← Back to Blogs
HN Story

The Cost of Incompetence: Lessons from the DHS Database Wipe

May 15, 2026

The Cost of Incompetence: Lessons from the DHS Database Wipe

A recent security incident has sent shockwaves through the IT community, serving as a masterclass in how not to manage government contracts and system administration. Two twin brothers, Muneeb and Sohaib Akhter, managed to wipe 96 government databases—including one belonging to the Department of Homeland Security (DHS)—within a single hour of being fired from their employer, a Washington, DC-based firm serving 45 federal clients.

This incident is not merely a story of disgruntled employees; it is a systemic failure of security protocols, hiring practices, and basic technical hygiene. From the storage of passwords in plaintext to the lack of immediate credential revocation, the breach exposes a terrifying level of negligence.

A Timeline of Technical Negligence

The scale of the destruction was achieved through a combination of high-level access and an almost comical lack of oversight. According to reports, Muneeb Akhter executed the command DROP DATABASE dhsproddb to wipe a DHS database at 4:58 pm. In the minutes that followed, he deleted approximately 96 databases containing sensitive US government information.

Beyond the deletion, the brothers engaged in active data theft. Muneeb downloaded 1,805 files belonging to the Equal Employment Opportunity Commission (EEOC) onto a USB drive and accessed federal tax information for at least 450 individuals.

Perhaps most damning is the brothers' attempt to cover their tracks. Following the deletions, Muneeb used AI tools to ask how to clear event and application logs from SQL servers and Windows Server 2012—a legacy system that further highlights the outdated infrastructure often found in government-contracted environments.

The "Red Flags" That Were Ignored

The community's reaction to the breach has focused heavily on the hiring process. Both Muneeb and Sohaib had previous convictions for wire fraud and computer-related crimes in 2015, serving two and three years in prison respectively. Despite this history, they were hired into roles with near-administrative access to production databases for federal agencies.

As one observer noted:

"I'm all for giving people second chances. But maybe some ringfencing?"

This raises a critical question about the efficacy of background checks for government contractors. If individuals with a history of computer fraud can be granted keys to the kingdom of federal data, the background check process is either being bypassed or is fundamentally broken.

Critical Security Failures

While the brothers' actions were criminal, the technical environment they operated in was an invitation for disaster. Several glaring vulnerabilities were identified:

1. Plaintext Password Storage

In one instance, Sohaib Akhter conducted a database query on the EEOC database to retrieve a plaintext password for an individual who had submitted a complaint. This password was then used to access that person's email account. The fact that a federal agency's public portal stored passwords in plaintext—without hashing or salting—is a catastrophic failure of basic security standards.

2. Lack of Least Privilege

The ability of a single employee to unilaterally delete 96 databases in an hour suggests a complete absence of the "Principle of Least Privilege" (PoLP). No single administrator should have the power to execute a DROP DATABASE command on production systems without multi-party authorization or rigorous guardrails.

3. Delayed Credential Revocation

The window of opportunity existed because the brothers' access was not revoked simultaneously with their termination. While many US companies now deactivate credentials before an employee even knows they are being laid off, this firm failed to perform this basic offboarding step.

Synthesis: Moving Beyond the "Disgruntled Employee" Narrative

It is easy to frame this as a story of "bad actors," but the technical community argues that the focus should be shifted toward the organization's incompetence. The destruction of data is a symptom; the disease is a lack of governance.

Many professionals argue that the solution isn't just more aggressive firing protocols, but better system architecture. As one commenter suggested, the goal should be to "limit unilateral access to sensitive systems in general," rather than simply rushing to cut off email access during a layoff.

Ultimately, this incident serves as a grim reminder that security is only as strong as the weakest link—and in this case, the link was a combination of outdated software, nonexistent password security, and a hiring process that ignored blatant criminal history.

References

HN Stories