Virginia Man Convicted for Deleting 96 Federal Agency Databases and Stealing EEOC Password
What Happened — A Virginia resident, Sohaib Akhter, was found guilty of conspiring to delete 96 government‑hosted databases, stealing a password that granted unauthorized access to an EEOC complainant’s email, and trafficking the credential. The court also convicted him of possessing a firearm while prohibited.
Why It Matters for TPRM —
- Deletion of mission‑critical government data demonstrates the damage a malicious insider can inflict on third‑party service providers.
- Credential theft and abuse of privileged access highlight the need for robust password‑management and monitoring controls across supply‑chain partners.
- The case underscores that prior criminal histories may be hidden from vendors, increasing insider‑risk exposure.
Who Is Affected — Federal agencies (EEOC and 44+ other U.S. government customers), the unnamed software‑services provider, and any downstream contractors that rely on the compromised databases.
Recommended Actions —
- Review contracts with any SaaS or cloud‑hosting vendors that store or process government data for insider‑risk clauses.
- Verify that the vendor enforces strict credential‑access controls, MFA, and continuous monitoring of privileged accounts.
- Conduct background‑check and continuous‑vetting programs for personnel with access to sensitive government workloads.
Technical Notes — The attack leveraged stolen credentials (password trafficking) to gain unauthorized email access, then used write‑protect commands to delete database files. No public CVE was involved; the vector was insider‑driven credential abuse. Data types impacted included email communications and structured government databases. Source: The Record