{"id":23865,"date":"2025-05-30T06:06:04","date_gmt":"2025-05-30T06:06:04","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=23865"},"modified":"2026-01-24T23:00:06","modified_gmt":"2026-01-24T23:00:06","slug":"government-data-wiped-by-insider-hackers-in-opexus-security-breach","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach","title":{"rendered":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach"},"content":{"rendered":"\n<p>The cybersecurity world got a harsh wake-up call in February 2025 when two convicted hackers working as employees at a major government contractor managed to delete dozens of federal databases and steal thousands of sensitive files. The OPEXUS breach, <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2025-05-21\/security-failures-behind-us-contractor-s-data-breach\" target=\"_blank\" rel=\"noopener\" title=\"\">reported by Bloomberg on May 21<\/a>, exposes critical gaps in how organizations vet employees and control access to sensitive government data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Convicted Hackers Got Government Access<\/strong><\/h2>\n\n\n\n<p>OPEXUS, a Washington-based software company that handles sensitive data for nearly every US federal agency, was compromised in February by two employees who&#8217;d previously been convicted of hacking into the US State Department. The twin brothers, Muneeb and Suhaib Akhter, had been hired as engineers between 2023 and 2024 despite their criminal histories involving federal wire fraud and hacking charges.<\/p>\n\n\n\n<p>The brothers had access to critical government systems that manage everything from IRS data to Freedom of Information Act requests. Their roles gave them access to two critical software systems: eCASE, which manages audits of government agencies and investigations into waste, fraud and abuse, and FOIAXpress, which processes and tracks public records requests.<\/p>\n\n\n\n<p>The question that should concern every organization: how did two people with criminal convictions for hacking government systems end up with access to some of the most sensitive federal databases in the country?<\/p>\n\n\n\n<p>In 2015, both brothers <a href=\"https:\/\/www.justice.gov\/archives\/opa\/pr\/twin-brothers-sentenced-wire-fraud-conspiring-hack-us-department-state-and-private-company\" target=\"_blank\" rel=\"noopener\" title=\"\">had been sentenced to prison terms<\/a> for previous cybercrimes, including hacking a cosmetics company to steal credit card information and illegally accessing State Department systems to obtain passport and visa information. Yet they were hired by OPEXUS to work on electronic case management for agencies including the Internal Revenue Service, Department of Energy, Defense Department, and the Department of Homeland Security&#8217;s Office of Inspector General.<\/p>\n\n\n\n<p>OPEXUS declined to comment on whether it conducted background checks on the brothers before hiring them. The brothers&#8217; criminal history only surfaced when the FDIC flagged them as insider threats during a background check process for additional security clearance. This led to their termination on February 18, 2025 &#8211; and that&#8217;s when things went very wrong.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-6-1024x574.png\" alt=\"\" class=\"wp-image-23875\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-6-1024x574.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-6-300x168.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-6-768x431.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-6.png 1312w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Attack Unfolds<\/strong><\/h2>\n\n\n\n<p>According to the <a href=\"https:\/\/databreaches.net\/2025\/05\/22\/hack-of-opexus-was-at-root-of-massive-federal-data-breach\/\" target=\"_blank\" rel=\"noopener\" title=\"\">independent cybersecurity investigation by Mandiant<\/a>, the brothers retained access to OPEXUS systems during their termination process. While still on the virtual meeting with HR, Muneeb Akhter accessed an IRS database from his company-issued laptop, blocked others from connecting to it, then proceeded to delete 33 databases, including one containing FOIA requests from numerous government agencies.<\/p>\n\n\n\n<p>More than an hour after being terminated, he inserted a USB drive and copied 1,805 sensitive files related to a government project. Meanwhile, his brother sent an email to dozens of federal government employees warning them about security vulnerabilities at OPEXUS.<\/p>\n\n\n\n<p>The damage was extensive. FOIA requests at numerous federal agencies in February were lost, with some agencies experiencing <a href=\"https:\/\/www.bloomberg.com\/news\/newsletters\/2025-05-21\/how-2-hackers-erased-hundreds-of-foia-requests\" target=\"_blank\" rel=\"noopener\" title=\"\">outages lasting over a month<\/a>. The Export-Import Bank saw all FOIA requests from February 18 to March 18 completely eliminated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>A Growing Problem<\/strong><\/h2>\n\n\n\n<p>This incident isn&#8217;t isolated. According to <a href=\"https:\/\/www.cybersecurity-insiders.com\/2024-insider-threat-report\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Cybersecurity Insiders&#8217; 2024 Insider Threat Report<\/a>, 83% of organizations reported at least one insider attack in the past year. More concerning, <a href=\"https:\/\/www.cybersecurity-insiders.com\/2024-insider-threat-report\/\" target=\"_blank\" rel=\"noopener\" title=\"\">48% of organizations reported<\/a> that insider attacks have become more frequent over the past 12 months.