Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Tylen Holridge

A 24-year-old hacker has confessed to infiltrating numerous United States state infrastructure after openly recording his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unauthorisedly entering secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, employing pilfered usernames and passwords to gain entry on several times. Rather than concealing his activities, Moore publicly shared screenshots and sensitive personal information on digital networks, including details extracted from a veteran’s personal healthcare information. The case highlights both the vulnerability of government cybersecurity infrastructure and the reckless behaviour of cyber perpetrators who seek internet fame over protective measures.

The bold cyber intrusions

Moore’s unauthorised access campaign showed a worrying pattern of systematic, intentional incursions across multiple government agencies. Court filings disclose he gained entry to the US Supreme Court’s electronic filing system at least 25 times over a two-month period, consistently entering protected systems using credentials he had acquired unlawfully. Rather than making one isolated intrusion, Moore returned to these compromised systems multiple times daily, indicating a deliberate strategy to investigate restricted materials. His actions compromised protected data across three separate government institutions, each containing data of substantial national significance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case exemplifies how online hubris can compromise otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Accessed Supreme Court filing system 25 times over two months
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Posted screenshots and private data on Instagram publicly
  • Logged into restricted systems multiple times daily using stolen credentials

Social media confession turns out to be expensive

Nicholas Moore’s decision to broadcast his unlawful conduct on Instagram turned out to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and identifying details belonging to victims, including sensitive details extracted from veteran health records. This brazen documentation of federal crimes converted what might have stayed concealed into undeniable proof readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be impressing online acquaintances rather than profiting from his unlawful entry. His Instagram account practically operated as a confessional, supplying law enforcement with a comprehensive chronology and documentation of his criminal enterprise.

The case constitutes a cautionary tale for digital criminals who give priority to digital notoriety over security practices. Moore’s actions showed a basic lack of understanding of the consequences associated with broadcasting federal offences. Rather than staying anonymous, he produced a permanent digital record of his illegal entry, complete with visual documentation and personal observations. This irresponsible conduct expedited his apprehension and prosecution, ultimately culminating in charges and court action that have now become widely known. The contrast between Moore’s technical skill and his disastrous decision-making in broadcasting his activities highlights how online platforms can transform sophisticated cybercrimes into easily prosecutable offences.

A tendency towards public boasting

Moore’s Instagram posts revealed a disturbing pattern of escalating confidence in his illegal capabilities. He continually logged his access to classified official systems, posting images that illustrated his infiltration of sensitive systems. Each post served as both a admission and a form of digital boasting, designed to display his technical expertise to his social media audience. The content he shared included not only proof of his intrusions but also personal information of people whose information he had exposed. This pressing urge to advertise his illegal activities suggested that the thrill of notoriety was more important to Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as performative in nature rather than predatory, observing he seemed driven by the urge to gain approval from acquaintances rather than utilise stolen information for financial exploitation. His Instagram account served as an accidental confession, with each post offering law enforcement with more evidence of his guilt. The enduring nature of the platform meant Moore could not simply erase his crimes from existence; instead, his digital boasting created a detailed record of his activities encompassing multiple breaches and numerous government agencies. This pattern ultimately determined his fate, turning what might have been challenging cybercrimes to prove into straightforward prosecutions.

Lenient sentences and systemic weaknesses

Nicholas Moore’s sentencing turned out to be notably lenient given the seriousness of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of monetary incentive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to web-based associates further influenced the lenient outcome.

The prosecution’s evaluation depicted a young man with significant difficulties rather than a dangerous criminal mastermind. Court documents recorded Moore’s long-term disabilities, constrained economic circumstances, and almost entirely absent employment history. Crucially, investigators found no evidence that Moore had exploited the stolen information for financial advantage or provided entry to other individuals. Instead, his crimes appeared driven by adolescent overconfidence and the wish for social validation through digital prominence. Judge Howell even remarked during sentencing that Moore’s technical proficiency suggested significant potential for beneficial participation to society, provided he redirected his interests away from criminal activity. This assessment demonstrated a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case exposes worrying gaps in American federal cybersecurity infrastructure. His capacity to breach Supreme Court document repositories 25 times over two months using pilfered access credentials suggests alarmingly weak credential oversight and permission management protocols. Judge Howell’s pointed commentary about Moore’s capacity for positive impact—given how easily he breached sensitive systems—underscored the systemic breakdowns that allowed these breaches. The incident demonstrates that public sector bodies remain vulnerable to fairly basic attacks dependent on compromised usernames and passwords rather than advanced technical exploits. This case functions as a warning example about the repercussions of inadequate credential security across federal systems.

Wider implications for government cybersecurity

The Moore case has revived worries regarding the digital defence position of American federal agencies. Cybersecurity specialists have repeatedly flagged that state systems often underperform compared to private enterprise practices, relying on legacy technology and inconsistent password protocols. The fact that a 24-year-old with no formal training could gain multiple times access to the US Supreme Court’s electronic filing system prompts difficult inquiries about resource allocation and organisational focus. Agencies tasked with protecting classified government data appear to have underinvested in basic security measures, exposing themselves to targeted breaches. The leaks revealed not simply organisational records but medical information from service members, showing how weak digital security adversely influences vulnerable populations.

Moving forward, cybersecurity experts have advocated for mandatory government-wide audits and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to implement multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without triggering alarms points to insufficient monitoring and intrusion detection systems. Federal agencies must prioritise investment in skilled cybersecurity personnel and system improvements, particularly given the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case illustrates that even low-tech breaches can expose classified and sensitive information, making basic security practices a issue of national significance.

  • Public sector organisations need compulsory multi-factor authentication throughout all systems
  • Regular security audits and security testing should identify potential weaknesses in advance
  • Security personnel and development demands substantial budget increases at federal level