndrome

In the Akhter case, a single oversight—forgetting to deactivate one employee’s account while blocking the other—provided the window of opportunity. This is a systemic failure in offboarding processes that plagues thousands of companies.

The Fatal Flaw: The 'Forgotten Account' Syndrome
Forgotten Account

Future security trends are moving away from manual checklists toward Automated Identity Lifecycle Management. In this model, a termination trigger in the HR system (like Workday or BambooHR) automatically kills all active sessions and revokes access across every integrated platform simultaneously.

Without this synchronization, “ghost accounts” remain active, serving as open doors for former employees who know exactly where the “self-destruct” button is located. For more on securing your perimeter, see our guide on Identity and Access Management (IAM).

The Shift Toward Zero Trust Architecture

For years, corporate security operated on a “castle and moat” strategy: once you were inside the network, you were trusted. The ability of two individuals to delete nearly 100 databases suggests a catastrophic lack of Privileged Access Management (PAM).

The industry is now pivoting toward a Zero Trust Architecture. The core philosophy is simple: “Never trust, always verify.” In a Zero Trust environment, no user has permanent administrative rights. Instead, they use Just-In-Time (JIT) Access.

Under JIT, an engineer only gains the permission to modify a database for a specific window of time and for a specific ticketed task. Once the task is complete, the permission vanishes. Had this been in place, the Akhters would have had no “standing” privileges to execute a mass deletion command after their firing.

Pro Tip: Implement “Dual Control” or “Four-Eyes Principle” for critical actions. Any command that can delete a production database should require approval from a second, independent administrator before it can be executed.

The Vetting Paradox: Second Chances vs. National Security

The fact that individuals with prior cybercrime convictions were hired to manage sensitive federal data points to a breakdown in the vetting process. However, this creates a complex ethical and professional paradox: the tech industry often relies on “reformed” hackers because they possess the deepest understanding of how systems are broken.

Twin Brothers Hack State Department, Erase Critical Databases: A Cybersecurity Wake-Up Call

Going forward, we expect to see Continuous Vetting replace the one-time background check. Instead of a snapshot of a person’s past, companies will use AI-driven monitoring to flag “behavioral indicators” of risk in real-time—such as unusual data access patterns or attempts to bypass security protocols—long before a termination event occurs.

AI-Driven Anomaly Detection: The New First Line of Defense

Manual monitoring cannot keep up with the speed of a script. The Akhters didn’t delete 96 databases one by one; they likely used automation. To counter this, the next generation of security tools is leveraging User and Entity Behavior Analytics (UEBA).

UEBA establishes a “baseline” of normal behavior for every employee. If a user who typically accesses three tables a day suddenly attempts to drop 96 databases in five minutes, the AI doesn’t just alert a human—it automatically freezes the account in milliseconds.

For a deeper dive into how AI is changing the landscape, check out the Cybersecurity & Infrastructure Security Agency (CISA) guidelines on mitigating insider risks.

Frequently Asked Questions

Q: What is the most effective way to prevent “revenge” data deletion?

The most effective method is a combination of Zero Trust (eliminating standing privileges) and immutable backups. If your backups are “write-once, read-many” (WORM), a disgruntled employee can delete the live database, but they cannot delete the recovery point.

Q: Is Zero Trust expensive to implement?

While it requires an initial investment in tooling and a shift in culture, the cost is negligible compared to the legal fees, reputational damage, and operational downtime resulting from a massive data loss event.

Q: Should companies stop hiring people with criminal records in tech?

Not necessarily. Many skilled professionals have a past. The key is not the history, but the controls. If you hire a high-risk individual, you simply apply stricter PAM and UEBA monitoring to their account.

Is your organization’s offboarding process a security loophole?
Join the conversation in the comments below or subscribe to our newsletter for weekly deep-dives into the future of cybersecurity and infrastructure protection.

You may also like

Leave a Comment