Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ashon Kerwick

A 24-year-old hacker has admitted to gaining unauthorised access to several United States government systems after publicly sharing his offences on Instagram under the handle “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unauthorisedly entering protected networks operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, using stolen usernames and passwords to gain entry on multiple instances. Rather than concealing his activities, Moore openly posted classified details and personal files on digital networks, including details extracted from a veteran’s medical files. The case underscores both the fragility of government cybersecurity infrastructure and the reckless behaviour of online offenders who prioritise online notoriety over security protocols.

The audacious cyber intrusions

Moore’s hacking spree demonstrated a worrying pattern of recurring unauthorised access across several government departments. Court filings disclose he accessed the US Supreme Court’s online filing infrastructure at least 25 times over a two-month period, systematically logging into restricted platforms using credentials he had secured through unauthorised means. Rather than making one isolated intrusion, Moore repeatedly accessed these infiltrated networks multiple times daily, implying a planned approach to investigate restricted materials. His actions compromised protected data across three different government departments, each containing information of significant national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case exemplifies how digital arrogance can compromise otherwise sophisticated hacking attempts, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Connected to Supreme Court document repository on 25 occasions over two months
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Shared screenshots and personal information on Instagram to the public
  • Logged into restricted systems numerous times each day with compromised login details

Public admission on social media proves costly

Nicholas Moore’s opt to share his unlawful conduct on Instagram turned out to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and personal information belonging to victims, including sensitive details extracted from military medical files. This brazen documentation of federal crimes converted what might have gone undetected into irrefutable evidence readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than benefiting financially from his unauthorised breach. His Instagram account essentially functioned as a confessional, providing investigators with a detailed timeline and account of his criminal enterprise.

The case serves as a cautionary tale for digital criminals who place emphasis on online infamy over operational security. Moore’s actions revealed a basic lack of understanding of the ramifications linked to publicising federal crimes. Rather than maintaining anonymity, he generated a lasting digital trail of his unauthorised access, complete with visual documentation and personal observations. This reckless behaviour hastened his apprehension and prosecution, ultimately culminating in charges and court action that have now become public knowledge. The contrast between Moore’s technical skill and his appalling judgment in publicising his actions highlights how social media can convert complex cybercrimes into readily prosecutable crimes.

A pattern of public boasting

Moore’s Instagram posts showed a troubling pattern of escalating confidence in his criminal abilities. He consistently recorded his access to restricted government platforms, posting images that proved his breach into sensitive systems. Each post represented both a admission and a form of digital boasting, designed to showcase his technical expertise to his social media audience. The content he shared included not only evidence of his breaches but also private data of people whose information he had exposed. This obsessive drive to advertise his illegal activities suggested that the excitement of infamy mattered more to Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative rather than predatory, noting he appeared motivated by the wish to impress acquaintances rather than exploit stolen information for financial exploitation. His Instagram account functioned as an unintentional admission, with every post supplying law enforcement with additional evidence of his guilt. The enduring nature of the platform meant Moore could not erase his crimes from existence; instead, his digital boasting created a comprehensive record of his activities encompassing multiple breaches and multiple government agencies. This pattern ultimately determined his fate, converting what might have been hard-to-prove cybercrimes into clear-cut prosecutions.

Mild sentences and systemic vulnerabilities

Nicholas Moore’s sentencing proved remarkably lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, pointing to Moore’s difficult circumstances and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s absence of financial motive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to web-based associates further shaped the lenient decision.

The prosecution’s own assessment painted a portrait of a troubled young man rather than a major criminal operator. Court documents recorded Moore’s persistent impairments, limited financial resources, and almost entirely absent employment history. Crucially, investigators uncovered nothing that Moore had exploited the stolen information for personal gain or granted permissions to other individuals. Instead, his crimes seemed motivated by adolescent overconfidence and the need for social validation through online notoriety. Judge Howell even remarked during sentencing that Moore’s technical capabilities indicated considerable capacity for beneficial participation to society, provided he reoriented his activities away from criminal activity. This assessment reflected a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case exposes worrying gaps in US government cybersecurity infrastructure. His capacity to breach Supreme Court document repositories 25 times across two months using pilfered access credentials suggests concerningly weak credential oversight and access control protocols. Judge Howell’s wry remark about Moore’s capacity for positive impact—given how easily he penetrated sensitive systems—underscored the systemic breakdowns that enabled these breaches. The incident shows that federal organisations remain at risk to moderately simple attacks dependent on breached account details rather than sophisticated technical attacks. This case acts as a warning example about the implications of inadequate credential security across public sector infrastructure.

Wider implications for public sector cyber security

The Moore case has reignited concerns about the digital defence position of federal government institutions. Cybersecurity specialists have consistently cautioned that government systems often fall short of commercial industry benchmarks, making use of outdated infrastructure and variable authentication procedures. The reality that a individual lacking formal qualification could continually breach the Court’s online document system raises uncomfortable questions about budget distribution and departmental objectives. Agencies tasked with protecting sensitive national information demonstrate insufficient investment in essential security safeguards, leaving themselves vulnerable to targeted breaches. The leaks revealed not merely organisational records but medical information belonging to veterans, illustrating how inadequate protection significantly affects at-risk groups.

Looking ahead, cybersecurity experts have urged mandatory government-wide audits and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to implement multi-factor authentication and zero-trust security architectures across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms suggests inadequate oversight and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and infrastructure upgrades, especially considering the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case demonstrates that even basic security lapses can expose classified and sensitive information, making basic security practices a matter of national importance.

  • Public sector organisations need compulsory multi-factor authentication throughout all systems
  • Regular security audits and penetration testing must uncover potential weaknesses in advance
  • Cybersecurity staffing and development demands substantial budget increases across federal government