Virginia twins sentenced for hacking and government intrusion

A long trail of hacks, fraud, insider abuse and government system breaches

Court document folder on desk
Federal prosecutors detailed years of coordinated intrusions

Twin brothers Muneeb and Sohaib Akhter spent years hacking private companies and U S government systems. Their schemes show how insider access and basic intrusions cause real damage long before nation state attacks enter the picture.

In 2015, twin brothers Muneeb and Sohaib Akhter were sentenced in the Eastern District of Virginia for a series of coordinated hacks, fraud schemes and attempts to covertly access U S government systems. Their case is resurfacing because new reporting shows the same twins have been arrested again in 2025 for allegedly conspiring to destroy government databases. The older case shows how far back their behavior goes. Full details on the new arrest are available at DataBreaches.net.

The 2015 prosecution covered wire fraud, unauthorized access to protected computers and attempts to breach U S State Department systems. Muneeb received 39 months in prison. Sohaib received 24 months. Both were placed on three years of supervised release. Prosecutors described the pair as skilled enough to cause real harm but reckless enough to leave a clear trail of damage.

The earliest scheme involved Muneeb hacking a cosmetics company in 2014. He stole thousands of customer credit card numbers and personal details. The brothers used the stolen data to buy flights, hotels and access to professional conferences. Muneeb also sold stolen information to a dark net broker and collected a share of the profits. This was not sophisticated work. It still caused financial harm to real people whose data should never have been exposed.

The brothers then escalated to direct attacks on the U S Department of State. Court documents describe repeated intrusions and attempted intrusions aimed at collecting passport, visa and system information. Sohaib abused his contract role at the State Department to pull data on co-workers, acquaintances, a former employer and a federal law enforcement agent. This was classic insider misuse. It also exposed how thin internal controls were at the time.

The most reckless move came when Sohaib attempted to install a covert data collection device behind a wall inside a State Department building in Washington, D C. The goal was to maintain permanent access to internal systems. The device broke during installation. The plan collapsed. It still demonstrated intent to bypass every safeguard the agency relied on.

Muneeb also targeted a private data aggregation company in 2013 and 2014. He accessed a database of federal contracting information and used it to shape bids for his own technology company. He injected code that forced the victim company’s servers to vote for him in an online contest and blast more than 10,000 emails to students at George Mason University. None of this required advanced exploitation. It exploited weak access controls and poor oversight.

In 2014, Muneeb lied on a government background check form while securing work with a defense contractor. After his arrest, he obstructed investigators by isolating a co-conspirator and arranging a temporary exit from the country. The pattern was consistent. Gain access. Exploit it. Hide the evidence. Repeat.

This case matters in 2025 because attackers like this are not the high budget adversaries governments like to cite. They are contractors, insiders and opportunists who find unprotected systems and walk straight through them. The Akhter brothers exposed systemic weaknesses that were never fully addressed. Their new arrest shows the problem never ended.

More information on the 2025 arrest is available at DataBreaches.net.

Blackout VPN exists because privacy is a right. Your first name is too much information for us.

Keep learning

FAQ

What were the main charges against the Akhter brothers

They were charged with wire fraud, unauthorized access to protected computers, unauthorized access to government systems, making false statements and obstruction of justice.

How did they access State Department systems

Sohaib abused his role as a State Department contractor while both brothers attempted remote and physical intrusions into internal systems.

What private company did they target

They hacked a data aggregation company in Maryland to steal federal contract data and manipulate online voting systems.

Why is the case relevant again in 2025

New reporting shows the brothers have been arrested again for allegedly conspiring to destroy government databases.

Where can readers find more details on the new arrest

DataBreaches.net published the full coverage on the December 2025 arrest.