Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ashan Lanton

A 24-year-old cybercriminal has confessed to infiltrating numerous United States federal networks after publicly sharing his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore admitted in court to unauthorisedly entering secure systems run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, using stolen usernames and passwords to obtain access on multiple instances. Rather than covering his tracks, Moore brazenly distributed confidential data and private records on online platforms, with data obtained from a veteran’s health records. The case underscores both the vulnerability of federal security systems and the irresponsible conduct of cyber perpetrators who seek internet fame over operational security.

The shameless digital breaches

Moore’s hacking spree demonstrated a worrying pattern of systematic, intentional incursions across several government departments. Court filings disclose he accessed the US Supreme Court’s digital filing platform at least 25 times over a span of two months, repeatedly accessing restricted platforms using credentials he had acquired unlawfully. Rather than conducting a lone opportunistic attack, Moore repeatedly accessed these infiltrated networks several times per day, suggesting a calculated effort to investigate restricted materials. His actions compromised protected data across three different government departments, each containing material of considerable national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a publicly documented criminal record. The case demonstrates how online hubris can compromise otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court filing system 25 times over two months
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Shared screenshots and private data on Instagram publicly
  • Gained entry to restricted systems multiple times daily using stolen credentials

Social media confession proves costly

Nicholas Moore’s decision to broadcast his criminal activity on Instagram became his downfall. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and private data belonging to victims, including sensitive details extracted from armed forces healthcare data. This audacious recording of federal crimes converted what might have remained hidden into irrefutable evidence promptly obtainable to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be impressing online acquaintances rather than profiting from his illicit access. His Instagram account practically operated as a confessional, supplying law enforcement with a thorough sequence of events and documentation of his criminal enterprise.

The case represents a warning example for digital criminals who place emphasis on internet notoriety over security protocols. Moore’s actions demonstrated a fundamental misunderstanding of the consequences associated with publicising federal crimes. Rather than preserving anonymity, he generated a permanent digital record of his illegal entry, complete with photographic evidence and individual remarks. This reckless behaviour hastened his identification and legal action, ultimately culminating in criminal charges and legal proceedings that have now entered the public domain. The contrast between Moore’s technical skill and his disastrous decision-making in sharing his activities highlights how social media can convert complex cybercrimes into readily prosecutable crimes.

A habit of public boasting

Moore’s Instagram posts showed a concerning pattern of escalating confidence in his illegal capabilities. He continually logged his access to restricted government platforms, sharing screenshots that illustrated his infiltration of sensitive systems. Each post constituted both a confession and a form of digital boasting, designed to highlight his technical expertise to his online followers. The material he posted included not only proof of his intrusions but also personal information belonging to individuals whose data he had compromised. This compulsive need to publicise his crimes implied that the excitement of infamy mattered more to Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as performative in nature rather than predatory, highlighting he was motivated primarily by the urge to gain approval from acquaintances rather than exploit stolen information for financial exploitation. His Instagram account operated as an inadvertent confession, with each upload providing law enforcement with additional evidence of his guilt. The permanence of the platform meant Moore was unable to remove his crimes from existence; instead, his online bragging created a detailed record of his activities encompassing multiple breaches and various government agencies. This pattern ultimately determined his fate, turning what might have been difficult-to-prove cybercrimes into straightforward cases.

Lenient sentencing and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors refrained from recommending custodial punishment, pointing to Moore’s difficult circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to web-based associates further contributed to the lenient result.

The prosecution’s assessment characterised a troubled young man rather than a serious organised crime figure. Court documents noted Moore’s persistent impairments, constrained economic circumstances, and practically non-existent employment history. Crucially, investigators found no evidence that Moore had misused the pilfered data for financial advantage or sold access to third parties. Instead, his crimes appeared driven by youthful self-regard and the need for peer recognition through digital prominence. Judge Howell even remarked during sentencing that Moore’s technical capabilities indicated considerable capacity for constructive involvement to society, provided he redirected his interests away from criminal activity. This assessment reflected a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case exposes troubling gaps in US government cybersecurity infrastructure. His ability to access Supreme Court document repositories 25 times over two months using compromised login details suggests concerningly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s capacity for positive impact—given how effortlessly he breached sensitive systems—underscored the organisational shortcomings that allowed these security incidents. The incident shows that public sector bodies remain exposed to fairly basic attacks relying on breached account details rather than sophisticated technical attacks. This case acts as a cautionary tale about the implications of insufficient password protection across government networks.

Broader implications for government cyber defence

The Moore case has reignited anxiety over the digital defence position of US government bodies. Security experts have long warned that government systems often fall short of commercial industry benchmarks, making use of aging systems and inconsistent password protocols. The fact that a individual lacking formal qualification could gain multiple times access to the Supreme Court’s digital filing platform raises uncomfortable questions about resource allocation and departmental objectives. Bodies responsible for safeguarding critical state information demonstrate insufficient investment in basic security measures, leaving themselves vulnerable to opportunistic attacks. The breaches exposed not simply organisational records but medical information from service members, demonstrating how inadequate protection adversely influences at-risk groups.

Moving forward, cybersecurity experts have urged compulsory audits across government and updating of outdated infrastructure still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to introduce multi-factor authentication and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems repeatedly without triggering alarms points to inadequate oversight and intrusion detection systems. Federal agencies must prioritise investment in experienced cybersecurity staff and infrastructure upgrades, especially considering the growing complexity of state-sponsored and criminal hacking operations. The Moore case shows that even low-tech breaches can expose classified and sensitive data, making basic security practices a issue of national significance.

  • Public sector organisations need mandatory multi-factor authentication throughout all systems
  • Routine security assessments and penetration testing should identify vulnerabilities proactively
  • Cybersecurity staffing and training require significant funding growth across federal government