Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ashton Calwood

A 24-year-old cybercriminal has pleaded guilty to infiltrating numerous United States state infrastructure after openly recording his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore admitted in court to illegally accessing restricted platforms run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, employing pilfered usernames and passwords to break in on numerous occasions. Rather than concealing his activities, Moore openly posted screenshots and sensitive personal information on social media, containing information sourced from a veteran’s personal healthcare information. The case demonstrates both the vulnerability of state digital defences and the reckless behaviour of online offenders who seek internet fame over security protocols.

The bold digital breaches

Moore’s hacking spree demonstrated a troubling pattern of repeated, deliberate breaches across numerous state institutions. Court filings reveal he gained entry to the US Supreme Court’s electronic filing system at least 25 times over a two-month period, systematically logging into restricted platforms using credentials he had acquired unlawfully. Rather than making one isolated intrusion, Moore went back to these infiltrated networks multiple times daily, indicating a deliberate strategy to examine confidential data. His actions exposed classified data across three different government departments, each containing material of considerable national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case exemplifies how online hubris can compromise otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Accessed Supreme Court document repository on 25 occasions across a two-month period
  • Infiltrated AmeriCorps systems and Veterans Affairs medical portal
  • Posted screenshots and private data on Instagram to the public
  • Gained entry to restricted systems multiple times daily with compromised login details

Public admission on social media proves expensive

Nicholas Moore’s choice to publicise his criminal activity on Instagram became his ruin. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and private data belonging to victims, including confidential information extracted from veteran health records. This brazen documentation of federal crimes transformed what might have remained hidden into irrefutable evidence easily accessible to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be winning over internet contacts rather than profiting from his unlawful entry. His Instagram account effectively served as a confessional, providing investigators with a detailed timeline and account of his criminal enterprise.

The case represents a warning example for digital criminals who place emphasis on online infamy over security practices. Moore’s actions showed a fundamental misunderstanding of the repercussions of disclosing federal crimes. Rather than preserving anonymity, he produced a permanent digital record of his intrusions, complete with photographic proof and individual remarks. This irresponsible conduct hastened his identification and legal action, ultimately leading to criminal charges and court proceedings that have now entered the public domain. The contrast between Moore’s technical proficiency and his catastrophic judgment in sharing his activities highlights how social networks can transform sophisticated cybercrimes into easily prosecutable offences.

A habit of public boasting

Moore’s Instagram posts displayed a disturbing pattern of escalating confidence in his illegal capabilities. He repeatedly documented his access to restricted government platforms, posting images that proved his infiltration of sensitive systems. Each post constituted both a admission and a form of digital boasting, meant to showcase his technical expertise to his online followers. The material he posted included not only proof of his intrusions but also private data belonging to people whose information he had exposed. This obsessive drive to publicise his crimes indicated that the excitement of infamy was more important to Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative rather than predatory, highlighting he seemed driven by the wish to impress acquaintances rather than leverage stolen information for monetary gain. His Instagram account served as an inadvertent confession, with each upload supplying law enforcement with additional evidence of his guilt. The permanence of the platform meant Moore was unable to erase his crimes from existence; instead, his digital self-promotion created a thorough record of his activities covering multiple breaches and various government agencies. This pattern ultimately sealed his fate, transforming what might have been hard-to-prove cybercrimes into straightforward cases.

Mild sentencing and systemic vulnerabilities

Nicholas Moore’s sentencing turned out to be notably lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, pointing to Moore’s vulnerable circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s absence of financial motive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to web-based associates further shaped the lenient decision.

The prosecution’s own assessment characterised a young man with significant difficulties rather than a major criminal operator. Court documents recorded Moore’s long-term disabilities, restricted monetary means, and practically non-existent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for financial advantage or granted permissions to external organisations. Instead, his crimes appeared driven by youthful arrogance and the desire for peer recognition through digital prominence. Judge Howell even remarked during sentencing that Moore’s technical proficiency suggested significant potential for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a judicial philosophy prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case exposes concerning gaps in American federal cybersecurity infrastructure. His capacity to breach Supreme Court filing systems 25 times over two months using pilfered access credentials suggests alarmingly weak password management and permission management protocols. Judge Howell’s wry remark about Moore’s capacity for positive impact—given how readily he penetrated restricted networks—underscored the systemic breakdowns that facilitated these intrusions. The incident illustrates that federal organisations remain vulnerable to moderately simple attacks exploiting breached account details rather than complex technical methods. This case acts as a warning example about the repercussions of insufficient password protection across federal systems.

Wider implications for government cybersecurity

The Moore case has reignited worries regarding the digital defence position of federal government institutions. Security professionals have repeatedly flagged that government systems often lag behind commercial industry benchmarks, depending upon aging systems and irregular security procedures. The reality that a individual lacking formal qualification could gain multiple times access to the Supreme Court’s digital filing platform prompts difficult inquiries about budget distribution and departmental objectives. Bodies responsible for safeguarding critical state information appear to have underinvested in basic security measures, exposing themselves to opportunistic attacks. The leaks revealed not merely administrative files but medical information of military personnel, demonstrating how inadequate protection adversely influences susceptible communities.

Going forward, cybersecurity experts have urged compulsory audits across government and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to implement multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms points to insufficient monitoring and intrusion detection systems. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, especially considering the increasing sophistication of state-backed and criminal cyber attacks. The Moore case shows that even basic security lapses can expose classified and sensitive information, making basic security hygiene a issue of national significance.

  • Public sector organisations require mandatory multi-factor authentication throughout all systems
  • Regular security audits and security testing should identify vulnerabilities proactively
  • Security personnel and training require substantial budget increases across federal government