HomeIntelligenceBrief
BREACH BRIEF🟠 High Breach

Virginia Man Convicted for Deleting 96 Federal Agency Databases and Stealing EEOC Password

A Virginia resident was convicted of conspiring to delete 96 government databases and stealing a password that gave unauthorized access to an EEOC complainant’s email. The case highlights insider‑risk threats to third‑party providers handling federal data.

LiveThreat™ Intelligence · 📅 May 09, 2026· 📰 therecord.media
🟠
Severity
High
BR
Type
Breach
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
therecord.media

Virginia Man Convicted for Deleting 96 Federal Agency Databases and Stealing EEOC Password

What Happened — A Virginia resident, Sohaib Akhter, was found guilty of conspiring to delete 96 government‑hosted databases, stealing a password that granted unauthorized access to an EEOC complainant’s email, and trafficking the credential. The court also convicted him of possessing a firearm while prohibited.

Why It Matters for TPRM

  • Deletion of mission‑critical government data demonstrates the damage a malicious insider can inflict on third‑party service providers.
  • Credential theft and abuse of privileged access highlight the need for robust password‑management and monitoring controls across supply‑chain partners.
  • The case underscores that prior criminal histories may be hidden from vendors, increasing insider‑risk exposure.

Who Is Affected — Federal agencies (EEOC and 44+ other U.S. government customers), the unnamed software‑services provider, and any downstream contractors that rely on the compromised databases.

Recommended Actions

  • Review contracts with any SaaS or cloud‑hosting vendors that store or process government data for insider‑risk clauses.
  • Verify that the vendor enforces strict credential‑access controls, MFA, and continuous monitoring of privileged accounts.
  • Conduct background‑check and continuous‑vetting programs for personnel with access to sensitive government workloads.

Technical Notes — The attack leveraged stolen credentials (password trafficking) to gain unauthorized email access, then used write‑protect commands to delete database files. No public CVE was involved; the vector was insider‑driven credential abuse. Data types impacted included email communications and structured government databases. Source: The Record

📰 Original Source
https://therecord.media/virginia-man-found-guilty-deleting-96-gov-databases

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.