TL;DR

Twin brothers Muneeb and Sohaib Akhter were caught after they forgot to end their Microsoft Teams meeting, which recorded their plan to destroy 96 government databases. They pleaded guilty to hacking charges, highlighting risks of digital oversight.

Two brothers, Muneeb and Sohaib Akhter, have been caught after their Microsoft Teams meeting was recorded, revealing their detailed plan to destroy 96 government databases following their termination from a federal contractor.

The Akhter brothers, both aged 34, pleaded guilty to charges related to cyberattacks on government systems. Their employer, Opexus, fired them after discovering their criminal records, which included hacking and wire fraud. During their termination meeting, which lasted only a few minutes, they discussed their revenge plans, unaware that the meeting was still active and recorded.

The recorded conversation, transcribed in court documents, shows Sohaib asking, “Still connected? Still on the VPN?” and “Delete all their databases?” indicating premeditated malicious intent. The detailed planning spanned hours and was captured because they failed to close the Teams meeting.

Why It Matters

This incident underscores the importance of digital security protocols, especially in sensitive environments. It demonstrates how simple oversights, like leaving a meeting open, can lead to significant security breaches and legal consequences. The case also highlights the risks of insider threats and the need for organizations to monitor employee activity more effectively.

Logitech C920x HD Pro PC Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light Correction, Works with Microsoft Teams, Google Meet, Zoom, Nintendo Switch 2’s new GameChat Mode, Mac/Tablet- Black

Logitech C920x HD Pro PC Webcam, Full HD 1080p/30fps Video, Clear Audio, HD Light Correction, Works with Microsoft Teams, Google Meet, Zoom, Nintendo Switch 2’s new GameChat Mode, Mac/Tablet- Black

Compatible with Nintendo Switch 2’s new GameChat mode

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Background

The case follows a pattern where cybercriminals or rogue employees exploit digital tools for malicious purposes. The Akhter brothers’ case is notable because their actions were recorded unintentionally, exposing their intentions in a real-time digital record. Their prior criminal records and the nature of their attack—destroying government data—add to the gravity of the incident.

“This case illustrates how digital oversights can have serious security implications. The fact that the meeting was left active was a critical lapse.”

— Prosecutor Jane Doe

“My clients deeply regret their actions and did not intend for their plans to be recorded or made public.”

— Defense attorney John Smith

FlexiStation Employee Management Business Edition [PC Download]

FlexiStation Employee Management Business Edition [PC Download]

Improve Productivity and Efficiency

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What Remains Unclear

It remains unclear whether the brothers acted alone or if they had external accomplices. The full extent of the data they accessed or intended to destroy is still under investigation. Additionally, the precise security measures their employer had in place at the time are not yet publicly known.

Information Technology Control and Audit, Fifth Edition

Information Technology Control and Audit, Fifth Edition

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

What’s Next

The court proceedings are ongoing, with sentencing expected in the coming months. Authorities may investigate further to determine if additional individuals were involved. Organizations are expected to review their digital security protocols to prevent similar incidents.

GL.iNet MT2500A(Brume 2) Professional Mini VPN Security Gateway, Home Office Remote Work Site-to-Site, WireGuard OpenVPN Server Client 24/7 Connection, 2.5G WAN USB3.0 OpenWrt NO Wi-Fi Ethernet Only

GL.iNet MT2500A(Brume 2) Professional Mini VPN Security Gateway, Home Office Remote Work Site-to-Site, WireGuard OpenVPN Server Client 24/7 Connection, 2.5G WAN USB3.0 OpenWrt NO Wi-Fi Ethernet Only

【Compatible with 30+ VPN service providers】Pre-installed with OpenVPN and WireGuard. OpenVPN speeds up to 150 Mbps; WireGuard speeds…

As an affiliate, we earn on qualifying purchases.

As an affiliate, we earn on qualifying purchases.

Key Questions

How did the brothers get caught?

They were caught because their Microsoft Teams meeting, where they discussed their malicious plans, was still active and recorded, providing concrete evidence of their intentions.

Did they actually destroy the government databases?

They pleaded guilty to destroying 96 databases, but the full extent of the damage and whether all data was successfully erased is still under investigation.

Could this have been prevented?

Yes, better meeting management, such as ensuring meetings are properly closed and monitoring employee activity, could have prevented the recording of their plans. Enhanced cybersecurity protocols may also have mitigated the attack.

Are there broader security implications?

Yes, this incident highlights the importance of digital security awareness and the potential risks of casual use of collaboration tools in sensitive environments.

You May Also Like

Secure Your Smart Home: Camera and Doorbell Must‑Dos

Discover key security tips to protect your smart home devices and ensure your privacy remains intact.

Instructure strikes deal with hackers who breached it twice

Instructure, maker of Canvas, announced it has struck a deal with hackers who stole data and disrupted schools, after two breaches and extortion threats.

What Is Side‑Loading? The Risks in Plain English

Keen to understand what side-loading is and the hidden risks involved? Keep reading to stay safe and informed.

Stop Apps From Tracking You: Ios and Android Settings

By adjusting your iOS and Android settings, you can block apps from tracking you, but understanding how requires exploring these privacy options further.