Thursday, April 23, 2026
Breaking news, every hour

Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Hakin Holford

A 24-year-old hacker has pleaded guilty to gaining unauthorised access to multiple United States government systems after brazenly documenting his offences on Instagram under the account name “ihackedthegovernment.” Nicholas Moore admitted in court to unauthorisedly entering secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, employing pilfered usernames and passwords to obtain access on multiple instances. Rather than hiding the evidence, Moore brazenly distributed classified details and personal files on online platforms, including details extracted from a veteran’s health records. The case highlights both the weakness in federal security systems and the careless actions of online offenders who prioritise online notoriety over protective measures.

The bold digital breaches

Moore’s unauthorised access campaign demonstrated a concerning trend of recurring unauthorised access across several government departments. Court filings reveal he accessed the US Supreme Court’s digital filing platform at least 25 times over a two-month period, consistently entering protected systems using credentials he had secured through unauthorised means. Rather than making one isolated intrusion, Moore repeatedly accessed these compromised systems multiple times daily, suggesting a calculated effort to examine confidential data. His actions revealed sensitive information across three separate government institutions, each containing information of significant national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a publicly documented criminal record. The case demonstrates how online hubris can undermine otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court document repository on 25 occasions across a two-month period
  • Breached AmeriCorps systems and Veterans Affairs medical portal
  • Distributed screenshots and private data on Instagram to the public
  • Gained entry to protected networks numerous times each day using stolen credentials

Public admission on social media proves expensive

Nicholas Moore’s choice to publicise his unlawful conduct on Instagram became his downfall. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and private data belonging to victims, including restricted records extracted from veteran health records. This flagrant cataloguing of federal crimes transformed what might have remained hidden into conclusive documentation easily accessible to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than gaining monetary advantage from his unauthorised breach. His Instagram account practically operated as a confessional, providing investigators with a thorough sequence of events and account of his criminal enterprise.

The case represents a cautionary tale for cybercriminals who give priority to internet notoriety over security practices. Moore’s actions showed a core misunderstanding of the consequences associated with disclosing federal crimes. Rather than maintaining anonymity, he generated a lasting digital trail of his illegal entry, complete with photographic evidence and personal commentary. This careless actions accelerated his identification and prosecution, ultimately culminating in criminal charges and legal proceedings that have now become widely known. The contrast between Moore’s technical skill and his appalling judgment in publicising his actions highlights how social media can turn advanced cybercrimes into readily prosecutable crimes.

A pattern of open bragging

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his criminal abilities. He continually logged his entry into classified official systems, posting images that illustrated his infiltration of sensitive systems. Each post constituted both a confession and a form of digital boasting, intended to showcase his technical expertise to his online followers. The content he shared contained not only evidence of his breaches but also personal information belonging to people whose information he had exposed. This obsessive drive to advertise his illegal activities implied that the excitement of infamy mattered more to Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as performative rather than predatory, highlighting he seemed driven by the wish to impress acquaintances rather than leverage stolen information for financial advantage. His Instagram account operated as an unintentional admission, with each post offering law enforcement with more evidence of his guilt. The permanence of the platform meant Moore could not simply delete his crimes from existence; instead, his online bragging created a detailed record of his activities covering multiple breaches and numerous government agencies. This pattern ultimately determined his fate, turning what might have been hard-to-prove cybercrimes into straightforward prosecutions.

Lenient sentencing and structural weaknesses

Nicholas Moore’s sentencing proved remarkably lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, citing Moore’s precarious situation and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s absence of financial motive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to internet contacts further contributed to the lenient result.

The prosecution’s own evaluation depicted a young man with significant difficulties rather than a major criminal operator. Court documents noted Moore’s long-term disabilities, restricted monetary means, and practically non-existent employment history. Crucially, investigators uncovered nothing that Moore had exploited the stolen information for personal gain or sold access to external organisations. Instead, his crimes were apparently propelled by youthful self-regard and the need for social validation through online notoriety. Judge Howell additionally observed during sentencing that Moore’s technical capabilities indicated considerable capacity for beneficial participation to society, provided he redirected his interests away from criminal activity. This assessment demonstrated a judicial philosophy stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case exposes troubling gaps in US government cyber security infrastructure. His ability to access Supreme Court document repositories 25 times over two months using compromised login details suggests alarmingly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s capacity for positive impact—given how easily he accessed sensitive systems—underscored the systemic breakdowns that facilitated these breaches. The incident shows that public sector bodies remain vulnerable to relatively unsophisticated attacks exploiting stolen login credentials rather than sophisticated technical attacks. This case functions as a cautionary example about the implications of insufficient password protection across federal systems.

Broader implications for public sector cyber security

The Moore case has revived concerns about the cybersecurity posture of American federal agencies. Security professionals have consistently cautioned that public sector infrastructure often underperform compared to private enterprise practices, making use of legacy technology and inconsistent password protocols. The fact that a 24-year-old with no formal training could repeatedly access the Supreme Court’s digital filing platform prompts difficult inquiries about resource allocation and institutional priorities. Agencies tasked with protecting sensitive national information seem to have under-resourced in essential security safeguards, creating vulnerability to exploitative incursions. The incidents disclosed not merely internal documents but medical information of military personnel, demonstrating how weak digital security adversely influences at-risk groups.

Moving forward, cybersecurity experts have urged compulsory audits across government and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to introduce multi-factor verification and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems on multiple occasions without setting off alerts points to inadequate oversight and intrusion detection systems. Federal agencies must prioritise investment in experienced cybersecurity staff and infrastructure upgrades, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case shows that even low-tech breaches can reveal classified and sensitive data, making basic security hygiene a matter of national importance.

  • Public sector organisations require mandatory multi-factor authentication throughout all systems
  • Regular security audits and penetration testing must uncover potential weaknesses in advance
  • Security personnel and training require significant funding growth at federal level