Two Virginia brothers Muneeb and Sohaib Akhter, previously convicted of hacking the U.S. State Department, were rehired as federal contractors and are now charged with conspiring to steal sensitive data and destroy government databases after being fired. "Following the termination of their employment, the brothers allegedly sought to harm the company and its U.S. government customers by accessing computers without authorization, issuing commands to prevent others from modifying the databases before deletion, deleting databases, stealing information, and destroying evidence of their unlawful activities," the Justice Department said in a Wednesday press release. BleepingComputer reports: According to court documents, Muneeb Akhter deleted roughly 96 databases containing U.S. government information in February 2025, including Freedom of Information Act records and sensitive investigative documents from multiple federal agencies. One minute after deleting a Department of Homeland Security database, Muneeb Akhter also allegedly asked an artificial intelligence tool for instructions on clearing system logs after deleting a database.
The two defendants also allegedly ran commands to prevent others from modifying the targeted databases before deletion, and destroyed evidence of their activities. The prosecutors added that both men wiped company laptops before returning them to the contractor and discussed cleaning out their house in anticipation of a law enforcement search. The complaint also claims that Muneeb Akhter stole IRS information from a virtual machine, including federal tax data and identifying information for at least 450 individuals, and stole Equal Employment Opportunity Commission information after being fired by the government contractor.
Muneeb Akhter has been charged with conspiracy to commit computer fraud and destroy records, two counts of computer fraud, theft of U.S. government records, and two counts of aggravated identity theft. If found guilty, he faces a minimum of two years in prison for each aggravated identity theft count, with a maximum of 45 years on other charges. His brother, Sohaib, is charged with conspiracy to commit computer fraud and password trafficking, facing a maximum penalty of six years if convicted.
Qilin ransomware claims it stole internal data from the Church of Scientology, sharing 22 screenshots as proof. The breach remains unconfirmed by the organization.
Sophisticated online fraud techniques are growing more accessible to unskilled attackers, driven by AI tools and fraud-as-a-service platforms, according to Sumsubβs latest Identity Fraud Report.
Cleafy analysis reveals Albiriox, a new Android Malware-as-a-Service (MaaS) RAT that targets over 400 global banking and crypto apps. Learn how ODF fraud enables full device takeover.
A 21-year-old Ukrainian student was tortured and burned alive in Vienna after attackers forced him to reveal passwords to his crypto wallets, emptying his digital accounts before setting him on fire in his fatherβs Mercedes.
According to local reports, two suspects, a fellow student aged 19 and a 45-year-old Ukrainian national, fled to their home country with large amounts of cash but were arrested days later by Ukrainian authorities.
The victim, Danylo K., was the son of Kharkivβs deputy mayor. His body was discovered on November 26 in a burned-out vehicle on Marlen-Haushofer-Weg in Viennaβs Donaustadt district after fire alarms alerted residents to the blaze around 12:30 a.m.
The charred remains were found in the back seat of a Mercedes S 350D bearing Ukrainian license plates beneath the Ostbahn railway line.
The attack started hours earlier in the underground parking garage of the Sofitel βSO/Viennaβ hotel on PraterstraΓe, where the 19-year-old suspect ambushed his fellow student following a loud confrontation.
A hotel guest alerted reception after hearing the altercation, prompting police to be notified.
Passersby later noticed a large pool of blood in the stairwell leading to the parking area.
He was set ablaze while crouched in the back seat, suffocating on his own blood and dying from head injuries and burns that consumed 80 percent of his body.
Colonel Gerhard Winkler of the State Criminal Police Office confirmed the autopsy findings indicated suffocation or heatstroke as the decisive factors. Forensic teams recovered a melted gasoline canister from the vehicle.
International Manhunt Tracked Suspects to Ukraine
Vienna police identified both suspects through surveillance footage captured at the hotel garage and the gas station where they purchased fuel canisters.
The pair crossed into Ukraine at precisely 9:07 a.m. the morning after the murder, triggering an international manhunt.
Ukrainian authorities arrested the suspects on November 29 after finding them in possession of enormous amounts of U.S. dollar bills.
Investigators believe the crypto was rapidly converted to cash following the robbery.
Austrian officials have transferred the case to Ukrainian jurisdiction, as extradition is not possible under existing agreements between the countries.
