Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ivayn Yorton

A 24-year-old digital attacker has pleaded guilty to infiltrating several United States government systems after publicly sharing his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore confessed during proceedings to illegally accessing secure systems run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, using stolen usernames and passwords to break in on several times. Rather than hiding the evidence, Moore brazenly distributed classified details and personal files on social media, containing information sourced from a veteran’s health records. The case highlights both the vulnerability of government cybersecurity infrastructure and the irresponsible conduct of digital criminals who pursue digital celebrity over security protocols.

The shameless cyber intrusions

Moore’s cyber intrusion campaign showed a concerning trend of systematic, intentional incursions across numerous state institutions. Court filings show he penetrated the US Supreme Court’s electronic filing system at least 25 times over a two-month period, repeatedly accessing protected systems using credentials he had acquired unlawfully. Rather than conducting a lone opportunistic attack, Moore returned to these infiltrated networks multiple times daily, implying a planned approach to investigate restricted materials. His actions compromised protected data across three distinct state agencies, each containing data of substantial national significance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case exemplifies how digital arrogance can undermine otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Accessed Supreme Court filing system 25 times over two months
  • Breached AmeriCorps accounts and Veterans Affairs health platform
  • Distributed screenshots and private data on Instagram to the public
  • Logged into protected networks numerous times each day with compromised login details

Public admission on social media turns out to be costly

Nicholas Moore’s choice to publicise his unlawful conduct on Instagram turned out to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and personal information belonging to victims, including sensitive details extracted from military medical files. This flagrant cataloguing of federal crimes changed what might have stayed concealed into undeniable proof readily available to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be impressing online acquaintances rather than benefiting financially from his unlawful entry. His Instagram account practically operated as a confessional, providing investigators with a thorough sequence of events and record of his criminal enterprise.

The case serves as a cautionary example for digital criminals who prioritise online infamy over security protocols. Moore’s actions revealed a core misunderstanding of the consequences associated with disclosing federal crimes. Rather than maintaining anonymity, he produced a permanent digital record of his unauthorised access, complete with photographic evidence and personal observations. This careless actions expedited his identification and prosecution, ultimately resulting in charges and court action that have now become public knowledge. The contrast between Moore’s technical proficiency and his disastrous decision-making in broadcasting his activities highlights how social media can convert complex cybercrimes into readily prosecutable crimes.

A habit of overt self-promotion

Moore’s Instagram posts revealed a troubling pattern of growing self-assurance in his criminal abilities. He continually logged his entry into classified official systems, posting images that illustrated his penetration of sensitive systems. Each post served as both a admission and a form of digital boasting, designed to highlight his technical expertise to his social media audience. The content he shared included not only proof of his intrusions but also private data belonging to people whose information he had exposed. This obsessive drive to publicise his crimes suggested that the thrill of notoriety mattered more to Moore than the seriousness of what he had done.

Prosecutors portrayed Moore’s behaviour as more performative than predatory, noting he seemed driven by the desire to impress acquaintances rather than leverage stolen information for financial exploitation. His Instagram account operated as an inadvertent confession, with every post providing law enforcement with additional evidence of his guilt. The permanence of the platform meant Moore was unable to erase his crimes from existence; instead, his online bragging created a comprehensive record of his activities encompassing multiple breaches and numerous government agencies. This pattern ultimately determined his fate, converting what might have been hard-to-prove cybercrimes into straightforward prosecutions.

Lenient sentencing and systemic vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors refrained from recommending custodial punishment, pointing to Moore’s difficult circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s lack of monetary incentive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to internet contacts further contributed to the lenient result.

The prosecution’s evaluation characterised a young man with significant difficulties rather than a dangerous criminal mastermind. Court documents recorded Moore’s persistent impairments, constrained economic circumstances, and almost entirely absent employment history. Crucially, investigators uncovered nothing that Moore had misused the pilfered data for private benefit or granted permissions to external organisations. Instead, his crimes seemed motivated by youthful self-regard and the desire for online acceptance through internet fame. Judge Howell further noted during sentencing that Moore’s technical capabilities indicated considerable capacity for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a sentencing approach emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case reveals troubling gaps in American federal cybersecurity infrastructure. His capacity to breach Supreme Court filing systems 25 times across two months using stolen credentials suggests alarmingly weak password management and permission management protocols. Judge Howell’s sardonic observation about Moore’s capacity for positive impact—given how easily he penetrated restricted networks—underscored the organisational shortcomings that facilitated these breaches. The incident demonstrates that federal organisations remain vulnerable to moderately simple attacks relying on compromised usernames and passwords rather than complex technical methods. This case functions as a cautionary tale about the implications of inadequate credential security across federal systems.

Broader implications for government cyber defence

The Moore case has revived concerns about the digital defence position of American federal agencies. Cybersecurity specialists have repeatedly flagged that public sector infrastructure often fall short of commercial industry benchmarks, depending upon legacy technology and inconsistent password protocols. The reality that a 24-year-old with no formal training could gain multiple times access to the Supreme Court’s digital filing platform prompts difficult inquiries about resource allocation and organisational focus. Organisations charged with defending classified government data seem to have under-resourced in basic security measures, exposing themselves to opportunistic attacks. The leaks revealed not merely internal documents but medical information of military personnel, demonstrating how poor cybersecurity adversely influences vulnerable populations.

Looking ahead, cybersecurity experts have called for compulsory audits across government and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to introduce multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without setting off alerts suggests inadequate oversight and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, especially considering the growing complexity of state-sponsored and criminal hacking operations. The Moore case shows that even basic security lapses can reveal classified and sensitive data, making basic security hygiene a issue of national significance.

  • Government agencies require mandatory multi-factor authentication throughout all systems
  • Regular security audits and penetration testing should identify vulnerabilities proactively
  • Cybersecurity staffing and development demands significant funding growth at federal level