Breaking news, every hour Tuesday, April 21, 2026

Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Fayera Kerwell

A 24-year-old cybercriminal has admitted to gaining unauthorised access to several United States government systems after publicly sharing his illegal activities on Instagram under the handle “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to illegally accessing restricted platforms operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, employing pilfered usernames and passwords to break in on numerous occasions. Rather than covering his tracks, Moore brazenly distributed confidential data and private records on digital networks, including details extracted from a veteran’s health records. The case demonstrates both the fragility of government cybersecurity infrastructure and the reckless behaviour of digital criminals who prioritise online notoriety over security protocols.

The bold online attacks

Moore’s hacking spree showed a worrying pattern of repeated, deliberate breaches across numerous state institutions. Court filings reveal he penetrated the US Supreme Court’s digital filing platform at least 25 times over a span of two months, consistently entering restricted platforms using credentials he had secured through unauthorised means. Rather than making one isolated intrusion, Moore went back to these breached platforms several times per day, implying a planned approach to examine confidential data. His actions exposed classified data across three separate government institutions, each containing material of considerable national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how online hubris can compromise otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Connected to Supreme Court document repository on 25 occasions across a two-month period
  • Infiltrated AmeriCorps systems and Veterans Affairs health platform
  • Shared screenshots and private data on Instagram publicly
  • Logged into protected networks multiple times daily with compromised login details

Public admission on social media proves expensive

Nicholas Moore’s decision to broadcast his criminal activity on Instagram became his undoing. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and private data belonging to victims, including confidential information extracted from military medical files. This audacious recording of federal crimes changed what might have remained hidden into conclusive documentation easily accessible to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than profiting from his unlawful entry. His Instagram account practically operated as a confessional, providing investigators with a comprehensive chronology and record of his criminal enterprise.

The case constitutes a warning example for digital criminals who give priority to online infamy over operational security. Moore’s actions revealed a basic lack of understanding of the repercussions of publicising federal crimes. Rather than preserving anonymity, he generated a lasting digital trail of his unauthorised access, complete with photographic evidence and personal observations. This reckless behaviour hastened his identification and prosecution, ultimately leading to criminal charges and court proceedings that have now entered the public domain. The contrast between Moore’s technical capability and his catastrophic judgment in broadcasting his activities highlights how online platforms can turn advanced cybercrimes into readily prosecutable crimes.

A pattern of public boasting

Moore’s Instagram posts revealed a disturbing pattern of growing self-assurance in his criminal abilities. He consistently recorded his access to restricted government platforms, posting images that illustrated his infiltration of confidential networks. Each post constituted both a admission and a form of online bragging, designed to highlight his technical expertise to his online followers. The material he posted contained not only evidence of his breaches but also personal information belonging to people whose information he had exposed. This obsessive drive to publicise his crimes indicated that the excitement of infamy took precedence over Moore than the seriousness of what he had done.

Prosecutors described Moore’s behaviour as performative rather than predatory, noting he appeared motivated by the urge to gain approval from acquaintances rather than utilise stolen information for financial exploitation. His Instagram account operated as an accidental confession, with each post providing law enforcement with more evidence of his guilt. The enduring nature of the platform meant Moore could not simply delete his crimes from existence; instead, his digital boasting created a comprehensive record of his activities encompassing multiple breaches and multiple government agencies. This pattern ultimately sealed his fate, turning what might have been challenging cybercrimes to prove into clear-cut prosecutions.

Mild sentences and systemic vulnerabilities

Nicholas Moore’s sentencing turned out to be notably lenient given the severity of his crimes. Rather than imposing the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, referencing Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to web-based associates further influenced the lenient outcome.

The prosecution’s assessment characterised a young man with significant difficulties rather than a major criminal operator. Court documents highlighted Moore’s chronic health conditions, restricted monetary means, and almost entirely absent employment history. Crucially, investigators found no evidence that Moore had misused the pilfered data for private benefit or provided entry to third parties. Instead, his crimes appeared driven by youthful arrogance and the desire for online acceptance through internet fame. Judge Howell additionally observed during sentencing that Moore’s computing skills indicated considerable capacity for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment reflected a judicial philosophy stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case reveals worrying gaps in US government cybersecurity infrastructure. His success in entering Supreme Court filing systems 25 times across two months using compromised login details suggests alarmingly weak password management and access control protocols. Judge Howell’s pointed commentary about Moore’s potential for good—given how readily he breached sensitive systems—underscored the institutional failures that allowed these intrusions. The incident shows that public sector bodies remain vulnerable to relatively unsophisticated attacks dependent on stolen login credentials rather than sophisticated technical attacks. This case serves as a warning example about the repercussions of insufficient password protection across government networks.

Broader implications for government cybersecurity

The Moore case has reignited anxiety over the security stance of federal government institutions. Security experts have consistently cautioned that public sector infrastructure often underperform compared to private sector standards, relying on legacy technology and inconsistent password protocols. The circumstance that a young person without professional credentials could repeatedly access the US Supreme Court’s electronic filing system prompts difficult inquiries about resource allocation and organisational focus. Agencies tasked with protecting critical state information seem to have under-resourced in essential security safeguards, leaving themselves vulnerable to targeted breaches. The leaks revealed not simply organisational records but medical information of military personnel, demonstrating how weak digital security adversely influences susceptible communities.

Moving forward, cybersecurity experts have urged compulsory audits across government and updating of outdated infrastructure still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor verification and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems on multiple occasions without setting off alerts points to insufficient monitoring and intrusion detection capabilities. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, especially considering the growing complexity of state-backed and criminal cyber attacks. The Moore case demonstrates that even basic security lapses can expose classified and sensitive information, making basic security practices a matter of national importance.

  • Public sector organisations require compulsory multi-factor authentication throughout all systems
  • Regular security audits and security testing should identify potential weaknesses in advance
  • Cybersecurity staffing and training require significant funding growth across federal government