Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Camkin Penfield

A 24-year-old hacker has pleaded guilty to infiltrating multiple United States federal networks after openly recording his crimes on Instagram under the handle “ihackedthegovernment.” Nicholas Moore admitted in court to illegally accessing secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, leveraging compromised usernames and passwords to break in on multiple instances. Rather than hiding the evidence, Moore publicly shared screenshots and sensitive personal information on digital networks, with data obtained from a veteran’s medical files. The case highlights both the weakness in government cybersecurity infrastructure and the reckless behaviour of cyber perpetrators who seek internet fame over protective measures.

The shameless online attacks

Moore’s cyber intrusion campaign demonstrated a troubling pattern of systematic, intentional incursions across several government departments. Court filings disclose he gained entry to the US Supreme Court’s digital filing platform at least 25 times over a span of two months, systematically logging into protected systems using credentials he had acquired unlawfully. Rather than attempting a single opportunistic breach, Moore returned to these breached platforms several times per day, suggesting a calculated effort to investigate restricted materials. His actions revealed sensitive information across three separate government institutions, each containing information of significant national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case demonstrates how digital arrogance can undermine otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court document repository on 25 occasions across a two-month period
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Posted screenshots and personal information on Instagram to the public
  • Logged into restricted systems multiple times daily with compromised login details

Public admission on social media turns out to be costly

Nicholas Moore’s decision to broadcast his illegal actions on Instagram became his downfall. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and identifying details belonging to victims, including restricted records extracted from armed forces healthcare data. This flagrant cataloguing of federal crimes changed what might have gone undetected into irrefutable evidence promptly obtainable to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than profiting from his illicit access. His Instagram account essentially functioned as a confessional, providing investigators with a detailed timeline and documentation of his criminal enterprise.

The case serves as a warning example for cybercriminals who give priority to internet notoriety over security practices. Moore’s actions showed a basic lack of understanding of the consequences associated with publicising federal crimes. Rather than preserving anonymity, he generated a permanent digital record of his intrusions, complete with photographic evidence and personal commentary. This careless actions accelerated his identification and prosecution, ultimately resulting in criminal charges and court proceedings that have now become widely known. The contrast between Moore’s technical skill and his disastrous decision-making in broadcasting his activities highlights how social media can turn advanced cybercrimes into easily prosecutable offences.

A tendency towards open bragging

Moore’s Instagram posts showed a troubling pattern of escalating confidence in his illegal capabilities. He consistently recorded his entry into classified official systems, posting images that proved his penetration of sensitive systems. Each post constituted both a admission and a form of digital boasting, designed to showcase his technical expertise to his online followers. The content he shared contained not only evidence of his breaches but also private data belonging to individuals whose data he had compromised. This pressing urge to publicise his crimes suggested that the thrill of notoriety took precedence over Moore than the seriousness of what he had done.

Prosecutors described Moore’s behaviour as performative rather than predatory, highlighting he appeared motivated by the desire to impress acquaintances rather than utilise stolen information for financial exploitation. His Instagram account functioned as an accidental confession, with each upload offering law enforcement with further evidence of his guilt. The enduring nature of the platform meant Moore was unable to remove his crimes from existence; instead, his online bragging created a thorough record of his activities encompassing multiple breaches and numerous government agencies. This pattern ultimately sealed his fate, turning what might have been hard-to-prove cybercrimes into clear-cut prosecutions.

Mild sentences and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, referencing Moore’s precarious situation and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to online acquaintances further influenced the lenient outcome.

The prosecution’s own assessment depicted a troubled young man rather than a serious organised crime figure. Court documents noted Moore’s long-term disabilities, constrained economic circumstances, and virtually non-existent employment history. Crucially, investigators uncovered nothing that Moore had misused the pilfered data for financial advantage or granted permissions to external organisations. Instead, his crimes appeared driven by youthful self-regard and the need for peer recognition through online notoriety. Judge Howell additionally observed during sentencing that Moore’s computing skills pointed to substantial promise for positive contribution to society, provided he redirected his interests away from criminal activity. This assessment reflected a sentencing approach prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case uncovers troubling gaps in American federal cyber security infrastructure. His success in entering Supreme Court filing systems 25 times over two months using stolen credentials suggests alarmingly weak credential oversight and access control protocols. Judge Howell’s sardonic observation about Moore’s potential for good—given how effortlessly he penetrated sensitive systems—underscored the institutional failures that allowed these intrusions. The incident demonstrates that government agencies remain vulnerable to fairly basic attacks relying on stolen login credentials rather than sophisticated technical attacks. This case acts as a cautionary tale about the repercussions of weak authentication safeguards across federal systems.

Wider implications for government cyber defence

The Moore case has reignited anxiety over the cybersecurity posture of American federal agencies. Security professionals have long warned that government systems often lag behind private enterprise practices, making use of aging systems and variable authentication procedures. The circumstance that a 24-year-old with no formal training could repeatedly access the Court’s online document system raises uncomfortable questions about financial priorities and departmental objectives. Agencies tasked with protecting critical state information appear to have underinvested in basic security measures, exposing themselves to targeted breaches. The incidents disclosed not merely organisational records but healthcare data belonging to veterans, demonstrating how weak digital security significantly affects at-risk groups.

Moving forward, cybersecurity experts have urged compulsory audits across government and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to introduce multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms points to inadequate oversight and intrusion detection capabilities. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, especially considering the growing complexity of state-backed and criminal cyber attacks. The Moore case demonstrates that even low-tech breaches can compromise classified and sensitive information, making basic security practices a matter of national importance.

  • Government agencies require mandatory multi-factor authentication across all systems
  • Routine security assessments and penetration testing must uncover vulnerabilities proactively
  • Cybersecurity staffing and development demands substantial budget increases at federal level