Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Elkin Fenland

A 24-year-old cybercriminal has pleaded guilty to breaching multiple United States government systems after publicly sharing his illegal activities on Instagram under the account name “ihackedthegovernment.” Nicholas Moore admitted in court to unauthorisedly entering secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, employing pilfered usernames and passwords to break in on numerous occasions. Rather than covering his tracks, Moore brazenly distributed confidential data and private records on online platforms, containing information sourced from a veteran’s health records. The case underscores both the vulnerability of federal security systems and the irresponsible conduct of cyber perpetrators who pursue digital celebrity over security protocols.

The bold cyber intrusions

Moore’s hacking spree demonstrated a concerning trend of repeated, deliberate breaches across several government departments. Court filings show he gained entry to the US Supreme Court’s electronic filing system at least 25 times over a period lasting two months, repeatedly accessing secure networks using credentials he had acquired unlawfully. Rather than making one isolated intrusion, Moore went back to these breached platforms several times per day, implying a planned approach to investigate restricted materials. His actions compromised protected data across three distinct state agencies, each containing information of significant national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case exemplifies how digital arrogance can undermine otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Connected to Supreme Court document repository 25 times over two months
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Distributed screenshots and personal information on Instagram publicly
  • Logged into restricted systems numerous times each day with compromised login details

Public admission on social media turns out to be expensive

Nicholas Moore’s decision to broadcast his criminal activity on Instagram turned out to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and personal information belonging to victims, including restricted records extracted from military medical files. This flagrant cataloguing of federal crimes changed what might have gone undetected into conclusive documentation readily available to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be winning over internet contacts rather than gaining monetary advantage from his illicit access. His Instagram account essentially functioned as a confessional, providing investigators with a thorough sequence of events and documentation of his criminal enterprise.

The case represents a cautionary example for cybercriminals who give priority to internet notoriety over security protocols. Moore’s actions demonstrated a basic lack of understanding of the consequences associated with publicising federal crimes. Rather than maintaining anonymity, he produced a permanent digital record of his unauthorised access, complete with photographic proof and personal commentary. This irresponsible conduct accelerated his identification and prosecution, ultimately leading to criminal charges and legal proceedings that have now entered the public domain. The contrast between Moore’s technical capability and his disastrous decision-making in broadcasting his activities highlights how online platforms can convert complex cybercrimes into straightforward prosecutable offences.

A pattern of public boasting

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his illegal capabilities. He consistently recorded his access to restricted government platforms, sharing screenshots that proved his breach into confidential networks. Each post served as both a admission and a form of digital boasting, intended to highlight his technical expertise to his online followers. The content he shared included not only proof of his intrusions but also private data of individuals whose data he had compromised. This pressing urge to publicise his crimes indicated that the thrill of notoriety took precedence over Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as performative in nature rather than predatory, highlighting he seemed driven by the urge to gain approval from acquaintances rather than utilise stolen information for financial advantage. His Instagram account functioned as an accidental confession, with each post offering law enforcement with more evidence of his guilt. The platform’s permanence meant Moore was unable to delete his crimes from existence; instead, his digital boasting created a comprehensive record of his activities encompassing multiple breaches and numerous government agencies. This pattern ultimately sealed his fate, turning what might have been challenging cybercrimes to prove into clear-cut prosecutions.

Mild sentencing and systemic vulnerabilities

Nicholas Moore’s sentencing proved remarkably lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors refrained from recommending custodial punishment, pointing to Moore’s vulnerable circumstances and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s absence of financial motive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to online acquaintances further contributed to the lenient result.

The prosecution’s own assessment painted a portrait of a troubled young man rather than a serious organised crime figure. Court documents recorded Moore’s long-term disabilities, limited financial resources, and almost entirely absent employment history. Crucially, investigators found no evidence that Moore had exploited the stolen information for financial advantage or provided entry to other individuals. Instead, his crimes seemed motivated by youthful arrogance and the need for social validation through internet fame. Judge Howell additionally observed during sentencing that Moore’s technical proficiency pointed to substantial promise for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment embodied a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case uncovers troubling gaps in US government cyber security infrastructure. His success in entering Supreme Court document repositories 25 times across two months using pilfered access credentials suggests alarmingly weak credential oversight and access control protocols. Judge Howell’s pointed commentary about Moore’s potential for good—given how effortlessly he penetrated restricted networks—underscored the organisational shortcomings that allowed these intrusions. The incident demonstrates that federal organisations remain exposed to relatively unsophisticated attacks exploiting compromised usernames and passwords rather than complex technical methods. This case acts as a warning example about the consequences of inadequate credential security across public sector infrastructure.

Broader implications for public sector cyber security

The Moore case has reignited anxiety over the security stance of US government bodies. Security experts have long warned that government systems often lag behind private enterprise practices, relying on legacy technology and variable authentication procedures. The circumstance that a young person without professional credentials could continually breach the Supreme Court’s digital filing platform prompts difficult inquiries about budget distribution and organisational focus. Organisations charged with defending critical state information demonstrate insufficient investment in basic security measures, leaving themselves vulnerable to opportunistic attacks. The breaches exposed not merely administrative files but healthcare data belonging to veterans, demonstrating how inadequate protection directly impacts susceptible communities.

Moving forward, cybersecurity experts have advocated for mandatory government-wide audits and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to introduce multi-factor verification and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without setting off alerts points to inadequate oversight and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case demonstrates that even low-tech breaches can reveal classified and sensitive information, making basic security practices a issue of national significance.

  • Public sector organisations need compulsory multi-factor authentication across all systems
  • Routine security assessments and penetration testing should identify vulnerabilities proactively
  • Cybersecurity staffing and training require substantial budget increases at federal level