Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ashlan Merridge

A 24-year-old hacker has admitted to infiltrating numerous United States state infrastructure after brazenly documenting his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to unlawfully penetrating protected networks operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, leveraging compromised usernames and passwords to gain entry on numerous occasions. Rather than concealing his activities, Moore openly posted confidential data and private records on digital networks, with data obtained from a veteran’s medical files. The case highlights both the vulnerability of state digital defences and the reckless behaviour of digital criminals who pursue digital celebrity over protective measures.

The bold online attacks

Moore’s cyber intrusion campaign revealed a troubling pattern of recurring unauthorised access across multiple government agencies. Court filings disclose he penetrated the US Supreme Court’s digital filing platform at least 25 times over a period lasting two months, consistently entering restricted platforms using credentials he had secured through unauthorised means. Rather than conducting a lone opportunistic attack, Moore returned to these infiltrated networks multiple times daily, suggesting a calculated effort to investigate restricted materials. His actions exposed classified data across three separate government institutions, each containing information of significant national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how digital arrogance can undermine otherwise sophisticated hacking attempts, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court document repository 25 times over two months
  • Compromised AmeriCorps systems and Veterans Affairs health platform
  • Distributed screenshots and private data on Instagram publicly
  • Logged into restricted systems numerous times each day with compromised login details

Public admission on social media proves expensive

Nicholas Moore’s decision to broadcast his criminal activity on Instagram became his undoing. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and personal information belonging to victims, including sensitive details extracted from military medical files. This brazen documentation of federal crimes changed what might have remained hidden into undeniable proof easily accessible to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than benefiting financially from his illicit access. His Instagram account practically operated as a confessional, providing investigators with a comprehensive chronology and documentation of his criminal enterprise.

The case represents a cautionary tale for cybercriminals who give priority to online infamy over security protocols. Moore’s actions revealed a core misunderstanding of the repercussions of disclosing federal crimes. Rather than staying anonymous, he generated a enduring digital documentation of his illegal entry, complete with visual documentation and personal commentary. This irresponsible conduct accelerated his identification and prosecution, ultimately leading to charges and court action that have now entered the public domain. The contrast between Moore’s technical proficiency and his disastrous decision-making in broadcasting his activities highlights how online platforms can turn advanced cybercrimes into readily prosecutable crimes.

A habit of public boasting

Moore’s Instagram posts showed a concerning pattern of escalating confidence in his criminal abilities. He consistently recorded his entry into restricted government platforms, sharing screenshots that proved his infiltration of confidential networks. Each post served as both a confession and a form of online bragging, designed to showcase his technical expertise to his online followers. The content he shared contained not only evidence of his breaches but also private data belonging to people whose information he had exposed. This pressing urge to broadcast his offences indicated that the thrill of notoriety mattered more to Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative in nature rather than predatory, observing he was motivated primarily by the desire to impress acquaintances rather than utilise stolen information for financial exploitation. His Instagram account operated as an accidental confession, with each upload providing law enforcement with additional evidence of his guilt. The permanence of the platform meant Moore could not erase his crimes from existence; instead, his digital self-promotion created a detailed record of his activities spanning multiple breaches and numerous government agencies. This pattern ultimately determined his fate, transforming what might have been difficult-to-prove cybercrimes into straightforward prosecutions.

Mild sentences and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than applying the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s precarious situation and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—looked to be influential in the judge’s decision. Moore’s lack of financial motivation for the breaches and absence of malicious intent beyond demonstrating his technical prowess to internet contacts further influenced the lenient outcome.

The prosecution’s assessment characterised a troubled young man rather than a major criminal operator. Court documents highlighted Moore’s long-term disabilities, restricted monetary means, and virtually non-existent employment history. Crucially, investigators found no evidence that Moore had exploited the stolen information for personal gain or granted permissions to external organisations. Instead, his crimes seemed motivated by youthful arrogance and the desire for social validation through digital prominence. Judge Howell additionally observed during sentencing that Moore’s technical proficiency indicated considerable capacity for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a judicial philosophy stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case reveals concerning gaps in American federal cyber security infrastructure. His capacity to breach Supreme Court filing systems 25 times over two months using pilfered access credentials suggests concerningly weak credential oversight and access control protocols. Judge Howell’s wry remark about Moore’s potential for good—given how easily he penetrated restricted networks—underscored the institutional failures that allowed these intrusions. The incident illustrates that federal organisations remain vulnerable to fairly basic attacks exploiting breached account details rather than sophisticated technical attacks. This case acts as a cautionary tale about the consequences of insufficient password protection across public sector infrastructure.

Wider implications for public sector cyber security

The Moore case has rekindled concerns about the cybersecurity posture of federal government institutions. Cybersecurity specialists have consistently cautioned that state systems often lag behind private enterprise practices, relying on legacy technology and variable authentication procedures. The circumstance that a young person without professional credentials could continually breach the Court’s online document system raises uncomfortable questions about financial priorities and departmental objectives. Organisations charged with defending critical state information seem to have under-resourced in essential security safeguards, exposing themselves to opportunistic attacks. The breaches exposed not simply administrative files but medical information belonging to veterans, demonstrating how inadequate protection significantly affects vulnerable populations.

Going forward, cybersecurity experts have urged compulsory audits across government and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to implement multi-factor authentication and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems on multiple occasions without triggering alarms suggests inadequate oversight and intrusion detection systems. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, especially considering the growing complexity of state-backed and criminal cyber attacks. The Moore case demonstrates that even low-tech breaches can reveal classified and sensitive data, making basic security hygiene a issue of national significance.

  • Government agencies require mandatory multi-factor authentication throughout all systems
  • Regular security audits and penetration testing should identify vulnerabilities proactively
  • Security personnel and development demands substantial budget increases at federal level