On May 8, 2026, a Virginia man, Akhter, was convicted for the intentional and malicious deletion of 96 U.S. government databases. This individual is a repeat offender, having been previously convicted of federal cybercrimes in 2015, including conspiracy to commit wire fraud and unauthorized access to government computers, for which he served two years in prison. His background as a database administrator gave him the privileged access and technical knowledge to carry out this destructive act. He now faces a sentence of up to 21 years in prison. This case is a stark reminder of the severe threat posed by malicious insiders and the importance of robust access controls and monitoring, even for trusted personnel.
This incident is a clear-cut case of an insider threat, specifically a malicious ex-employee or an employee with a grudge. The threat actor, Akhter, used his legitimate or former legitimate access and knowledge to cause deliberate harm.
This is not a sophisticated external attack but rather an abuse of trust and privilege.
The core of this attack lies in the abuse of legitimate credentials and access.
T1078 - Valid Accounts.T1485 - Data Destruction. Given his role, he would have been able to issue DROP DATABASE or DROP TABLE commands, or simply delete the underlying database files.T1490 - Inhibit System Recovery.The technical barrier for this attack was low for the perpetrator, as he was using the very tools and privileges he was assigned to do his job, but for a malicious purpose.
The conviction to 21 years in prison reflects the severity of the impact. The deletion of 96 databases could have devastating consequences for a government agency, including:
This incident underscores that the greatest threat can sometimes come from within an organization.
No specific technical Indicators of Compromise are applicable in this case, as it was an abuse of legitimate access.
To detect a malicious insider like Akhter, organizations must monitor the usage of privileged accounts:
command_line_patternDROP DATABASE, TRUNCATE TABLEuser_account_patternPrivileged account activity at unusual hourslog_sourceDatabase Audit Logsprocess_namebackup_agent.exeDROP, TRUNCATE), mass deletion events, or access to an unusually large number of tables or databases by a single user in a short time.M1026 - Privileged Account Management)M1053 - Data Backup)Implementing strict controls over privileged accounts, such as the 'two-person rule' for destructive actions, to prevent unilateral malicious activity.
Using Database Activity Monitoring (DAM) and UEBA to audit and alert on anomalous or destructive behavior from any account, especially privileged ones.
Ensuring that backups are immutable and that the ability to manage backups is separated from the ability to manage primary data (separation of duties).
Implementing thorough background checks for personnel being hired into privileged roles and having a robust and immediate offboarding process.
The case of the malicious DBA is a textbook failure of User Account Permissions and the principle of least privilege. To prevent such an incident, no single administrator should have standing permissions to perform mass destructive actions. Access to commands like DROP DATABASE should be removed from daily-use administrator accounts. Instead, these permissions should be tied to a 'break-glass' or just-in-time (JIT) access system. To perform a destructive action, an administrator would have to check out a special role for a limited time, with full logging and mandatory justification. Ideally, this process would require approval from a second person (a 'two-person rule'). This ensures that no single individual, no matter how trusted, can unilaterally destroy vast amounts of data.
A User and Entity Behavior Analytics (UEBA) solution employing Resource Access Pattern Analysis could have detected this insider attack in near-real-time. The system would baseline the normal behavior of database administrators. This normal pattern would involve accessing a few databases at a time for specific maintenance tasks. The malicious act of a single account accessing and deleting 96 separate databases is a massive deviation from this baseline. The UEBA system would flag this as a high-severity anomaly, triggering an alert for the security operations team to investigate. The alert would be based on the sheer volume and destructive nature of the actions, which would stand in stark contrast to any legitimate administrative activity.
Akhter pleads guilty to previous federal cybercrime charges and is later sentenced.
Akhter is found guilty of deleting 96 government databases.
Sentencing for Akhter is scheduled.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.