Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Halin Selridge

A 24-year-old hacker has confessed to breaching multiple United States state infrastructure after openly recording his illegal activities on Instagram under the username “ihackedthegovernment.” Nicholas Moore admitted in court to unlawfully penetrating secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, leveraging compromised usernames and passwords to gain entry on multiple instances. Rather than covering his tracks, Moore publicly shared classified details and personal files on online platforms, containing information sourced from a veteran’s health records. The case highlights both the vulnerability of government cybersecurity infrastructure and the irresponsible conduct of digital criminals who prioritise online notoriety over protective measures.

The bold digital breaches

Moore’s cyber intrusion campaign revealed a worrying pattern of systematic, intentional incursions across several government departments. Court filings reveal he accessed the US Supreme Court’s digital filing platform at least 25 times over a span of two months, repeatedly accessing protected systems using credentials he had obtained illegally. Rather than attempting a single opportunistic breach, Moore repeatedly accessed these breached platforms numerous times each day, suggesting a calculated effort to examine confidential data. His actions revealed sensitive information across three separate government institutions, each containing material of considerable national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His choice to record and distribute evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case demonstrates how online hubris can undermine otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Connected to Supreme Court filing system 25 times across a two-month period
  • Breached AmeriCorps accounts and Veterans Affairs health platform
  • Shared screenshots and private data on Instagram to the public
  • Accessed protected networks numerous times each day using stolen credentials

Public admission on social media turns out to be expensive

Nicholas Moore’s decision to broadcast his unlawful conduct on Instagram became his downfall. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and personal information belonging to victims, including sensitive details extracted from veteran health records. This flagrant cataloguing of federal crimes converted what might have gone undetected into conclusive documentation readily available to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be winning over internet contacts rather than profiting from his unauthorised breach. His Instagram account practically operated as a confessional, furnishing authorities with a thorough sequence of events and documentation of his criminal enterprise.

The case serves as a cautionary example for cybercriminals who give priority to internet notoriety over security practices. Moore’s actions revealed a core misunderstanding of the repercussions of broadcasting federal offences. Rather than maintaining anonymity, he created a enduring digital documentation of his unauthorised access, complete with photographic proof and personal commentary. This irresponsible conduct accelerated his identification and prosecution, ultimately culminating in charges and court action that have now entered the public domain. The contrast between Moore’s technical capability and his disastrous decision-making in sharing his activities highlights how social media can transform sophisticated cybercrimes into easily prosecutable offences.

A habit of public boasting

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his criminal abilities. He consistently recorded his entry into classified official systems, sharing screenshots that illustrated his penetration of confidential networks. Each post represented both a confession and a form of digital boasting, meant to display his technical expertise to his online followers. The material he posted contained not only proof of his intrusions but also personal information of individuals whose data he had compromised. This pressing urge to advertise his illegal activities implied that the excitement of infamy mattered more to Moore than the gravity of his actions.

Prosecutors portrayed Moore’s behaviour as performative rather than predatory, highlighting he was motivated primarily by the wish to impress acquaintances rather than utilise stolen information for financial advantage. His Instagram account operated as an accidental confession, with each post offering law enforcement with more evidence of his guilt. The permanence of the platform meant Moore could not remove his crimes from existence; instead, his online bragging created a comprehensive record of his activities encompassing multiple breaches and multiple government agencies. This pattern ultimately sealed his fate, turning what might have been hard-to-prove cybercrimes into clear-cut prosecutions.

Lenient sentences and systemic weaknesses

Nicholas Moore’s sentencing turned out to be notably lenient given the severity of his crimes. Rather than imposing the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, referencing Moore’s precarious situation and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to web-based associates further contributed to the lenient result.

The prosecution’s assessment painted a portrait of a troubled young man rather than a dangerous criminal mastermind. Court documents noted Moore’s chronic health conditions, limited financial resources, and virtually non-existent employment history. Crucially, investigators uncovered nothing that Moore had used the compromised information for personal gain or sold access to external organisations. Instead, his crimes seemed motivated by youthful self-regard and the wish for online acceptance through digital prominence. Judge Howell even remarked during sentencing that Moore’s computing skills pointed to substantial promise for positive contribution to society, provided he reoriented his activities away from criminal activity. This assessment demonstrated a judicial philosophy prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case exposes worrying gaps in US government cybersecurity infrastructure. His capacity to breach Supreme Court filing systems 25 times across two months using stolen credentials suggests alarmingly weak credential oversight and access control protocols. Judge Howell’s sardonic observation about Moore’s capacity for positive impact—given how readily he penetrated restricted networks—underscored the institutional failures that allowed these security incidents. The incident shows that federal organisations remain at risk to fairly basic attacks dependent on stolen login credentials rather than sophisticated technical attacks. This case serves as a cautionary example about the repercussions of weak authentication safeguards across federal systems.

Broader implications for government cyber defence

The Moore case has reignited anxiety over the security stance of American federal agencies. Security experts have long warned that government systems often underperform compared to private sector standards, depending upon legacy technology and variable authentication procedures. The circumstance that a individual lacking formal qualification could repeatedly access the Court’s online document system creates pressing concerns about budget distribution and departmental objectives. Organisations charged with defending classified government data demonstrate insufficient investment in basic security measures, creating vulnerability to exploitative incursions. The breaches exposed not simply organisational records but healthcare data of military personnel, demonstrating how poor cybersecurity adversely influences susceptible communities.

Going forward, cybersecurity experts have advocated for compulsory audits across government and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems repeatedly without triggering alarms points to insufficient monitoring and intrusion detection systems. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, especially considering the increasing sophistication of state-backed and criminal cyber attacks. The Moore case shows that even basic security lapses can compromise classified and sensitive data, making basic security hygiene a issue of national significance.

  • Government agencies require mandatory multi-factor authentication across all systems
  • Routine security assessments and penetration testing should identify potential weaknesses in advance
  • Cybersecurity staffing and training require significant funding growth at federal level