Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ellin Selton

A 24-year-old hacker has confessed to gaining unauthorised access to multiple United States federal networks after brazenly documenting his offences on Instagram under the username “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unauthorisedly entering secure systems operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, using stolen usernames and passwords to gain entry on multiple instances. Rather than hiding the evidence, Moore publicly shared confidential data and private records on social media, containing information sourced from a veteran’s personal healthcare information. The case highlights both the fragility of federal security systems and the irresponsible conduct of digital criminals who prioritise online notoriety over protective measures.

The shameless digital breaches

Moore’s cyber intrusion campaign demonstrated a troubling pattern of repeated, deliberate breaches across multiple government agencies. Court filings show he gained entry to the US Supreme Court’s online filing infrastructure at least 25 times over a period lasting two months, repeatedly accessing secure networks using credentials he had acquired unlawfully. Rather than attempting a single opportunistic breach, Moore repeatedly accessed these compromised systems numerous times each day, indicating a deliberate strategy to investigate restricted materials. His actions revealed sensitive information across three different government departments, each containing material of considerable national importance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case exemplifies how online hubris can undermine otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Connected to Supreme Court document repository on 25 occasions over two months
  • Compromised AmeriCorps systems and Veterans Affairs health platform
  • Distributed screenshots and personal information on Instagram publicly
  • Accessed protected networks multiple times daily using stolen credentials

Social media confession turns out to be costly

Nicholas Moore’s choice to publicise his unlawful conduct on Instagram turned out to be his downfall. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and personal information belonging to victims, including restricted records extracted from military medical files. This audacious recording of federal crimes converted what might have stayed concealed into undeniable proof easily accessible to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be impressing online acquaintances rather than profiting from his illicit access. His Instagram account essentially functioned as a confessional, supplying law enforcement with a thorough sequence of events and account of his criminal enterprise.

The case represents a cautionary example for cybercriminals who give priority to internet notoriety over operational security. Moore’s actions demonstrated a basic lack of understanding of the consequences associated with disclosing federal crimes. Rather than preserving anonymity, he created a enduring digital documentation of his unauthorised access, complete with photographic proof and personal commentary. This reckless behaviour accelerated his identification and legal action, ultimately leading to criminal charges and legal proceedings that have now become widely known. The contrast between Moore’s technical skill and his disastrous decision-making in publicising his actions highlights how social networks can convert complex cybercrimes into easily prosecutable offences.

A pattern of overt self-promotion

Moore’s Instagram posts revealed a troubling pattern of growing self-assurance in his illegal capabilities. He repeatedly documented his access to classified official systems, posting images that illustrated his penetration of sensitive systems. Each post constituted both a admission and a form of digital boasting, intended to highlight his technical expertise to his online followers. The material he posted contained not only proof of his intrusions but also personal information of individuals whose data he had compromised. This compulsive need to broadcast his offences suggested that the thrill of notoriety was more important to Moore than the seriousness of what he had done.

Prosecutors characterised Moore’s behaviour as more performative than predatory, highlighting he was motivated primarily by the desire to impress acquaintances rather than leverage stolen information for monetary gain. His Instagram account functioned as an inadvertent confession, with each upload offering law enforcement with more evidence of his guilt. The enduring nature of the platform meant Moore could not simply remove his crimes from existence; instead, his digital self-promotion created a comprehensive record of his activities encompassing multiple breaches and multiple government agencies. This pattern ultimately determined his fate, transforming what might have been hard-to-prove cybercrimes into straightforward prosecutions.

Lenient sentences and systemic weaknesses

Nicholas Moore’s sentencing proved remarkably lenient given the seriousness of his crimes. Rather than imposing the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors declined to recommend custodial punishment, citing Moore’s difficult circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s absence of financial motive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to online acquaintances further influenced the lenient outcome.

The prosecution evaluation characterised a disturbed youth rather than a serious organised crime figure. Court documents noted Moore’s long-term disabilities, limited financial resources, and practically non-existent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for private benefit or sold access to external organisations. Instead, his crimes seemed motivated by adolescent overconfidence and the desire for social validation through online notoriety. Judge Howell even remarked during sentencing that Moore’s technical capabilities pointed to substantial promise for constructive involvement to society, provided he redirected his interests away from criminal activity. This assessment reflected a judicial philosophy stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case uncovers worrying gaps in US government cybersecurity infrastructure. His success in entering Supreme Court document repositories 25 times across two months using pilfered access credentials suggests concerningly weak credential oversight and permission management protocols. Judge Howell’s sardonic observation about Moore’s capacity for positive impact—given how effortlessly he accessed restricted networks—underscored the institutional failures that facilitated these intrusions. The incident shows that public sector bodies remain exposed to moderately simple attacks exploiting stolen login credentials rather than complex technical methods. This case functions as a cautionary tale about the implications of inadequate credential security across government networks.

Wider implications for government cyber defence

The Moore case has rekindled worries regarding the cybersecurity posture of US government bodies. Security experts have repeatedly flagged that state systems often fall short of private sector standards, relying on outdated infrastructure and inconsistent password protocols. The circumstance that a 24-year-old with no formal training could repeatedly access the Court’s online document system raises uncomfortable questions about financial priorities and organisational focus. Bodies responsible for safeguarding classified government data seem to have under-resourced in fundamental protective systems, creating vulnerability to targeted breaches. The incidents disclosed not just organisational records but medical information belonging to veterans, showing how poor cybersecurity directly impacts at-risk groups.

Looking ahead, cybersecurity experts have called for compulsory audits across government and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to introduce multi-factor verification and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms points to inadequate oversight and intrusion detection capabilities. Federal agencies must focus resources in experienced cybersecurity staff and system improvements, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case shows that even basic security lapses can compromise classified and sensitive data, making basic security hygiene a issue of national significance.

  • Public sector organisations need compulsory multi-factor authentication across all systems
  • Regular security audits and penetration testing should identify vulnerabilities proactively
  • Security personnel and training require significant funding growth across federal government