Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Maara Dawley

A 24-year-old cybercriminal has pleaded guilty to breaching several United States federal networks after openly recording his illegal activities on Instagram under the handle “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unlawfully penetrating secure systems belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, leveraging compromised usernames and passwords to break in on several times. Rather than hiding the evidence, Moore brazenly distributed classified details and personal files on digital networks, containing information sourced from a veteran’s medical files. The case underscores both the vulnerability of federal security systems and the reckless behaviour of cyber perpetrators who pursue digital celebrity over protective measures.

The shameless digital breaches

Moore’s cyber intrusion campaign demonstrated a worrying pattern of repeated, deliberate breaches across numerous state institutions. Court filings show he penetrated the US Supreme Court’s online filing infrastructure at least 25 times over a period lasting two months, repeatedly accessing protected systems using credentials he had acquired unlawfully. Rather than attempting a single opportunistic breach, Moore repeatedly accessed these compromised systems multiple times daily, indicating a deliberate strategy to examine confidential data. His actions compromised protected data across three different government departments, each containing data of substantial national significance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His choice to record and distribute evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case demonstrates how online hubris can undermine otherwise sophisticated hacking attempts, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system 25 times across a two-month period
  • Infiltrated AmeriCorps systems and Veterans Affairs medical portal
  • Posted screenshots and personal information on Instagram to the public
  • Gained entry to protected networks multiple times daily with compromised login details

Public admission on social media turns out to be expensive

Nicholas Moore’s choice to publicise his illegal actions on Instagram proved to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and private data belonging to victims, including confidential information extracted from veteran health records. This flagrant cataloguing of federal crimes converted what might have gone undetected into irrefutable evidence easily accessible to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than gaining monetary advantage from his unauthorised breach. His Instagram account essentially functioned as a confessional, furnishing authorities with a comprehensive chronology and documentation of his criminal enterprise.

The case serves as a cautionary tale for cybercriminals who prioritise online infamy over security practices. Moore’s actions showed a fundamental misunderstanding of the repercussions of publicising federal crimes. Rather than staying anonymous, he produced a lasting digital trail of his unauthorised access, complete with photographic evidence and individual remarks. This irresponsible conduct accelerated his identification and prosecution, ultimately leading to charges and court action that have now become widely known. The contrast between Moore’s technical capability and his disastrous decision-making in sharing his activities highlights how social media can convert complex cybercrimes into straightforward prosecutable offences.

A pattern of overt self-promotion

Moore’s Instagram posts showed a troubling pattern of escalating confidence in his illegal capabilities. He repeatedly documented his entry into classified official systems, posting images that proved his penetration of sensitive systems. Each post served as both a admission and a form of digital boasting, intended to display his hacking prowess to his social media audience. The content he shared contained not only evidence of his breaches but also private data of people whose information he had exposed. This compulsive need to advertise his illegal activities indicated that the excitement of infamy was more important to Moore than the seriousness of what he had done.

Prosecutors portrayed Moore’s behaviour as performative rather than predatory, observing he was motivated primarily by the desire to impress acquaintances rather than leverage stolen information for financial advantage. His Instagram account served as an inadvertent confession, with each post supplying law enforcement with further evidence of his guilt. The permanence of the platform meant Moore was unable to remove his crimes from existence; instead, his online bragging created a detailed record of his activities spanning multiple breaches and various government agencies. This pattern ultimately determined his fate, transforming what might have been hard-to-prove cybercrimes into clear-cut prosecutions.

Lenient sentences and structural weaknesses

Nicholas Moore’s sentencing proved remarkably lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to internet contacts further contributed to the lenient result.

The prosecution’s own evaluation characterised a young man with significant difficulties rather than a major criminal operator. Court documents highlighted Moore’s long-term disabilities, constrained economic circumstances, and virtually non-existent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for personal gain or sold access to other individuals. Instead, his crimes appeared driven by youthful self-regard and the wish for online acceptance through internet fame. Judge Howell even remarked during sentencing that Moore’s technical capabilities indicated considerable capacity for positive contribution to society, provided he redirected his interests away from criminal activity. This assessment embodied a sentencing approach emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case reveals worrying gaps in US government cyber security infrastructure. His capacity to breach Supreme Court filing systems 25 times over two months using pilfered access credentials suggests alarmingly weak password management and access control protocols. Judge Howell’s pointed commentary about Moore’s capacity for positive impact—given how easily he penetrated sensitive systems—underscored the institutional failures that allowed these security incidents. The incident demonstrates that federal organisations remain at risk to relatively unsophisticated attacks exploiting breached account details rather than complex technical methods. This case serves as a cautionary tale about the implications of inadequate credential security across public sector infrastructure.

Broader implications for government cyber defence

The Moore case has revived concerns about the security stance of American federal agencies. Security professionals have repeatedly flagged that state systems often lag behind private enterprise practices, making use of aging systems and irregular security procedures. The fact that a individual lacking formal qualification could gain multiple times access to the Court’s online document system prompts difficult inquiries about budget distribution and organisational focus. Organisations charged with defending sensitive national information demonstrate insufficient investment in fundamental protective systems, creating vulnerability to opportunistic attacks. The incidents disclosed not simply administrative files but medical information of military personnel, demonstrating how poor cybersecurity directly impacts at-risk groups.

Looking ahead, cybersecurity experts have advocated for mandatory government-wide audits and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor authentication and zero-trust security architectures across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms suggests insufficient monitoring and intrusion detection capabilities. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case demonstrates that even low-tech breaches can expose classified and sensitive data, making basic security hygiene a matter of national importance.

  • Public sector organisations need compulsory multi-factor authentication across all systems
  • Regular security audits and security testing must uncover potential weaknesses in advance
  • Security personnel and training require substantial budget increases at federal level