The verdict against Sohaib Akhter, who was found guilty of conspiring to erase dozens of government databases after being fired as a federal contractor, replaces a recurring but insufficiently solved problem at the focus: the internal risk in the cloud where sensitive information from public agencies is housed.
According to Department of Justice communiqué and judicial documents related to the case, the Akhter brothers had previously been convicted for unauthorised access to State Department systems and, after serving their sentence, were re-admitted as contractors by a company serving more than 45 agencies. Shortly after his dismissal, in a window of hours they would have deleted about 96 databases, including research files and FOIA records, as well as trying to remove evidence and ask an artificial intelligence assistant how to clean up the system's logs.

Beyond the individual scandal, this episode shows three systemic failures: incomplete access and revocation management, insufficient controls over multi-agency environments in private suppliers and a underestimated role of automated tools (including IA) as a support vector for malicious actors. The combination of excessive privileges and a slow or partial revocation is the root cause of such incidents.
The fact that the attackers could "write-protect" databases, execute mass erasments and destroy evidence suggests weaknesses in segregation of functions, in control of privileged accounts and in the resilience of backup. A security design that depends only on perimeters or the good faith of the staff does not resist deliberate internal attacks.
It also alarms the reference to an IA to delete records: this case line shows that emerging technologies can accelerate and facilitate avoidance techniques if they are not combined with robust policies and monitoring. Security teams must assume that actors with knowledge will access automation resources and plan accordingly.
To reduce the probability and impact of similar incidents, organizations must implement technical and procedural controls: immediate and verified revocation of credentials at the end of the working relationship, minimum privileges, centralized management of privileged access, immutable records (append-only), regular restoration tests from offline copies and segregation of environments per client. These principles are aligned with recommendations from specialized agencies such as CISA and public safety standards; see practical guidelines on CISA on internal threats and in the technical literature of NIST for access and audit controls.
In the area of contract and governance, Governments should review re-recruitment criteria after conviction for cybercrime, require continuous periodic checks and clauses that allow for immediate responses to identified risks. Also, suppliers hosting federal data need proven incident response plans and independent audits with access to unaltered forensic records.

For IT and security officials in companies and agencies, the practical recommendation is to prioritize table exercises and mass data removal simulations, validate the effectiveness of off-line backups restorations and automate the revocation of access when detecting job termination events. Investment in early detection and recovery is cheaper than irreversible loss of evidence or loss of public confidence.
Finally, the case will have significant legal and contractual consequences: they face long penalties and investigations will strengthen the need for stricter regulatory controls on subcontractors handling sensitive data. For citizens and policy makers, the lesson is clear: security in shared environments cannot be fully delegated to suppliers without requiring transparency, continuous audit and technical guarantees of integrity and availability.
To read the documents of the judicial process, including the formal prosecution, see the file available at DocumentCloud and the official statement of the Department of Justice cited above.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...