
Convicted hacker twins who landed jobs as federal contractors nabbed for allegedly deleting government databases
Muneeb Akhter. Photo by Evelyn Hockstein/Washington Post via Getty Images
According to the indictment, Muneeb Akhter allegedly deleted approximately 96 databases storing U.S. government information — including databases containing records and documents related to Freedom of Information Act matters as well as sensitive federal investigative files.
Muneeb Akhter is also accused of asking an artificial intelligence tool how they could cover their tracks after deleting a DHS database.
After he got fired from Opexus, Muneeb Akhter allegedly obtained data from the U.S. Equal Employment Opportunity Commission and is accused further of stealing copies of IRS information including federal tax information and other identifying information for at least 450 individuals.
Opexus did not respond to a request for comment from Blaze News.
“These defendants abused their positions as federal contractors to attack government databases and steal sensitive government information,” said Matthew Galeotti, acting assistant attorney general at the Department of Justice’s Criminal Division, in a statement. “Their actions jeopardized the security of government systems and disrupted agencies’ ability to serve the American people.”
Muneeb Akhter has been charged with conspiracy to commit computer fraud and to destroy records, two counts of computer fraud, theft of federal records, and two counts of aggravated identity theft. His twin, Sohaib Akhter, was charged with conspiracy to commit computer fraud and to destroy records and computer fraud.
While Sohaib Akhter faces a maximum penalty of six years in prison, Muneeb Akhter faces a mandatory minimum penalty of two years of prison time for each aggravated identity theft count and a maximum penalty of 45 years for the other charges.
The duo pleaded guilty in 2015 to a different set of crimes.
Muneeb Akhter hacked into the website of a cosmetics company and stole thousands of customers’ credit card and personal information. He and his brother used the stolen data to pay for flights, hotel stays, various goods, and attendance at professional conferences. Muneeb Akhter proceeded to hand off the stolen data to a “dark net” operator who cut him in on the profits from the sales.
The other brother, meanwhile, used his contract position at the State Department in 2015 to steal personally identifiable data belonging to various people including co-workers and a federal law enforcement agent who was investigating him.
According to the Justice Department, Sohaib Akhter later hatched a scheme to ensure perpetual access to various State Department systems and, with the help of his twin, attempted to install an electronic collection device inside a State Department office, which would have enabled the hackers to remotely steal federal data.
Years earlier, Muneeb Akhter hacked into a Maryland-based private data aggregation company that he was performing contract work for, giving his brother access to a database of federal contract information to give their technology company an upper hand when bidding for contracts and clients.
Like Blaze News? Bypass the censors, sign up for our newsletters, and get stories like this direct to your inbox. Sign up here!
You may also like
By mfnnews
search
categories
Archives
navigation
Recent posts
- Pope Leo calls out ‘inclusive’ language as a painful, ‘Orwellian’ movement in the West January 10, 2026
- How a pro-life law in Kentucky lets mothers get away with murder January 10, 2026
- Young white Americans want their own identity politics now — and conservatives shouldn’t be surprised January 10, 2026
- House to vet Madriaga”s claims vs VP Sara, says Ridon January 10, 2026
- Iranian hospitals overwhelmed with injuries as protests rage across Islamic Republic January 10, 2026
- Trump answers on whether he’d order a mission to capture Putin January 10, 2026
- US military launches airstrikes against ISIS targets in Syria, officials say January 10, 2026








Leave a Reply
You must be logged in to post a comment.