Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Camyn Lanley

A 24-year-old cybercriminal has pleaded guilty to gaining unauthorised access to multiple United States government systems after openly recording his offences on Instagram under the handle “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unauthorisedly entering protected networks operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, employing pilfered usernames and passwords to break in on multiple instances. Rather than hiding the evidence, Moore publicly shared screenshots and sensitive personal information on social media, containing information sourced from a veteran’s personal healthcare information. The case demonstrates both the weakness in state digital defences and the reckless behaviour of online offenders who pursue digital celebrity over protective measures.

The audacious cyber intrusions

Moore’s hacking spree demonstrated a worrying pattern of systematic, intentional incursions across numerous state institutions. Court filings disclose he gained entry to the US Supreme Court’s digital filing platform at least 25 times over a two-month period, consistently entering secure networks using credentials he had secured through unauthorised means. Rather than making one isolated intrusion, Moore returned to these infiltrated networks numerous times each day, implying a planned approach to investigate restricted materials. His actions exposed classified data across three distinct state agencies, each containing information of significant national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case exemplifies how digital arrogance can compromise otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Accessed Supreme Court filing system on 25 occasions across a two-month period
  • Compromised AmeriCorps systems and Veterans Affairs health platform
  • Distributed screenshots and personal information on Instagram to the public
  • Accessed restricted systems multiple times daily using stolen credentials

Public admission on social media proves expensive

Nicholas Moore’s opt to share his unlawful conduct on Instagram turned out to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and personal information belonging to victims, including confidential information extracted from veteran health records. This brazen documentation of federal crimes transformed what might have gone undetected into irrefutable evidence promptly obtainable to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be winning over internet contacts rather than profiting from his illicit access. His Instagram account essentially functioned as a confessional, supplying law enforcement with a detailed timeline and account of his criminal enterprise.

The case constitutes a cautionary tale for cybercriminals who prioritise online infamy over security practices. Moore’s actions demonstrated a fundamental misunderstanding of the ramifications linked to disclosing federal crimes. Rather than maintaining anonymity, he generated a enduring digital documentation of his illegal entry, complete with photographic evidence and personal commentary. This careless actions accelerated his apprehension and prosecution, ultimately resulting in criminal charges and legal proceedings that have now become public knowledge. The contrast between Moore’s technical skill and his catastrophic judgment in publicising his actions highlights how social media can convert complex cybercrimes into readily prosecutable crimes.

A tendency towards overt self-promotion

Moore’s Instagram posts showed a disturbing pattern of escalating confidence in his illegal capabilities. He repeatedly documented his access to restricted government platforms, sharing screenshots that proved his breach into sensitive systems. Each post served as both a admission and a form of online bragging, intended to highlight his hacking prowess to his online followers. The material he posted included not only evidence of his breaches but also private data belonging to individuals whose data he had compromised. This obsessive drive to broadcast his offences indicated that the excitement of infamy mattered more to Moore than the seriousness of what he had done.

Prosecutors portrayed Moore’s behaviour as more performative than predatory, highlighting he was motivated primarily by the urge to gain approval from acquaintances rather than exploit stolen information for financial advantage. His Instagram account served as an inadvertent confession, with each upload providing law enforcement with further evidence of his guilt. The enduring nature of the platform meant Moore could not simply delete his crimes from existence; instead, his online bragging created a detailed record of his activities spanning multiple breaches and various government agencies. This pattern ultimately determined his fate, transforming what might have been difficult-to-prove cybercrimes into straightforward prosecutions.

Mild sentencing and systemic vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors declined to recommend custodial punishment, referencing Moore’s difficult circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to internet contacts further influenced the lenient outcome.

The prosecution’s own assessment depicted a disturbed youth rather than a major criminal operator. Court documents recorded Moore’s persistent impairments, restricted monetary means, and almost entirely absent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for private benefit or sold access to external organisations. Instead, his crimes were apparently propelled by youthful arrogance and the wish for social validation through digital prominence. Judge Howell even remarked during sentencing that Moore’s computing skills suggested significant potential for positive contribution to society, provided he redirected his interests away from criminal activity. This assessment reflected a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case exposes troubling gaps in American federal cyber security infrastructure. His success in entering Supreme Court filing systems 25 times across two months using stolen credentials suggests alarmingly weak credential oversight and access control protocols. Judge Howell’s wry remark about Moore’s capacity for positive impact—given how readily he breached restricted networks—underscored the organisational shortcomings that enabled these security incidents. The incident demonstrates that public sector bodies remain at risk to fairly basic attacks dependent on stolen login credentials rather than sophisticated technical attacks. This case acts as a cautionary example about the implications of insufficient password protection across federal systems.

Broader implications for government cybersecurity

The Moore case has rekindled worries regarding the security stance of federal government institutions. Security experts have consistently cautioned that state systems often lag behind private enterprise practices, making use of aging systems and variable authentication procedures. The fact that a young person without professional credentials could gain multiple times access to the Supreme Court’s digital filing platform raises uncomfortable questions about financial priorities and institutional priorities. Agencies tasked with protecting critical state information appear to have underinvested in essential security safeguards, leaving themselves vulnerable to exploitative incursions. The incidents disclosed not simply administrative files but personal health records of military personnel, illustrating how weak digital security significantly affects at-risk groups.

Going forward, cybersecurity experts have urged mandatory government-wide audits and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor verification and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms suggests insufficient monitoring and intrusion detection systems. Federal agencies must prioritise investment in experienced cybersecurity staff and system improvements, especially considering the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case demonstrates that even basic security lapses can compromise classified and sensitive data, making basic security practices a matter of national importance.

  • Government agencies need compulsory multi-factor authentication throughout all systems
  • Regular security audits and security testing should identify potential weaknesses in advance
  • Security personnel and training require substantial budget increases across federal government