Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Shain Haldale

A 24-year-old hacker has admitted to breaching several United States federal networks after brazenly documenting his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unlawfully penetrating secure systems belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, using stolen usernames and passwords to gain entry on multiple instances. Rather than hiding the evidence, Moore publicly shared screenshots and sensitive personal information on online platforms, containing information sourced from a veteran’s medical files. The case underscores both the weakness in federal security systems and the careless actions of online offenders who seek internet fame over operational security.

The shameless cyber intrusions

Moore’s unauthorised access campaign showed a concerning trend of systematic, intentional incursions across numerous state institutions. Court filings reveal he gained entry to the US Supreme Court’s digital filing platform at least 25 times over a two-month period, consistently entering restricted platforms using credentials he had acquired unlawfully. Rather than conducting a lone opportunistic attack, Moore repeatedly accessed these breached platforms multiple times daily, indicating a deliberate strategy to examine confidential data. His actions exposed classified data across three different government departments, each containing material of considerable national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case demonstrates how online hubris can undermine otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Accessed Supreme Court document repository on 25 occasions across a two-month period
  • Breached AmeriCorps accounts and Veterans Affairs medical portal
  • Posted screenshots and private data on Instagram to the public
  • Logged into protected networks multiple times daily using stolen credentials

Social media confession proves expensive

Nicholas Moore’s choice to publicise his criminal activity on Instagram proved to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and personal information belonging to victims, including confidential information extracted from armed forces healthcare data. This flagrant cataloguing of federal crimes converted what might have stayed concealed into undeniable proof promptly obtainable to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than profiting from his unauthorised breach. His Instagram account practically operated as a confessional, providing investigators with a thorough sequence of events and documentation of his criminal enterprise.

The case serves as a warning example for cybercriminals who prioritise online infamy over operational security. Moore’s actions showed a fundamental misunderstanding of the consequences associated with publicising federal crimes. Rather than maintaining anonymity, he generated a enduring digital documentation of his unauthorised access, complete with photographic proof and personal commentary. This careless actions hastened his apprehension and prosecution, ultimately resulting in criminal charges and legal proceedings that have now become public knowledge. The contrast between Moore’s technical skill and his catastrophic judgment in sharing his activities highlights how social media can turn advanced cybercrimes into easily prosecutable offences.

A pattern of public boasting

Moore’s Instagram posts revealed a troubling pattern of growing self-assurance in his illegal capabilities. He consistently recorded his access to restricted government platforms, sharing screenshots that proved his penetration of sensitive systems. Each post represented both a confession and a form of online bragging, meant to showcase his hacking prowess to his online followers. The material he posted contained not only proof of his intrusions but also personal information of people whose information he had exposed. This obsessive drive to broadcast his offences indicated that the thrill of notoriety mattered more to Moore than the seriousness of what he had done.

Prosecutors characterised Moore’s behaviour as performative rather than predatory, highlighting he appeared motivated by the desire to impress acquaintances rather than leverage stolen information for financial advantage. His Instagram account functioned as an accidental confession, with each post providing law enforcement with more evidence of his guilt. The enduring nature of the platform meant Moore could not remove his crimes from existence; instead, his online bragging created a detailed record of his activities spanning multiple breaches and numerous government agencies. This pattern ultimately determined his fate, transforming what might have been challenging cybercrimes to prove into straightforward cases.

Mild sentencing and structural weaknesses

Nicholas Moore’s sentencing turned out to be notably lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors declined to recommend custodial punishment, referencing Moore’s precarious situation and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of financial motivation for the breaches and lack of harmful intent beyond demonstrating his technical prowess to web-based associates further contributed to the lenient result.

The prosecution’s evaluation painted a portrait of a disturbed youth rather than a major criminal operator. Court documents highlighted Moore’s chronic health conditions, limited financial resources, and virtually non-existent employment history. Crucially, investigators found no evidence that Moore had exploited the stolen information for financial advantage or provided entry to other individuals. Instead, his crimes appeared driven by youthful self-regard and the desire for online acceptance through digital prominence. Judge Howell additionally observed during sentencing that Moore’s technical proficiency suggested significant potential for beneficial participation to society, provided he refocused his efforts away from criminal activity. This assessment embodied a judicial philosophy stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case uncovers worrying gaps in US government cyber security infrastructure. His success in entering Supreme Court filing systems 25 times over two months using pilfered access credentials suggests alarmingly weak credential oversight and access control protocols. Judge Howell’s wry remark about Moore’s potential for good—given how readily he accessed sensitive systems—underscored the institutional failures that enabled these breaches. The incident demonstrates that government agencies remain at risk to moderately simple attacks dependent on breached account details rather than advanced technical exploits. This case serves as a warning example about the implications of weak authentication safeguards across government networks.

Wider implications for government cyber defence

The Moore case has rekindled concerns about the cybersecurity posture of American federal agencies. Cybersecurity specialists have long warned that public sector infrastructure often underperform compared to private enterprise practices, relying on legacy technology and variable authentication procedures. The fact that a individual lacking formal qualification could gain multiple times access to the US Supreme Court’s electronic filing system prompts difficult inquiries about resource allocation and institutional priorities. Organisations charged with defending classified government data seem to have under-resourced in essential security safeguards, leaving themselves vulnerable to targeted breaches. The incidents disclosed not simply internal documents but personal health records belonging to veterans, illustrating how inadequate protection significantly affects vulnerable populations.

Going forward, cybersecurity experts have advocated for mandatory government-wide audits and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without setting off alerts indicates inadequate oversight and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, especially considering the increasing sophistication of state-backed and criminal cyber attacks. The Moore case shows that even low-tech breaches can expose classified and sensitive data, making basic security hygiene a matter of national importance.

  • Government agencies require compulsory multi-factor authentication throughout all systems
  • Routine security assessments and security testing should identify potential weaknesses in advance
  • Cybersecurity staffing and training require significant funding growth at federal level