Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Elley Warwick

A 24-year-old hacker has confessed to breaching several United States state infrastructure after openly recording his crimes on Instagram under the account name “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unauthorisedly entering restricted platforms run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, using stolen usernames and passwords to gain entry on numerous occasions. Rather than covering his tracks, Moore publicly shared confidential data and private records on social media, containing information sourced from a veteran’s medical files. The case underscores both the fragility of government cybersecurity infrastructure and the careless actions of digital criminals who seek internet fame over operational security.

The audacious cyber intrusions

Moore’s unauthorised access campaign demonstrated a worrying pattern of recurring unauthorised access across multiple government agencies. Court filings show he accessed the US Supreme Court’s digital filing platform at least 25 times over a period lasting two months, systematically logging into secure networks using credentials he had acquired unlawfully. Rather than conducting a lone opportunistic attack, Moore returned to these compromised systems several times per day, indicating a deliberate strategy to explore sensitive information. His actions exposed classified data across three distinct state agencies, each containing material of considerable national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case demonstrates how digital arrogance can compromise otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system on 25 occasions across a two-month period
  • Compromised AmeriCorps accounts and Veterans Affairs medical portal
  • Distributed screenshots and personal information on Instagram to the public
  • Gained entry to restricted systems numerous times each day using stolen credentials

Public admission on social media proves expensive

Nicholas Moore’s choice to publicise his illegal actions on Instagram proved to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and identifying details belonging to victims, including sensitive details extracted from military medical files. This flagrant cataloguing of federal crimes transformed what might have remained hidden into undeniable proof readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be impressing online acquaintances rather than benefiting financially from his illicit access. His Instagram account essentially functioned as a confessional, supplying law enforcement with a comprehensive chronology and account of his criminal enterprise.

The case serves as a cautionary tale for digital criminals who prioritise internet notoriety over security practices. Moore’s actions demonstrated a fundamental misunderstanding of the consequences associated with publicising federal crimes. Rather than preserving anonymity, he created a enduring digital documentation of his illegal entry, complete with visual documentation and personal commentary. This reckless behaviour expedited his identification and legal action, ultimately culminating in charges and court action that have now become widely known. The contrast between Moore’s technical capability and his disastrous decision-making in publicising his actions highlights how social networks can turn advanced cybercrimes into readily prosecutable crimes.

A pattern of open bragging

Moore’s Instagram posts revealed a disturbing pattern of escalating confidence in his criminal abilities. He consistently recorded his entry into restricted government platforms, posting images that proved his infiltration of sensitive systems. Each post served as both a confession and a form of digital boasting, meant to highlight his technical expertise to his social media audience. The content he shared included not only evidence of his breaches but also private data belonging to people whose information he had exposed. This compulsive need to broadcast his offences suggested that the excitement of infamy was more important to Moore than the seriousness of what he had done.

Prosecutors described Moore’s behaviour as more performative than predatory, observing he appeared motivated by the urge to gain approval from acquaintances rather than utilise stolen information for financial advantage. His Instagram account functioned as an accidental confession, with every post offering law enforcement with more evidence of his guilt. The permanence of the platform meant Moore could not simply erase his crimes from existence; instead, his digital self-promotion created a comprehensive record of his activities covering multiple breaches and numerous government agencies. This pattern ultimately determined his fate, turning what might have been difficult-to-prove cybercrimes into clear-cut prosecutions.

Lenient sentences and structural vulnerabilities

Nicholas Moore’s sentencing turned out to be notably lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors declined to recommend custodial punishment, pointing to Moore’s difficult circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of financial motivation for the breaches and lack of harmful intent beyond demonstrating his technical prowess to internet contacts further shaped the lenient decision.

The prosecution’s own assessment characterised a disturbed youth rather than a serious organised crime figure. Court documents noted Moore’s chronic health conditions, limited financial resources, and virtually non-existent employment history. Crucially, investigators found no evidence that Moore had used the compromised information for financial advantage or provided entry to external organisations. Instead, his crimes appeared driven by youthful arrogance and the desire for peer recognition through digital prominence. Judge Howell additionally observed during sentencing that Moore’s technical proficiency pointed to substantial promise for constructive involvement to society, provided he reoriented his activities away from criminal activity. This assessment reflected a sentencing approach prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case exposes troubling gaps in US government cybersecurity infrastructure. His ability to access Supreme Court filing systems 25 times over two months using compromised login details suggests alarmingly weak credential oversight and permission management protocols. Judge Howell’s wry remark about Moore’s potential for good—given how easily he accessed restricted networks—underscored the systemic breakdowns that facilitated these breaches. The incident shows that federal organisations remain vulnerable to relatively unsophisticated attacks dependent on breached account details rather than sophisticated technical attacks. This case functions as a cautionary example about the repercussions of weak authentication safeguards across public sector infrastructure.

Wider implications for government cybersecurity

The Moore case has rekindled worries regarding the digital defence position of American federal agencies. Security experts have repeatedly flagged that public sector infrastructure often lag behind private enterprise practices, making use of aging systems and variable authentication procedures. The reality that a individual lacking formal qualification could gain multiple times access to the US Supreme Court’s electronic filing system creates pressing concerns about budget distribution and departmental objectives. Agencies tasked with protecting sensitive national information appear to have underinvested in basic security measures, exposing themselves to exploitative incursions. The leaks revealed not just organisational records but healthcare data of military personnel, showing how poor cybersecurity adversely influences at-risk groups.

Moving forward, cybersecurity experts have called for compulsory audits across government and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to implement multi-factor authentication and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems repeatedly without setting off alerts points to insufficient monitoring and intrusion detection capabilities. Federal agencies must prioritise investment in experienced cybersecurity staff and infrastructure upgrades, especially considering the increasing sophistication of state-backed and criminal cyber attacks. The Moore case shows that even low-tech breaches can reveal classified and sensitive data, making basic security hygiene a issue of national significance.

  • Government agencies require compulsory multi-factor authentication across all systems
  • Regular security audits and penetration testing must uncover vulnerabilities proactively
  • Security personnel and development demands significant funding growth at federal level