<\/p>\n\n\n\n<p>The statistics reveal a troubling trend:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Around <a href=\"https:\/\/www.stationx.net\/insider-threat-statistics\/\" target=\"_blank\" rel=\"noopener\" title=\"\">60% of data breaches<\/a> are caused or contributed to by insider threats, with 35% of data breaches in 2024 <a href=\"https:\/\/www.stationx.net\/data-breach-statistics\/\" target=\"_blank\" rel=\"noopener\" title=\"\">involving internal threat actors<\/a>, up from 20% in 2023<\/li>\n\n\n\n<li>The total average annual cost of insider risks reached <a href=\"http:\/\/ponemon.dtexsystems.com\" target=\"_blank\" rel=\"noopener\" title=\"\">$17.4 million in 2025<\/a>, up from $16.2 million in 2023 according to the Ponemon Institute<\/li>\n\n\n\n<li><a href=\"http:\/\/stationx.net\/data-breach-statistics\/\" target=\"_blank\" rel=\"noopener\" title=\"\">76% of organizations<\/a> have detected increased insider threat activity over the past five years, but less than 30% believe they have the right tools to handle it<\/li>\n<\/ul>\n\n\n\n<p>What&#8217;s particularly concerning about the OPEXUS case is how the attackers employed what Mandiant investigators described as <a href=\"https:\/\/www.insurancejournal.com\/news\/national\/2025\/05\/21\/824641.htm\" target=\"_blank\" rel=\"noopener\" title=\"\">&#8220;advanced persistent insider threat tactics, which are typically associated with nation state actors.&#8221;<\/a> These weren&#8217;t script kiddies fumbling around &#8211; they knew exactly what they were doing and had the technical skills to maximize damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Went Wrong and How to Fix It<\/strong><\/h2>\n\n\n\n<p>The OPEXUS breach reveals multiple security control failures that organizations can learn from:<\/p>\n\n\n\n<p><strong>1. Hiring and Vetting Processes<\/strong> \u2013 Whether OPEXUS conducted proper background checks remains unclear, but the fact that convicted hackers gained access to sensitive government systems suggests serious gaps in the vetting process. Organizations handling sensitive data need robust screening procedures that go beyond basic checks.<\/p>\n\n\n\n<p><strong>2. Access Control During Transitions<\/strong> \u2013 The brothers retained system access during their termination process, allowing them to cause maximum damage. Proper offboarding procedures should include <a href=\"\/en\/blogs\/access-control-made-easy-rbac-vs-abac-vs-pbac\" target=\"_blank\" rel=\"noopener\" title=\"\">immediate access revocation<\/a>, not gradual phase-outs.<\/p>\n\n\n\n<p><strong>3. Real-Time Monitoring and Response<\/strong> \u2013 Someone deleting 33 databases should trigger immediate alerts and automated responses. The lack of real-time monitoring allowed the attack to continue unchecked.<\/p>\n\n\n\n<p><strong>4. Privilege Management<\/strong> \u2013 Instead of giving employees permanent administrative access, organizations should implement just-in-time privilege elevation. <a href=\"\/en\/endpoint-privilege-management\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request&#8217;s EPM solution<\/a> handles this by providing elevated rights only when needed and automatically revoking them afterward, ensuring users get admin access for specific tasks without leaving security holes open permanently.<\/p>\n\n\n\n<p><strong>5. Behavioral Analytics<\/strong> \u2013 Traditional security focuses on external threats, but insider threats require monitoring for unusual behavior patterns. Someone suddenly accessing databases they don&#8217;t normally use, or copying large amounts of data, should trigger immediate alerts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Ongoing Fallout<\/strong><\/h2>\n\n\n\n<p>The Mandiant report revealed that Muneeb Akhter&#8217;s user account had copied 1,805 files onto a USB drive\u2014&#8221;a major lapse in security measures&#8221;\u2014and deleted dozens of databases, details which OPEXUS initially failed to disclose. This gap between what the company first reported and what investigators found shows how insider threats can be minimized or misunderstood even after they happen.<\/p>\n\n\n\n<p>The ripple effects continue. At least one federal agency (the Department of Health and Human Services) is considering canceling its contract with OPEXUS, and the FBI has expanded its investigation to examine the company&#8217;s broader security practices.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"574\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-2-6-1024x574.png\" alt=\"\" class=\"wp-image-23876\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-2-6-1024x574.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-2-6-300x168.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-2-6-768x431.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-2-6.png 1312w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Time to Take Action<\/strong><\/h2>\n\n\n\n<p>The OPEXUS incident should serve as a wake-up call for organizations handling sensitive data. <a href=\"https:\/\/www.syteca.com\/en\/blog\/insider-threat-statistics-facts-and-figures\" target=\"_blank\" rel=\"noopener\" title=\"\">Gartner predicts<\/a> that half of all medium and large enterprises will adopt formal insider threat programs by 2025, up from 10% in 2023. But predictions and reality don&#8217;t always align.<\/p>\n\n\n\n<p>While we can&#8217;t eliminate insider threats entirely, we can certainly do better than letting former convicted hackers delete government databases during their termination meeting. The technology exists to prevent these attacks, and it&#8217;s time more organizations started using it.