Police confirmed that Danyloβs crypto accounts were completely emptied after his murder, though authorities declined to specify the total sum stolen.
His family in Ukraine had reported him missing on November 25 after losing contact with him and discovering his digital wallets had been drained.
The wealthy student, who had been living temporarily in a luxurious apartment in Viennaβs Triiiple Tower on Landstrasseβs Danube Canal, was residing with his partner and their child at the time of his death.
Kharkiv Mayor Igor Terekhov declined to offer a detailed comment but acknowledged the tragedy, saying, βThis is a human tragedy,β while noting the loss remained a family matter for his deputy.
France leads global incidents with 14 confirmed cases, while violent robberies have been reported across Canada, the United States, and the United Kingdom this year.
A Canadian family endured 13.5 hours of torture in a $1.6M #Bitcoin wrench attack; one attacker sentenced to 7 years;
DOJ seizes Burma-linked trading domains used for major crypto scam operations.
Fraud network tied to Tai Chang compound used fake platforms to lure victims.
FBI alerts led to app removals and Meta shutting 2,000+ accounts tied to scams.
The United States Justice Department has widened its action against a major scam network in Burma, focusing on how the group used fraudulent trading sites to run large crypto investment schemes.
The latest step involved seizing the domain tickmilleas.com, which looked like a functioning trading platform but was actually tied to the Tai Chang compound, also known as Casino Kosai, in Kyaukhat.
The update came in a December 2 announcement from the DOJβs Office of Public Affairs and builds on a series of efforts aimed at disrupting transnational online fraud linked to Southeast Asia.
Crypto scam links widen
The takedown followed earlier moves in the same week when two additional domains were seized after being linked to the same Burma-based compound.
These domains formed a network of sites built to mimic legitimate investment services.
Each platform carried fabricated dashboards, fake transaction logs, and simulated returns that made victims believe their funds were being actively managed.
Tai Chang is part of a system of scam compounds that operate across the region.
These complexes are often controlled by criminal networks that rely on trafficked or coerced workers to run online scams.
They have grown rapidly in countries such as Myanmar, Cambodia, Laos, and Vietnam, which have become hotspots for crypto fraud operations.
Many of the victims are targeted through trading sites that appear authentic but are designed to channel money into criminal groups.
Fraud networks shift tactics
The DOJ identified Tai Chang as having clear links to entities already sanctioned by the United States.
These include the Democratic Karen Benevolent Army and the Trans Asia International Holding Group.
Both were recently listed as Specially Designated Nationals because of their association with Chinese organised crime and their involvement in building scam centres across Southeast Asia.
Their participation has contributed to the spread of fraudulent investment operations throughout the region.
Investigators found that tickmilleas.com was deliberately designed to resemble a real investment platform.
It included dashboard features, performance charts, and false deposit records that suggested active trading.
Victims were also encouraged to download mobile applications from Google Play and the Apple App Store.
After the FBI alerted both companies, many of these applications were removed from the platforms.
Information provided by the agency also led to Meta shutting down more than 2,000 accounts across its social media platforms.
These accounts were used to direct users to the fraudulent investment sites and maintain the appearance of a legitimate trading ecosystem.
Seized domain examined
Although the tickmilleas.com domain was registered only in early November 2025, several individuals had already fallen victim to the scheme within the past month.
According to the DOJ, the platform was actively used to defraud people who believed they were participating in real crypto investments.
The site currently displays a notice confirming that it has been seized by law enforcement.
The DOJ stated that the action forms part of a broader effort to prevent US infrastructure from being used to support international fraud.
The coordinated takedowns of domains and malicious applications aim to cut off the digital channels that allow scam compounds to reach victims worldwide.
Everest ransomware group claims it breached ASUS, stealing over 1TB of data including camera source code. ASUS has been given 21 hours to respond via Qtox.
Proxyearth is a new site that shows names, Aadhaar numbers, and live locations of users in India using only mobile numbers, raising serious privacy and security concerns.
More and more enterprises are opting for cloud-native application protection platforms (CNAPPs) instead of complex and hard-to-manage cloud security point solutions. Find out where your organization is on its CNAPP maturity journey.
Swiss and German police shut down Cryptomixer, seizing servers, domains and 28M dollars in Bitcoin during an Europol backed action targeting crypto laundering.