“DROP DATABASE”: What not to do after losing an IT job

Regardless of how unhinged, reckless and stupid this brothers are, the things i got from this story are:
  • Passwords in plaintext and accessible.
  • Absolutely no guardrails or protection/access control
  • Somehow they got employed and access again to government databases AFTER being in jail for wire fraud and computers.

This is a systematic fail on so many levels..
 
Upvote
602 (603 / -1)

Sarty

Ars Tribunus Angusticlavius
7,924
I have given unsatisfactory employees the opportunity to tender their resignation, which obviously means they retain their credentials for a time. It is a risk. I would not give that opportunity if I were about to fire them for the express reason of committing crimes with their credentials!

Also, that goofus has utterly incredible handwriting. I have never seen such a thing. Maybe he can teach lessons in prison?
 
Upvote
235 (239 / -4)

CUclimber

Ars Legatus Legionis
19,586
Subscriptor
Who the hell gave them tech jobs after serving time for wire fraud? Especially jobs as government contractors? Doesn't SOC-2 require firms to do background checks?

I swear, the number of hours I put into maintaining my professional reputation, being honest on my resume and in interviews, and overall just striving to be a good responsible human seems less necessary every day. Not that I'm going to stop, but it's infuriating to see assholes like this getting second chances.
 
Upvote
304 (304 / 0)

Nate Anderson

Ars Tribunus Militum
2,252
Ars Staff
I have given unsatisfactory employees the opportunity to tender their resignation, which obviously means they retain their credentials for a time. It is a risk. I would not give that opportunity if I were about to fire them for the express reason of committing crimes with their credentials!

Also, that goofus has utterly incredible handwriting. I have never seen such a thing. Maybe he can teach lessons in prison?
Yes, it is shockingly neat! I'm not sure I could write like that if I tried.
 
Upvote
79 (79 / 0)

Nate Anderson

Ars Tribunus Militum
2,252
Ars Staff
How did they have a wire fraud conviction and still pass the background check for a job with a federal contractor?

How the hell were they free for 9 months after the search?
I can't answer the first question, but as to your second one... this is actually quite common. A warrant is usually executed to gather information, and there's commonly a significant gap between warrant execution and arrest.
 
Upvote
72 (72 / 0)

Nate Anderson

Ars Tribunus Militum
2,252
Ars Staff
How come the employer isn’t named in the article? Seems like relevant information, since they were the ones careless enough to hire these dumbasses, AFTER they had a criminal record IN THE SAME STATE.
The employer is referred to only as "COMPANY-1" throughout the legal docs.
 
Upvote
45 (46 / -1)
Off topic, but I would find it so satisfying to use a gigantic dedicated Delete button like this.

iMac 2026-05-12 at 3.33.28 PM.png
 
Upvote
139 (140 / -1)

fenris_uy

Ars Tribunus Angusticlavius
9,197
How come the employer isn’t named in the article? Seems like relevant information, since they were the ones careless enough to hire these dumbasses, AFTER they had a criminal record IN THE SAME STATE.
That, and the fact that they had passwords in plaintext might be the reason why one of the brothers claims that the contractor is also being investigated by the Feds.
 
Upvote
83 (83 / 0)

Coriolanus

Ars Tribunus Angusticlavius
8,724
Subscriptor++
How come the employer isn’t named in the article? Seems like relevant information, since they were the ones careless enough to hire these dumbasses, AFTER they had a criminal record IN THE SAME STATE.
Criminal background checks are outsourced to a vendor. I am wondering what went wrong for this to be missed. Did the employer not do a background check? Did the vendor screw up?

Also, it took less time for the DOJ to try to indict Mark Kelly for making a video stating the law than it took for the DOJ to indict these two idiots after they deleted 96 government databases and compiled a database of stolen credentials for fraudulent use.
 
Upvote
156 (156 / 0)

Coriolanus

Ars Tribunus Angusticlavius
8,724
Subscriptor++
I can't answer the first question, but as to your second one... this is actually quite common. A warrant is usually executed to gather information, and there's commonly a significant gap between warrant execution and arrest.
(Former attorney here) I understand that it takes time - but 9 months? For the kind of shit they pulled?
 
Upvote
65 (66 / -1)

salbee17

Smack-Fu Master, in training
54
Subscriptor
Upvote
21 (22 / -1)
dhsproddb

OMG the database name.

Who the hell gave them tech jobs after serving time for wire fraud? Especially jobs as government contractors? Doesn't SOC-2 require firms to do background checks?

How come the employer isn’t named in the article? Seems like relevant information, since they were the ones careless enough to hire these dumbasses, AFTER they had a criminal record IN THE SAME STATE.

The company is Opexus.

Edit: link
https://cyberscoop.com/opexus-background-checks-insider-attack-muneeb-sohaib-akhter/
 
Upvote
88 (90 / -2)
I worked at a place where layoffs were expected. Tried to get into my office, key card didn't work.

Turned out I had started exactly on the day rwo years before the layoffs, and for security reasons you had to get a new key card with a new photo every two years. I was safe, but almost ten percent lost their job that day.

In the UK it is not uncommon to get 6 months of redundancy, I think that might be cheaper for a company. And you will focus on getting a new job say within two months and you can put four months redundancy in your pocket.
 
Upvote
60 (60 / 0)
These guys were just dumb. For the amount of knowledge these guys had, it was increadibly stupid and short sited. Doing something like this leaves all kinds of digital fingerprints. When the FBI eventually gets involved, they WILL tie it to you. For the type of attack these brothers executed you would need to do an insane amount of follow up work to cover your tracks.

The deal is, as an admin you will always be suspect number 1. The fact that you were just fired would elevate that suspicion further. Then investigators would just need to do some data recovery on wiped drives or go through some obscure audit log and they'd have you. Unless you have very specific, very special training that covered all scenarios, the time to plan properly, and the time to properly execute it, your ALWAYS going to loose when attempting something like this (you would also need intimate knowledge of there IT infrastructure, but I left that one out since the brothers should have had that).
 
Upvote
57 (61 / -4)

SirOmega

Ars Tribunus Angusticlavius
6,215
Subscriptor++
My takeaway is...
At 4:59 pm, he asked an AI tool, “How do i clear system logs from SQL servers after deleting databases?” He later asked, “How do you clear all event and application logs from Microsoft windows server 2012?”

In the Year of our Lord 2025, who the hell is running a 2012 server. EOL was October 10, 2023. There is extended support you can buy but its not cheap.
 
Upvote
68 (68 / 0)

Nate Anderson

Ars Tribunus Militum
2,252
Ars Staff
Upvote
47 (47 / 0)

Steel_Sloth

Smack-Fu Master, in training
58
Subscriptor
Didn't we hear about these two semi-recently or was that someone else that also had a history of criminal activity that went on to work for the government (directly or indirectly) that did something like this?
Didn't one (or more, likely) of the DOGE goons have a criminal record? Or was at least under indictment for something? Seem to recall that, anyway.
 
Upvote
13 (17 / -4)
dhsproddb

OMG the database name.





The company is Opexus.

Edit: link
https://cyberscoop.com/opexus-background-checks-insider-attack-muneeb-sohaib-akhter/
Here’s a link to Opexus’ web site:
https://www.opexustech.com/

“We deliver built-for-government case management software so FOIA (open records), audit, investigations, OIG, workforce management, and procurement teams can automate workflows, find information, and put your backlogs on notice.”
OPEXUS is FedRAMP and StateRAMP-authorized, reflecting a strong commitment to security and compliance standards to keep its customers’ data safe and secure in the cloud.
 
Upvote
33 (33 / 0)