<\/p>\n\n\n\n<p>The OPEXUS breach reminds us that in cybersecurity, trust is a luxury we can&#8217;t afford. When it comes to protecting sensitive data, whether it&#8217;s government records or your company&#8217;s intellectual property, the principle should be simple: verify everything, <a href=\"\/en\/blogs\/zero-trust-architecture-7-security-benefits-that-justify-the-investment\" target=\"_blank\" rel=\"noopener\" title=\"\">trust nothing<\/a>, and make sure your security controls can handle threats from inside your own organization.<\/p>\n\n\n\n<p>Because as this case shows, sometimes the biggest threats aren&#8217;t trying to break down your front door &#8211; they might be sitting at the desk next to you.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.<\/p>\n","protected":false},"author":16,"featured_media":23874,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,223,447,455,448,68],"ppma_author":[428],"class_list":["post-23865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-data-breach","tag-hack","tag-insider-threats","tag-news","tag-privileged-access-management","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,data breach,hack,insider threats,news,privileged access management\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\" \/>\n\t\t<meta property=\"og:description\" content=\"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-05-30T06:06:04+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T23:00:06+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#blogposting\",\"name\":\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\",\"headline\":\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/main-7.png\",\"width\":1312,\"height\":736,\"caption\":\"Admin By Request blog post on the OPEXUS insider attack\"},\"datePublished\":\"2025-05-30T06:06:04+00:00\",\"dateModified\":\"2026-01-24T23:00:06+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, Data Breach, Hack, Insider Threats, News, Privileged Access Management, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#listItem\",\"name\":\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#listItem\",\"position\":3,\"name\":\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\",\"name\":\"Government Data Wiped by Insider Hackers in OPEXUS Security Breach\",\"description\":\"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/main-7.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\\\/#mainImage\",\"width\":1312,\"height\":736,\"caption\":\"Admin By Request blog post on the OPEXUS insider attack\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#mainImage\"},\"datePublished\":\"2025-05-30T06:06:04+00:00\",\"dateModified\":\"2026-01-24T23:00:06+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Government Data Wiped by Insider Hackers in OPEXUS Security Breach<\/title>\n\n","aioseo_head_json":{"title":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","description":"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,data breach,hack,insider threats,news,privileged access management","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#blogposting","name":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","headline":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/main-7.png","width":1312,"height":736,"caption":"Admin By Request blog post on the OPEXUS insider attack"},"datePublished":"2025-05-30T06:06:04+00:00","dateModified":"2026-01-24T23:00:06+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#webpage"},"articleSection":"Blogs, Cybersecurity, Data Breach, Hack, Insider Threats, News, Privileged Access Management, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#listItem","name":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#listItem","position":3,"name":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach","name":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","description":"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/main-7.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach\/#mainImage","width":1312,"height":736,"caption":"Admin By Request blog post on the OPEXUS insider attack"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach#mainImage"},"datePublished":"2025-05-30T06:06:04+00:00","dateModified":"2026-01-24T23:00:06+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","og:description":"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-05-30T06:06:04+00:00","article:modified_time":"2026-01-24T23:00:06+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","twitter:description":"Two convicted hackers deleted 33 federal databases in a shocking insider breach at OPEXUS, exposing major flaws in access control and vetting.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"23865","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 23:47:25","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2025-05-30 02:17:18","updated":"2026-01-24 23:47:25"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tGovernment Data Wiped by Insider Hackers in OPEXUS Security Breach\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Government Data Wiped by Insider Hackers in OPEXUS Security Breach","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/government-data-wiped-by-insider-hackers-in-opexus-security-breach"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/23865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=23865"}],"version-history":[{"count":3,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/23865\/revisions"}],"predecessor-version":[{"id":23878,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/23865\/revisions\/23878"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/23874"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=23865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=23865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=23865"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=23865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}