Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Tyden Garwood

A 24-year-old hacker has pleaded guilty to breaching numerous United States government systems after publicly sharing his crimes on Instagram under the account name “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unauthorisedly entering protected networks run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, employing pilfered usernames and passwords to gain entry on several times. Rather than hiding the evidence, Moore brazenly distributed screenshots and sensitive personal information on digital networks, including details extracted from a veteran’s personal healthcare information. The case demonstrates both the weakness in state digital defences and the irresponsible conduct of online offenders who seek internet fame over operational security.

The audacious digital breaches

Moore’s unauthorised access campaign revealed a troubling pattern of recurring unauthorised access across numerous state institutions. Court filings reveal he accessed the US Supreme Court’s online filing infrastructure at least 25 times over a two-month period, systematically logging into protected systems using credentials he had acquired unlawfully. Rather than attempting a single opportunistic breach, Moore repeatedly accessed these compromised systems several times per day, implying a planned approach to investigate restricted materials. His actions exposed classified data across three different government departments, each containing data of substantial national significance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case demonstrates how online hubris can undermine otherwise sophisticated hacking attempts, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Connected to Supreme Court filing system on 25 occasions over two months
  • Infiltrated AmeriCorps accounts and Veterans Affairs medical portal
  • Distributed screenshots and private data on Instagram to the public
  • Gained entry to protected networks multiple times daily using stolen credentials

Public admission on social media turns out to be costly

Nicholas Moore’s choice to publicise his criminal activity on Instagram turned out to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and private data belonging to victims, including sensitive details extracted from military medical files. This audacious recording of federal crimes transformed what might have remained hidden into irrefutable evidence readily available to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be impressing online acquaintances rather than benefiting financially from his unlawful entry. His Instagram account effectively served as a confessional, supplying law enforcement with a detailed timeline and account of his criminal enterprise.

The case serves as a warning example for cyber offenders who give priority to online infamy over security practices. Moore’s actions revealed a basic lack of understanding of the consequences associated with publicising federal crimes. Rather than preserving anonymity, he produced a permanent digital record of his unauthorised access, complete with photographic proof and personal commentary. This reckless behaviour accelerated his identification and legal action, ultimately leading to criminal charges and legal proceedings that have now entered the public domain. The contrast between Moore’s technical proficiency and his disastrous decision-making in broadcasting his activities highlights how social networks can transform sophisticated cybercrimes into readily prosecutable crimes.

A tendency towards open bragging

Moore’s Instagram posts revealed a disturbing pattern of escalating confidence in his illegal capabilities. He repeatedly documented his access to restricted government platforms, sharing screenshots that demonstrated his penetration of confidential networks. Each post constituted both a admission and a form of online bragging, meant to highlight his hacking prowess to his online followers. The content he shared included not only evidence of his breaches but also personal information belonging to people whose information he had exposed. This compulsive need to advertise his illegal activities implied that the thrill of notoriety mattered more to Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as more performative than predatory, observing he appeared motivated by the urge to gain approval from acquaintances rather than utilise stolen information for financial exploitation. His Instagram account operated as an accidental confession, with each post providing law enforcement with additional evidence of his guilt. The permanence of the platform meant Moore could not erase his crimes from existence; instead, his digital self-promotion created a comprehensive record of his activities spanning multiple breaches and numerous government agencies. This pattern ultimately determined his fate, transforming what might have been hard-to-prove cybercrimes into straightforward cases.

Lenient sentencing and structural vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than imposing the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors refrained from recommending custodial punishment, pointing to Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to online acquaintances further contributed to the lenient result.

The prosecution’s own assessment painted a portrait of a young man with significant difficulties rather than a serious organised crime figure. Court documents noted Moore’s persistent impairments, limited financial resources, and almost entirely absent employment history. Crucially, investigators uncovered nothing that Moore had exploited the stolen information for financial advantage or provided entry to external organisations. Instead, his crimes were apparently propelled by youthful self-regard and the desire for online acceptance through internet fame. Judge Howell further noted during sentencing that Moore’s technical capabilities pointed to substantial promise for constructive involvement to society, provided he reoriented his activities away from criminal activity. This assessment demonstrated a sentencing approach prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case reveals troubling gaps in American federal cyber security infrastructure. His ability to access Supreme Court document repositories 25 times across two months using compromised login details suggests alarmingly weak password management and permission management protocols. Judge Howell’s pointed commentary about Moore’s capacity for positive impact—given how easily he breached restricted networks—underscored the organisational shortcomings that allowed these security incidents. The incident illustrates that public sector bodies remain exposed to fairly basic attacks exploiting breached account details rather than sophisticated technical attacks. This case serves as a cautionary example about the repercussions of weak authentication safeguards across federal systems.

Extended implications for government cyber defence

The Moore case has revived concerns about the digital defence position of US government bodies. Security experts have long warned that public sector infrastructure often fall short of commercial industry benchmarks, making use of aging systems and inconsistent password protocols. The reality that a individual lacking formal qualification could continually breach the Court’s online document system prompts difficult inquiries about resource allocation and organisational focus. Organisations charged with defending critical state information demonstrate insufficient investment in fundamental protective systems, leaving themselves vulnerable to exploitative incursions. The leaks revealed not simply administrative files but personal health records belonging to veterans, showing how poor cybersecurity significantly affects at-risk groups.

Looking ahead, cybersecurity experts have advocated for compulsory audits across government and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor authentication and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems repeatedly without triggering alarms suggests inadequate oversight and intrusion detection systems. Federal agencies must prioritise investment in skilled cybersecurity personnel and infrastructure upgrades, especially considering the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case demonstrates that even basic security lapses can compromise classified and sensitive data, making basic security practices a issue of national significance.

  • Public sector organisations require compulsory multi-factor authentication throughout all systems
  • Routine security assessments and security testing should identify potential weaknesses in advance
  • Security personnel and training require significant funding growth at federal level