Thursday, April 23, 2026
Breaking news, every hour

Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Elyn Calford

A 24-year-old digital attacker has confessed to infiltrating numerous United States federal networks after publicly sharing his offences on Instagram under the handle “ihackedthegovernment.” Nicholas Moore confessed during proceedings to illegally accessing restricted platforms run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, leveraging compromised usernames and passwords to obtain access on several times. Rather than covering his tracks, Moore openly posted classified details and personal files on social media, with data obtained from a veteran’s personal healthcare information. The case highlights both the vulnerability of government cybersecurity infrastructure and the careless actions of digital criminals who prioritise online notoriety over protective measures.

The shameless online attacks

Moore’s hacking spree revealed a worrying pattern of systematic, intentional incursions across multiple government agencies. Court filings show he penetrated the US Supreme Court’s online filing infrastructure at least 25 times over a two-month period, systematically logging into secure networks using credentials he had secured through unauthorised means. Rather than attempting a single opportunistic breach, Moore returned to these compromised systems numerous times each day, indicating a deliberate strategy to explore sensitive information. His actions compromised protected data across three different government departments, each containing data of substantial national significance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case demonstrates how online hubris can compromise otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court document repository 25 times across a two-month period
  • Breached AmeriCorps systems and Veterans Affairs medical portal
  • Distributed screenshots and personal information on Instagram publicly
  • Logged into restricted systems multiple times daily with compromised login details

Social media confession turns out to be expensive

Nicholas Moore’s opt to share his illegal actions on Instagram turned out to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and personal information belonging to victims, including sensitive details extracted from armed forces healthcare data. This flagrant cataloguing of federal crimes transformed what might have stayed concealed into undeniable proof readily available to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than gaining monetary advantage from his unlawful entry. His Instagram account effectively served as a confessional, supplying law enforcement with a detailed timeline and account of his criminal enterprise.

The case serves as a warning example for cybercriminals who prioritise internet notoriety over security practices. Moore’s actions showed a basic lack of understanding of the repercussions of disclosing federal crimes. Rather than staying anonymous, he created a lasting digital trail of his illegal entry, complete with photographic evidence and individual remarks. This reckless behaviour accelerated his identification and prosecution, ultimately culminating in criminal charges and court proceedings that have now entered the public domain. The contrast between Moore’s technical skill and his disastrous decision-making in broadcasting his activities highlights how online platforms can transform sophisticated cybercrimes into readily prosecutable crimes.

A habit of overt self-promotion

Moore’s Instagram posts showed a troubling pattern of growing self-assurance in his criminal abilities. He consistently recorded his entry into restricted government platforms, sharing screenshots that proved his breach into confidential networks. Each post served as both a admission and a form of online bragging, designed to showcase his hacking prowess to his social media audience. The content he shared contained not only evidence of his breaches but also personal information belonging to individuals whose data he had compromised. This obsessive drive to advertise his illegal activities indicated that the thrill of notoriety took precedence over Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as more performative than predatory, highlighting he seemed driven by the wish to impress acquaintances rather than leverage stolen information for financial advantage. His Instagram account functioned as an accidental confession, with each post offering law enforcement with further evidence of his guilt. The platform’s permanence meant Moore could not erase his crimes from existence; instead, his online bragging created a thorough record of his activities covering multiple breaches and various government agencies. This pattern ultimately sealed his fate, turning what might have been hard-to-prove cybercrimes into straightforward prosecutions.

Mild sentences and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s vulnerable circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to internet contacts further contributed to the lenient result.

The prosecution’s evaluation characterised a troubled young man rather than a major criminal operator. Court documents recorded Moore’s chronic health conditions, restricted monetary means, and practically non-existent employment history. Crucially, investigators discovered no indication that Moore had exploited the stolen information for personal gain or sold access to other individuals. Instead, his crimes appeared driven by youthful arrogance and the desire for online acceptance through internet fame. Judge Howell additionally observed during sentencing that Moore’s technical capabilities pointed to substantial promise for constructive involvement to society, provided he redirected his interests away from criminal activity. This assessment embodied a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case uncovers worrying gaps in US government cybersecurity infrastructure. His capacity to breach Supreme Court document repositories 25 times across two months using pilfered access credentials suggests concerningly weak password management and access control protocols. Judge Howell’s pointed commentary about Moore’s capacity for positive impact—given how easily he accessed sensitive systems—underscored the systemic breakdowns that facilitated these intrusions. The incident demonstrates that federal organisations remain exposed to moderately simple attacks relying on compromised usernames and passwords rather than advanced technical exploits. This case acts as a warning example about the implications of insufficient password protection across government networks.

Wider implications for public sector cyber security

The Moore case has reignited anxiety over the cybersecurity posture of US government bodies. Security experts have repeatedly flagged that public sector infrastructure often fall short of private sector standards, making use of aging systems and inconsistent password protocols. The reality that a 24-year-old with no formal training could repeatedly access the US Supreme Court’s electronic filing system creates pressing concerns about budget distribution and departmental objectives. Bodies responsible for safeguarding sensitive national information appear to have underinvested in fundamental protective systems, exposing themselves to opportunistic attacks. The leaks revealed not merely organisational records but medical information of military personnel, showing how inadequate protection adversely influences susceptible communities.

Looking ahead, cybersecurity experts have called for mandatory government-wide audits and updating of outdated infrastructure still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to introduce multi-factor authentication and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems repeatedly without setting off alerts suggests inadequate oversight and intrusion detection capabilities. Federal agencies must prioritise investment in experienced cybersecurity staff and system improvements, particularly given the growing complexity of state-backed and criminal cyber attacks. The Moore case shows that even low-tech breaches can reveal classified and sensitive information, making basic security hygiene a issue of national significance.

  • Government agencies require compulsory multi-factor authentication throughout all systems
  • Regular security audits and security testing should identify vulnerabilities proactively
  • Security personnel and training require substantial budget increases across federal government