Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Fayley Penman

A 24-year-old digital attacker has pleaded guilty to breaching numerous United States government systems after openly recording his offences on Instagram under the handle “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unlawfully penetrating protected networks operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, employing pilfered usernames and passwords to gain entry on several times. Rather than concealing his activities, Moore openly posted screenshots and sensitive personal information on social media, containing information sourced from a veteran’s medical files. The case highlights both the weakness in state digital defences and the careless actions of online offenders who prioritise online notoriety over security protocols.

The audacious online attacks

Moore’s unauthorised access campaign demonstrated a concerning trend of recurring unauthorised access across numerous state institutions. Court filings show he accessed the US Supreme Court’s digital filing platform at least 25 times over a span of two months, systematically logging into protected systems using credentials he had obtained illegally. Rather than making one isolated intrusion, Moore went back to these compromised systems numerous times each day, indicating a deliberate strategy to examine confidential data. His actions revealed sensitive information across three separate government institutions, each containing information of significant national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His choice to record and distribute evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case exemplifies how online hubris can compromise otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system 25 times over two months
  • Compromised AmeriCorps accounts and Veterans Affairs medical portal
  • Distributed screenshots and personal information on Instagram to the public
  • Logged into restricted systems multiple times daily with compromised login details

Social media confession proves expensive

Nicholas Moore’s decision to broadcast his illegal actions on Instagram became his downfall. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and identifying details belonging to victims, including sensitive details extracted from military medical files. This brazen documentation of federal crimes transformed what might have remained hidden into conclusive documentation readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be impressing online acquaintances rather than gaining monetary advantage from his unlawful entry. His Instagram account essentially functioned as a confessional, supplying law enforcement with a detailed timeline and account of his criminal enterprise.

The case serves as a cautionary tale for digital criminals who give priority to internet notoriety over security practices. Moore’s actions revealed a basic lack of understanding of the repercussions of broadcasting federal offences. Rather than maintaining anonymity, he created a permanent digital record of his intrusions, complete with photographic proof and personal commentary. This reckless behaviour accelerated his identification and prosecution, ultimately leading to charges and court action that have now become public knowledge. The contrast between Moore’s technical capability and his disastrous decision-making in broadcasting his activities highlights how social media can turn advanced cybercrimes into easily prosecutable offences.

A tendency towards public boasting

Moore’s Instagram posts revealed a disturbing pattern of escalating confidence in his illegal capabilities. He consistently recorded his entry into classified official systems, posting images that illustrated his breach into confidential networks. Each post served as both a admission and a form of digital boasting, intended to showcase his hacking prowess to his social media audience. The content he shared included not only proof of his intrusions but also personal information of people whose information he had exposed. This obsessive drive to advertise his illegal activities suggested that the thrill of notoriety mattered more to Moore than the gravity of his actions.

Prosecutors portrayed Moore’s behaviour as performative in nature rather than predatory, observing he seemed driven by the desire to impress acquaintances rather than utilise stolen information for monetary gain. His Instagram account served as an inadvertent confession, with every post offering law enforcement with further evidence of his guilt. The permanence of the platform meant Moore could not erase his crimes from existence; instead, his digital self-promotion created a detailed record of his activities covering multiple breaches and multiple government agencies. This pattern ultimately determined his fate, turning what might have been difficult-to-prove cybercrimes into straightforward cases.

Lenient sentences and structural vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the severity of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors declined to recommend custodial punishment, pointing to Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to web-based associates further influenced the lenient outcome.

The prosecution’s assessment depicted a disturbed youth rather than a dangerous criminal mastermind. Court documents highlighted Moore’s persistent impairments, restricted monetary means, and almost entirely absent employment history. Crucially, investigators discovered no indication that Moore had exploited the stolen information for financial advantage or provided entry to external organisations. Instead, his crimes seemed motivated by youthful arrogance and the need for online acceptance through digital prominence. Judge Howell additionally observed during sentencing that Moore’s technical proficiency indicated considerable capacity for beneficial participation to society, provided he refocused his efforts away from criminal activity. This assessment reflected a sentencing approach emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case exposes troubling gaps in US government cybersecurity infrastructure. His ability to access Supreme Court document repositories 25 times across two months using compromised login details suggests concerningly weak password management and permission management protocols. Judge Howell’s pointed commentary about Moore’s potential for good—given how readily he accessed sensitive systems—underscored the systemic breakdowns that facilitated these intrusions. The incident demonstrates that federal organisations remain vulnerable to fairly basic attacks exploiting stolen login credentials rather than advanced technical exploits. This case acts as a cautionary tale about the consequences of inadequate credential security across federal systems.

Extended implications for government cyber defence

The Moore case has revived anxiety over the digital defence position of federal government institutions. Cybersecurity specialists have long warned that state systems often underperform compared to private enterprise practices, relying on legacy technology and inconsistent password protocols. The circumstance that a 24-year-old with no formal training could gain multiple times access to the US Supreme Court’s electronic filing system creates pressing concerns about financial priorities and institutional priorities. Bodies responsible for safeguarding critical state information appear to have underinvested in fundamental protective systems, creating vulnerability to targeted breaches. The incidents disclosed not just organisational records but medical information from service members, illustrating how weak digital security significantly affects susceptible communities.

Looking ahead, cybersecurity experts have advocated for compulsory audits across government and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to implement multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems repeatedly without triggering alarms points to insufficient monitoring and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and infrastructure upgrades, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case shows that even basic security lapses can compromise classified and sensitive information, making basic security practices a matter of national importance.

  • Public sector organisations need mandatory multi-factor authentication across all systems
  • Regular security audits and security testing should identify vulnerabilities proactively
  • Security personnel and development demands significant funding growth across federal government