Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Camven Garston

A 24-year-old cybercriminal has admitted to gaining unauthorised access to numerous United States government systems after brazenly documenting his crimes on Instagram under the handle “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unlawfully penetrating protected networks run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, leveraging compromised usernames and passwords to obtain access on numerous occasions. Rather than concealing his activities, Moore openly posted screenshots and sensitive personal information on digital networks, including details extracted from a veteran’s medical files. The case demonstrates both the fragility of state digital defences and the reckless behaviour of cyber perpetrators who prioritise online notoriety over security protocols.

The shameless digital breaches

Moore’s hacking spree revealed a concerning trend of recurring unauthorised access across numerous state institutions. Court filings show he penetrated the US Supreme Court’s electronic filing system at least 25 times over a two-month period, consistently entering protected systems using credentials he had obtained illegally. Rather than attempting a single opportunistic breach, Moore went back to these infiltrated networks several times per day, implying a planned approach to investigate restricted materials. His actions exposed classified data across three separate government institutions, each containing data of substantial national significance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how digital arrogance can compromise otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Accessed Supreme Court filing system on 25 occasions over two months
  • Breached AmeriCorps systems and Veterans Affairs health platform
  • Distributed screenshots and private data on Instagram publicly
  • Logged into protected networks multiple times daily using stolen credentials

Social media confession proves expensive

Nicholas Moore’s decision to broadcast his criminal activity on Instagram proved to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and identifying details belonging to victims, including restricted records extracted from veteran health records. This brazen documentation of federal crimes transformed what might have remained hidden into undeniable proof easily accessible to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than profiting from his unauthorised breach. His Instagram account essentially functioned as a confessional, furnishing authorities with a thorough sequence of events and record of his criminal enterprise.

The case serves as a cautionary tale for cyber offenders who prioritise digital notoriety over operational security. Moore’s actions revealed a basic lack of understanding of the ramifications linked to disclosing federal crimes. Rather than maintaining anonymity, he generated a lasting digital trail of his unauthorised access, complete with visual documentation and personal observations. This careless actions accelerated his identification and prosecution, ultimately leading to criminal charges and legal proceedings that have now become public knowledge. The contrast between Moore’s technical capability and his disastrous decision-making in broadcasting his activities highlights how social networks can turn advanced cybercrimes into straightforward prosecutable offences.

A habit of overt self-promotion

Moore’s Instagram posts showed a troubling pattern of escalating confidence in his illegal capabilities. He repeatedly documented his access to classified official systems, posting images that demonstrated his breach into sensitive systems. Each post represented both a admission and a form of digital boasting, meant to display his hacking prowess to his social media audience. The content he shared contained not only proof of his intrusions but also personal information belonging to people whose information he had exposed. This compulsive need to advertise his illegal activities indicated that the excitement of infamy took precedence over Moore than the seriousness of what he had done.

Prosecutors characterised Moore’s behaviour as performative in nature rather than predatory, highlighting he seemed driven by the urge to gain approval from acquaintances rather than leverage stolen information for financial exploitation. His Instagram account functioned as an inadvertent confession, with each upload supplying law enforcement with further evidence of his guilt. The enduring nature of the platform meant Moore could not remove his crimes from existence; instead, his digital boasting created a detailed record of his activities encompassing multiple breaches and various government agencies. This pattern ultimately sealed his fate, converting what might have been challenging cybercrimes to prove into straightforward cases.

Lenient sentences and systemic weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the severity of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s precarious situation and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s absence of financial motive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to internet contacts further influenced the lenient outcome.

The prosecution’s assessment depicted a troubled young man rather than a dangerous criminal mastermind. Court documents noted Moore’s chronic health conditions, restricted monetary means, and practically non-existent employment history. Crucially, investigators uncovered nothing that Moore had used the compromised information for personal gain or provided entry to other individuals. Instead, his crimes seemed motivated by youthful arrogance and the wish for social validation through internet fame. Judge Howell further noted during sentencing that Moore’s technical capabilities suggested significant potential for positive contribution to society, provided he redirected his interests away from criminal activity. This assessment embodied a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case uncovers concerning gaps in US government cybersecurity infrastructure. His ability to access Supreme Court document repositories 25 times across two months using stolen credentials suggests concerningly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s potential for good—given how effortlessly he accessed sensitive systems—underscored the systemic breakdowns that enabled these breaches. The incident demonstrates that government agencies remain vulnerable to relatively unsophisticated attacks relying on breached account details rather than complex technical methods. This case acts as a cautionary example about the repercussions of inadequate credential security across public sector infrastructure.

Wider implications for government cybersecurity

The Moore case has reignited anxiety over the cybersecurity posture of federal government institutions. Security experts have repeatedly flagged that state systems often lag behind private sector standards, making use of aging systems and irregular security procedures. The fact that a young person without professional credentials could continually breach the US Supreme Court’s electronic filing system prompts difficult inquiries about resource allocation and organisational focus. Bodies responsible for safeguarding critical state information seem to have under-resourced in basic security measures, creating vulnerability to targeted breaches. The breaches exposed not just internal documents but personal health records of military personnel, demonstrating how poor cybersecurity significantly affects susceptible communities.

Looking ahead, cybersecurity experts have urged mandatory government-wide audits and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to introduce multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems repeatedly without setting off alerts indicates insufficient monitoring and intrusion detection capabilities. Federal agencies must prioritise investment in skilled cybersecurity personnel and system improvements, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case demonstrates that even basic security lapses can reveal classified and sensitive data, making basic security practices a matter of national importance.

  • Public sector organisations need compulsory multi-factor authentication throughout all systems
  • Regular security audits and penetration testing should identify vulnerabilities proactively
  • Security personnel and development demands significant funding growth at federal level