Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Brelen Warridge

A 24-year-old hacker has confessed to breaching numerous United States state infrastructure after openly recording his crimes on Instagram under the account name “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unauthorisedly entering protected networks belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, using stolen usernames and passwords to break in on several times. Rather than hiding the evidence, Moore brazenly distributed screenshots and sensitive personal information on social media, with data obtained from a veteran’s personal healthcare information. The case highlights both the fragility of government cybersecurity infrastructure and the irresponsible conduct of online offenders who prioritise online notoriety over protective measures.

The audacious online attacks

Moore’s hacking spree revealed a troubling pattern of systematic, intentional incursions across several government departments. Court filings reveal he penetrated the US Supreme Court’s electronic filing system at least 25 times over a two-month period, systematically logging into secure networks using credentials he had acquired unlawfully. Rather than making one isolated intrusion, Moore went back to these compromised systems multiple times daily, suggesting a calculated effort to investigate restricted materials. His actions compromised protected data across three different government departments, each containing data of substantial national significance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a publicly documented criminal record. The case exemplifies how online hubris can undermine otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Accessed Supreme Court document repository on 25 occasions across a two-month period
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Distributed screenshots and personal information on Instagram to the public
  • Logged into restricted systems numerous times each day using stolen credentials

Public admission on social media turns out to be costly

Nicholas Moore’s choice to publicise his illegal actions on Instagram became his downfall. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and personal information belonging to victims, including sensitive details extracted from armed forces healthcare data. This flagrant cataloguing of federal crimes converted what might have remained hidden into irrefutable evidence readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than gaining monetary advantage from his illicit access. His Instagram account essentially functioned as a confessional, providing investigators with a detailed timeline and documentation of his criminal enterprise.

The case constitutes a cautionary example for cybercriminals who prioritise online infamy over operational security. Moore’s actions demonstrated a core misunderstanding of the consequences associated with disclosing federal crimes. Rather than staying anonymous, he produced a permanent digital record of his unauthorised access, complete with photographic proof and personal observations. This irresponsible conduct expedited his apprehension and prosecution, ultimately resulting in criminal charges and legal proceedings that have now entered the public domain. The contrast between Moore’s technical skill and his catastrophic judgment in sharing his activities highlights how social networks can transform sophisticated cybercrimes into readily prosecutable crimes.

A habit of public boasting

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his illegal capabilities. He repeatedly documented his entry into classified official systems, posting images that proved his infiltration of sensitive systems. Each post constituted both a confession and a form of digital boasting, designed to showcase his technical expertise to his online followers. The material he posted included not only proof of his intrusions but also personal information of people whose information he had exposed. This pressing urge to publicise his crimes implied that the thrill of notoriety mattered more to Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative in nature rather than predatory, highlighting he appeared motivated by the desire to impress acquaintances rather than utilise stolen information for monetary gain. His Instagram account functioned as an unintentional admission, with every post supplying law enforcement with further evidence of his guilt. The enduring nature of the platform meant Moore was unable to remove his crimes from existence; instead, his online bragging created a detailed record of his activities covering multiple breaches and various government agencies. This pattern ultimately sealed his fate, converting what might have been hard-to-prove cybercrimes into straightforward cases.

Lenient sentences and structural weaknesses

Nicholas Moore’s sentencing turned out to be notably lenient given the severity of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, pointing to Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to online acquaintances further shaped the lenient decision.

The prosecution assessment characterised a young man with significant difficulties rather than a serious organised crime figure. Court documents noted Moore’s persistent impairments, restricted monetary means, and almost entirely absent employment history. Crucially, investigators discovered no indication that Moore had misused the pilfered data for private benefit or sold access to third parties. Instead, his crimes were apparently propelled by adolescent overconfidence and the wish for social validation through online notoriety. Judge Howell further noted during sentencing that Moore’s computing skills suggested significant potential for beneficial participation to society, provided he reoriented his activities away from criminal activity. This assessment reflected a judicial philosophy stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case exposes troubling gaps in American federal cyber security infrastructure. His capacity to breach Supreme Court filing systems 25 times across two months using compromised login details suggests alarmingly weak credential oversight and permission management protocols. Judge Howell’s sardonic observation about Moore’s potential for good—given how readily he penetrated restricted networks—underscored the institutional failures that facilitated these intrusions. The incident demonstrates that public sector bodies remain at risk to relatively unsophisticated attacks dependent on compromised usernames and passwords rather than complex technical methods. This case functions as a warning example about the repercussions of inadequate credential security across federal systems.

Broader implications for government cybersecurity

The Moore case has revived worries regarding the security stance of American federal agencies. Security experts have repeatedly flagged that government systems often fall short of private sector standards, relying on outdated infrastructure and irregular security procedures. The reality that a individual lacking formal qualification could continually breach the US Supreme Court’s electronic filing system raises uncomfortable questions about financial priorities and departmental objectives. Bodies responsible for safeguarding critical state information appear to have underinvested in basic security measures, exposing themselves to opportunistic attacks. The incidents disclosed not simply administrative files but medical information of military personnel, demonstrating how weak digital security directly impacts at-risk groups.

Looking ahead, cybersecurity experts have urged mandatory government-wide audits and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to implement multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without setting off alerts suggests insufficient monitoring and intrusion detection capabilities. Federal agencies must prioritise investment in skilled cybersecurity personnel and infrastructure upgrades, especially considering the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case illustrates that even low-tech breaches can compromise classified and sensitive information, making basic security practices a matter of national importance.

  • Public sector organisations require mandatory multi-factor authentication across all systems
  • Regular security audits and penetration testing should identify vulnerabilities proactively
  • Security personnel and development demands significant funding growth across federal government