Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Malan Talland

A 24-year-old hacker has pleaded guilty to breaching several United States state infrastructure after publicly sharing his illegal activities on Instagram under the account name “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to illegally accessing protected networks run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, employing pilfered usernames and passwords to break in on numerous occasions. Rather than concealing his activities, Moore brazenly distributed classified details and personal files on online platforms, with data obtained from a veteran’s medical files. The case highlights both the weakness in state digital defences and the irresponsible conduct of digital criminals who pursue digital celebrity over operational security.

The shameless online attacks

Moore’s cyber intrusion campaign demonstrated a worrying pattern of repeated, deliberate breaches across several government departments. Court filings disclose he accessed the US Supreme Court’s electronic filing system at least 25 times over a two-month period, repeatedly accessing secure networks using credentials he had secured through unauthorised means. Rather than attempting a single opportunistic breach, Moore went back to these infiltrated networks several times per day, indicating a deliberate strategy to examine confidential data. His actions revealed sensitive information across three different government departments, each containing data of substantial national significance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how digital arrogance can undermine otherwise sophisticated hacking attempts, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Accessed Supreme Court filing system 25 times over two months
  • Infiltrated AmeriCorps accounts and Veterans Affairs health platform
  • Shared screenshots and personal information on Instagram to the public
  • Logged into restricted systems numerous times each day with compromised login details

Social media confession turns out to be costly

Nicholas Moore’s opt to share his unlawful conduct on Instagram turned out to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and identifying details belonging to victims, including confidential information extracted from armed forces healthcare data. This brazen documentation of federal crimes changed what might have stayed concealed into conclusive documentation easily accessible to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be impressing online acquaintances rather than profiting from his illicit access. His Instagram account practically operated as a confessional, furnishing authorities with a detailed timeline and documentation of his criminal enterprise.

The case serves as a cautionary example for digital criminals who place emphasis on internet notoriety over security practices. Moore’s actions revealed a basic lack of understanding of the ramifications linked to broadcasting federal offences. Rather than staying anonymous, he generated a permanent digital record of his intrusions, complete with visual documentation and personal observations. This careless actions hastened his apprehension and prosecution, ultimately resulting in criminal charges and legal proceedings that have now become public knowledge. The contrast between Moore’s technical capability and his catastrophic judgment in sharing his activities highlights how online platforms can transform sophisticated cybercrimes into easily prosecutable offences.

A tendency towards public boasting

Moore’s Instagram posts displayed a troubling pattern of escalating confidence in his illegal capabilities. He repeatedly documented his entry into classified official systems, sharing screenshots that proved his infiltration of sensitive systems. Each post constituted both a confession and a form of online bragging, designed to highlight his technical expertise to his social media audience. The material he posted included not only evidence of his breaches but also private data of individuals whose data he had compromised. This obsessive drive to broadcast his offences indicated that the excitement of infamy mattered more to Moore than the gravity of his actions.

Prosecutors portrayed Moore’s behaviour as performative rather than predatory, observing he appeared motivated by the wish to impress acquaintances rather than exploit stolen information for financial exploitation. His Instagram account functioned as an inadvertent confession, with every post supplying law enforcement with additional evidence of his guilt. The permanence of the platform meant Moore could not remove his crimes from existence; instead, his digital self-promotion created a comprehensive record of his activities covering multiple breaches and numerous government agencies. This pattern ultimately determined his fate, converting what might have been challenging cybercrimes to prove into clear-cut prosecutions.

Lenient sentencing and structural weaknesses

Nicholas Moore’s sentencing turned out to be notably lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s precarious situation and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to online acquaintances further shaped the lenient decision.

The prosecution’s assessment characterised a young man with significant difficulties rather than a dangerous criminal mastermind. Court documents recorded Moore’s long-term disabilities, constrained economic circumstances, and virtually non-existent employment history. Crucially, investigators found no evidence that Moore had misused the pilfered data for financial advantage or provided entry to other individuals. Instead, his crimes were apparently propelled by youthful self-regard and the desire for social validation through online notoriety. Judge Howell additionally observed during sentencing that Moore’s technical proficiency suggested significant potential for constructive involvement to society, provided he redirected his interests away from criminal activity. This assessment demonstrated a sentencing approach emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case reveals troubling gaps in American federal cybersecurity infrastructure. His success in entering Supreme Court document repositories 25 times across two months using compromised login details suggests concerningly weak password management and permission management protocols. Judge Howell’s sardonic observation about Moore’s potential for good—given how effortlessly he breached restricted networks—underscored the institutional failures that facilitated these breaches. The incident shows that federal organisations remain vulnerable to moderately simple attacks relying on stolen login credentials rather than advanced technical exploits. This case functions as a cautionary example about the implications of weak authentication safeguards across government networks.

Wider implications for public sector cyber security

The Moore case has revived anxiety over the cybersecurity posture of federal government institutions. Security experts have consistently cautioned that public sector infrastructure often fall short of private enterprise practices, making use of outdated infrastructure and variable authentication procedures. The circumstance that a 24-year-old with no formal training could continually breach the Supreme Court’s digital filing platform raises uncomfortable questions about financial priorities and departmental objectives. Agencies tasked with protecting sensitive national information appear to have underinvested in basic security measures, creating vulnerability to opportunistic attacks. The leaks revealed not just administrative files but personal health records belonging to veterans, demonstrating how weak digital security adversely influences susceptible communities.

Looking ahead, cybersecurity experts have advocated for compulsory audits across government and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to implement multi-factor verification and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without setting off alerts suggests inadequate oversight and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and infrastructure upgrades, especially considering the growing complexity of state-sponsored and criminal hacking operations. The Moore case demonstrates that even low-tech breaches can compromise classified and sensitive information, making basic security hygiene a matter of national importance.

  • Public sector organisations require compulsory multi-factor authentication throughout all systems
  • Routine security assessments and penetration testing must uncover potential weaknesses in advance
  • Security personnel and development demands substantial budget increases at federal level