Thursday, April 23, 2026
Breaking news, every hour

Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Kynel Merland

A 24-year-old cybercriminal has confessed to infiltrating multiple United States federal networks after openly recording his offences on Instagram under the handle “ihackedthegovernment.” Nicholas Moore confessed during proceedings to unauthorisedly entering restricted platforms run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, employing pilfered usernames and passwords to gain entry on numerous occasions. Rather than hiding the evidence, Moore brazenly distributed screenshots and sensitive personal information on social media, with data obtained from a veteran’s health records. The case underscores both the weakness in federal security systems and the irresponsible conduct of digital criminals who seek internet fame over protective measures.

The shameless cyber intrusions

Moore’s hacking spree revealed a concerning trend of repeated, deliberate breaches across several government departments. Court filings show he accessed the US Supreme Court’s electronic filing system at least 25 times over a period lasting two months, consistently entering restricted platforms using credentials he had acquired unlawfully. Rather than attempting a single opportunistic breach, Moore repeatedly accessed these infiltrated networks numerous times each day, indicating a deliberate strategy to explore sensitive information. His actions revealed sensitive information across three distinct state agencies, each containing data of substantial national significance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how online hubris can undermine otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system on 25 occasions over two months
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Posted screenshots and personal information on Instagram publicly
  • Logged into protected networks multiple times daily with compromised login details

Social media confession proves expensive

Nicholas Moore’s opt to share his criminal activity on Instagram proved to be his downfall. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and private data belonging to victims, including confidential information extracted from armed forces healthcare data. This audacious recording of federal crimes converted what might have gone undetected into irrefutable evidence easily accessible to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than profiting from his unauthorised breach. His Instagram account practically operated as a confessional, providing investigators with a detailed timeline and account of his criminal enterprise.

The case constitutes a cautionary example for cybercriminals who prioritise digital notoriety over operational security. Moore’s actions demonstrated a basic lack of understanding of the ramifications linked to broadcasting federal offences. Rather than preserving anonymity, he generated a lasting digital trail of his intrusions, complete with visual documentation and individual remarks. This reckless behaviour expedited his identification and prosecution, ultimately culminating in criminal charges and legal proceedings that have now entered the public domain. The contrast between Moore’s technical skill and his catastrophic judgment in sharing his activities highlights how social networks can turn advanced cybercrimes into straightforward prosecutable offences.

A habit of open bragging

Moore’s Instagram posts displayed a disturbing pattern of escalating confidence in his criminal abilities. He consistently recorded his entry into restricted government platforms, posting images that proved his breach into sensitive systems. Each post constituted both a admission and a form of digital boasting, designed to highlight his technical expertise to his online followers. The material he posted included not only proof of his intrusions but also personal information belonging to individuals whose data he had compromised. This compulsive need to publicise his crimes implied that the thrill of notoriety mattered more to Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as performative in nature rather than predatory, observing he was motivated primarily by the urge to gain approval from acquaintances rather than exploit stolen information for financial exploitation. His Instagram account operated as an inadvertent confession, with every post offering law enforcement with further evidence of his guilt. The platform’s permanence meant Moore was unable to remove his crimes from existence; instead, his online bragging created a thorough record of his activities spanning multiple breaches and numerous government agencies. This pattern ultimately determined his fate, transforming what might have been challenging cybercrimes to prove into straightforward cases.

Mild sentences and systemic weaknesses

Nicholas Moore’s sentencing turned out to be notably lenient given the severity of his crimes. Rather than handing down the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell selected instead a single year of probation. Prosecutors refrained from recommending custodial punishment, citing Moore’s precarious situation and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to internet contacts further shaped the lenient decision.

The prosecution’s assessment painted a portrait of a young man with significant difficulties rather than a serious organised crime figure. Court documents highlighted Moore’s long-term disabilities, restricted monetary means, and virtually non-existent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for financial advantage or provided entry to third parties. Instead, his crimes seemed motivated by youthful self-regard and the desire for online acceptance through digital prominence. Judge Howell additionally observed during sentencing that Moore’s technical capabilities pointed to substantial promise for beneficial participation to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case exposes worrying gaps in American federal cyber security infrastructure. His capacity to breach Supreme Court filing systems 25 times across two months using compromised login details suggests alarmingly weak password management and permission management protocols. Judge Howell’s sardonic observation about Moore’s capacity for positive impact—given how readily he breached restricted networks—underscored the institutional failures that allowed these security incidents. The incident demonstrates that public sector bodies remain at risk to moderately simple attacks relying on compromised usernames and passwords rather than advanced technical exploits. This case acts as a cautionary tale about the consequences of inadequate credential security across federal systems.

Wider implications for government cybersecurity

The Moore case has reignited concerns about the cybersecurity posture of federal government institutions. Security experts have repeatedly flagged that public sector infrastructure often lag behind private enterprise practices, relying on legacy technology and irregular security procedures. The circumstance that a young person without professional credentials could gain multiple times access to the Supreme Court’s digital filing platform creates pressing concerns about resource allocation and departmental objectives. Agencies tasked with protecting classified government data appear to have underinvested in basic security measures, creating vulnerability to opportunistic attacks. The leaks revealed not simply administrative files but healthcare data of military personnel, showing how weak digital security directly impacts vulnerable populations.

Moving forward, cybersecurity experts have urged mandatory government-wide audits and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor verification and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems repeatedly without triggering alarms suggests insufficient monitoring and intrusion detection capabilities. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, particularly given the growing complexity of state-sponsored and criminal hacking operations. The Moore case demonstrates that even basic security lapses can compromise classified and sensitive information, making basic security practices a issue of national significance.

  • Public sector organisations require mandatory multi-factor authentication across all systems
  • Regular security audits and penetration testing must uncover potential weaknesses in advance
  • Cybersecurity staffing and development demands substantial budget increases across federal government