Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Galen Kerbrook

A 24-year-old hacker has confessed to breaching multiple United States government systems after publicly sharing his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unauthorisedly entering secure systems belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, leveraging compromised usernames and passwords to gain entry on numerous occasions. Rather than concealing his activities, Moore brazenly distributed screenshots and sensitive personal information on online platforms, with data obtained from a veteran’s personal healthcare information. The case demonstrates both the weakness in federal security systems and the careless actions of online offenders who seek internet fame over protective measures.

The shameless digital breaches

Moore’s hacking spree demonstrated a troubling pattern of systematic, intentional incursions across numerous state institutions. Court filings disclose he penetrated the US Supreme Court’s electronic filing system at least 25 times over a period lasting two months, systematically logging into protected systems using credentials he had obtained illegally. Rather than attempting a single opportunistic breach, Moore went back to these breached platforms multiple times daily, implying a planned approach to explore sensitive information. His actions revealed sensitive information across three distinct state agencies, each containing information of significant national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how online hubris can undermine otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court filing system on 25 occasions across a two-month period
  • Infiltrated AmeriCorps systems and Veterans Affairs medical portal
  • Distributed screenshots and private data on Instagram publicly
  • Accessed restricted systems numerous times each day with compromised login details

Social media confession proves costly

Nicholas Moore’s decision to broadcast his criminal activity on Instagram proved to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and personal information belonging to victims, including restricted records extracted from armed forces healthcare data. This flagrant cataloguing of federal crimes converted what might have gone undetected into irrefutable evidence promptly obtainable to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than profiting from his unauthorised breach. His Instagram account practically operated as a confessional, providing investigators with a thorough sequence of events and account of his criminal enterprise.

The case represents a cautionary example for cyber offenders who give priority to digital notoriety over security protocols. Moore’s actions revealed a core misunderstanding of the ramifications linked to broadcasting federal offences. Rather than preserving anonymity, he produced a permanent digital record of his illegal entry, complete with photographic proof and individual remarks. This irresponsible conduct accelerated his identification and legal action, ultimately culminating in charges and court action that have now entered the public domain. The contrast between Moore’s technical capability and his disastrous decision-making in publicising his actions highlights how social networks can transform sophisticated cybercrimes into readily prosecutable crimes.

A pattern of open bragging

Moore’s Instagram posts revealed a disturbing pattern of escalating confidence in his illegal capabilities. He consistently recorded his entry into classified official systems, sharing screenshots that demonstrated his breach into sensitive systems. Each post served as both a confession and a form of digital boasting, meant to display his technical expertise to his online followers. The material he posted contained not only evidence of his breaches but also private data belonging to people whose information he had exposed. This pressing urge to broadcast his offences suggested that the thrill of notoriety took precedence over Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative rather than predatory, noting he appeared motivated by the desire to impress acquaintances rather than exploit stolen information for financial advantage. His Instagram account operated as an unintentional admission, with each post offering law enforcement with further evidence of his guilt. The platform’s permanence meant Moore could not delete his crimes from existence; instead, his digital boasting created a detailed record of his activities spanning multiple breaches and multiple government agencies. This pattern ultimately determined his fate, turning what might have been difficult-to-prove cybercrimes into straightforward cases.

Lenient sentencing and structural vulnerabilities

Nicholas Moore’s sentencing proved remarkably lenient given the seriousness of his crimes. Rather than applying the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors declined to recommend custodial punishment, citing Moore’s vulnerable circumstances and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to internet contacts further influenced the lenient outcome.

The prosecution assessment painted a portrait of a young man with significant difficulties rather than a major criminal operator. Court documents highlighted Moore’s chronic health conditions, limited financial resources, and practically non-existent employment history. Crucially, investigators found no evidence that Moore had misused the pilfered data for private benefit or sold access to other individuals. Instead, his crimes appeared driven by adolescent overconfidence and the desire for peer recognition through digital prominence. Judge Howell further noted during sentencing that Moore’s computing skills suggested significant potential for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case uncovers troubling gaps in American federal cyber security infrastructure. His capacity to breach Supreme Court filing systems 25 times over two months using pilfered access credentials suggests alarmingly weak password management and access control protocols. Judge Howell’s pointed commentary about Moore’s capacity for positive impact—given how effortlessly he breached sensitive systems—underscored the institutional failures that enabled these security incidents. The incident illustrates that public sector bodies remain at risk to moderately simple attacks relying on breached account details rather than complex technical methods. This case acts as a warning example about the consequences of inadequate credential security across federal systems.

Extended implications for government cybersecurity

The Moore case has reignited anxiety over the digital defence position of American federal agencies. Cybersecurity specialists have long warned that government systems often underperform compared to commercial industry benchmarks, making use of aging systems and irregular security procedures. The reality that a young person without professional credentials could gain multiple times access to the Supreme Court’s digital filing platform creates pressing concerns about resource allocation and departmental objectives. Organisations charged with defending critical state information appear to have underinvested in essential security safeguards, creating vulnerability to exploitative incursions. The leaks revealed not simply internal documents but healthcare data from service members, showing how weak digital security adversely influences susceptible communities.

Looking ahead, cybersecurity experts have urged compulsory audits across government and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to implement multi-factor verification and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems on multiple occasions without setting off alerts indicates insufficient monitoring and intrusion detection systems. Federal agencies must focus resources in experienced cybersecurity staff and system improvements, especially considering the increasing sophistication of state-backed and criminal cyber attacks. The Moore case demonstrates that even low-tech breaches can compromise classified and sensitive data, making basic security hygiene a matter of national importance.

  • Public sector organisations need compulsory multi-factor authentication throughout all systems
  • Routine security assessments and security testing must uncover vulnerabilities proactively
  • Security personnel and training require substantial budget increases at federal level