Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ashnel Prewick

A 24-year-old cybercriminal has confessed to gaining unauthorised access to numerous United States government systems after publicly sharing his illegal activities on Instagram under the account name “ihackedthegovernment.” Nicholas Moore admitted in court to unauthorisedly entering restricted platforms belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, leveraging compromised usernames and passwords to gain entry on numerous occasions. Rather than hiding the evidence, Moore publicly shared confidential data and private records on digital networks, including details extracted from a veteran’s personal healthcare information. The case underscores both the vulnerability of federal security systems and the reckless behaviour of online offenders who pursue digital celebrity over operational security.

The bold cyber intrusions

Moore’s unauthorised access campaign revealed a troubling pattern of repeated, deliberate breaches across multiple government agencies. Court filings reveal he penetrated the US Supreme Court’s online filing infrastructure at least 25 times over a two-month period, systematically logging into protected systems using credentials he had secured through unauthorised means. Rather than making one isolated intrusion, Moore went back to these infiltrated networks numerous times each day, suggesting a calculated effort to explore sensitive information. His actions exposed classified data across three different government departments, each containing information of significant national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case exemplifies how digital arrogance can compromise otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Connected to Supreme Court filing system on 25 occasions across a two-month period
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Shared screenshots and personal information on Instagram to the public
  • Accessed protected networks multiple times daily with compromised login details

Social media confession turns out to be costly

Nicholas Moore’s choice to publicise his criminal activity on Instagram became his undoing. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and identifying details belonging to victims, including restricted records extracted from military medical files. This audacious recording of federal crimes transformed what might have gone undetected into undeniable proof readily available to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be gaining favour with digital associates rather than gaining monetary advantage from his unauthorised breach. His Instagram account essentially functioned as a confessional, providing investigators with a detailed timeline and record of his criminal enterprise.

The case represents a cautionary tale for digital criminals who place emphasis on online infamy over security protocols. Moore’s actions showed a basic lack of understanding of the ramifications linked to disclosing federal crimes. Rather than preserving anonymity, he produced a lasting digital trail of his illegal entry, complete with photographic evidence and personal commentary. This careless actions expedited his identification and prosecution, ultimately resulting in charges and court action that have now entered the public domain. The contrast between Moore’s technical capability and his disastrous decision-making in publicising his actions highlights how online platforms can transform sophisticated cybercrimes into easily prosecutable offences.

A tendency towards open bragging

Moore’s Instagram posts displayed a concerning pattern of growing self-assurance in his criminal abilities. He continually logged his access to restricted government platforms, posting images that proved his breach into confidential networks. Each post served as both a confession and a form of digital boasting, designed to display his hacking prowess to his social media audience. The content he shared contained not only proof of his intrusions but also private data belonging to people whose information he had exposed. This pressing urge to publicise his crimes indicated that the excitement of infamy was more important to Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative rather than predatory, highlighting he appeared motivated by the desire to impress acquaintances rather than exploit stolen information for monetary gain. His Instagram account served as an inadvertent confession, with each post offering law enforcement with more evidence of his guilt. The enduring nature of the platform meant Moore could not erase his crimes from existence; instead, his digital boasting created a thorough record of his activities covering multiple breaches and numerous government agencies. This pattern ultimately sealed his fate, turning what might have been difficult-to-prove cybercrimes into straightforward prosecutions.

Lenient sentencing and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than imposing the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors refrained from recommending custodial punishment, citing Moore’s difficult circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of monetary incentive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to online acquaintances further influenced the lenient outcome.

The prosecution’s own evaluation depicted a disturbed youth rather than a major criminal operator. Court documents highlighted Moore’s long-term disabilities, restricted monetary means, and almost entirely absent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for personal gain or sold access to third parties. Instead, his crimes were apparently propelled by youthful self-regard and the wish for peer recognition through internet fame. Judge Howell additionally observed during sentencing that Moore’s technical proficiency pointed to substantial promise for positive contribution to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a sentencing approach emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case reveals worrying gaps in American federal cybersecurity infrastructure. His success in entering Supreme Court filing systems 25 times across two months using compromised login details suggests concerningly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s capacity for positive impact—given how effortlessly he accessed sensitive systems—underscored the institutional failures that allowed these breaches. The incident shows that government agencies remain vulnerable to relatively unsophisticated attacks relying on breached account details rather than advanced technical exploits. This case acts as a cautionary tale about the implications of inadequate credential security across federal systems.

Broader implications for government cyber defence

The Moore case has revived anxiety over the security stance of American federal agencies. Cybersecurity specialists have consistently cautioned that state systems often lag behind private sector standards, depending upon outdated infrastructure and inconsistent password protocols. The fact that a young person without professional credentials could continually breach the Supreme Court’s digital filing platform prompts difficult inquiries about budget distribution and institutional priorities. Agencies tasked with protecting classified government data appear to have underinvested in essential security safeguards, creating vulnerability to opportunistic attacks. The leaks revealed not merely administrative files but medical information of military personnel, demonstrating how poor cybersecurity adversely influences at-risk groups.

Looking ahead, cybersecurity experts have advocated for compulsory audits across government and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor verification and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems on multiple occasions without triggering alarms indicates insufficient monitoring and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, especially considering the growing complexity of state-sponsored and criminal hacking operations. The Moore case demonstrates that even basic security lapses can compromise classified and sensitive information, making basic security practices a issue of national significance.

  • Public sector organisations require compulsory multi-factor authentication throughout all systems
  • Routine security assessments and security testing should identify potential weaknesses in advance
  • Security personnel and development demands substantial budget increases at federal level