Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Kaley Lanwick

A 24-year-old hacker has confessed to infiltrating multiple United States state infrastructure after openly recording his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore admitted in court to unauthorisedly entering protected networks operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, leveraging compromised usernames and passwords to gain entry on multiple instances. Rather than hiding the evidence, Moore brazenly distributed confidential data and private records on online platforms, with data obtained from a veteran’s health records. The case demonstrates both the weakness in state digital defences and the careless actions of digital criminals who pursue digital celebrity over operational security.

The audacious online attacks

Moore’s hacking spree demonstrated a troubling pattern of systematic, intentional incursions across multiple government agencies. Court filings show he accessed the US Supreme Court’s online filing infrastructure at least 25 times over a period lasting two months, systematically logging into protected systems using credentials he had obtained illegally. Rather than making one isolated intrusion, Moore went back to these infiltrated networks several times per day, implying a planned approach to investigate restricted materials. His actions compromised protected data across three separate government institutions, each containing data of substantial national significance and private information sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how online hubris can compromise otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system on 25 occasions over two months
  • Compromised AmeriCorps systems and Veterans Affairs health platform
  • Shared screenshots and personal information on Instagram to the public
  • Gained entry to protected networks multiple times daily using stolen credentials

Public admission on social media turns out to be costly

Nicholas Moore’s decision to broadcast his illegal actions on Instagram proved to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and private data belonging to victims, including restricted records extracted from veteran health records. This flagrant cataloguing of federal crimes converted what might have gone undetected into conclusive documentation readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than profiting from his illicit access. His Instagram account practically operated as a confessional, furnishing authorities with a thorough sequence of events and documentation of his criminal enterprise.

The case constitutes a cautionary tale for digital criminals who place emphasis on online infamy over security protocols. Moore’s actions revealed a basic lack of understanding of the repercussions of broadcasting federal offences. Rather than maintaining anonymity, he created a enduring digital documentation of his unauthorised access, complete with visual documentation and personal commentary. This reckless behaviour expedited his identification and prosecution, ultimately resulting in criminal charges and court proceedings that have now become public knowledge. The contrast between Moore’s technical capability and his appalling judgment in publicising his actions highlights how online platforms can turn advanced cybercrimes into straightforward prosecutable offences.

A pattern of public boasting

Moore’s Instagram posts revealed a disturbing pattern of growing self-assurance in his criminal abilities. He continually logged his entry into restricted government platforms, sharing screenshots that illustrated his breach into confidential networks. Each post constituted both a admission and a form of digital boasting, intended to highlight his hacking prowess to his online followers. The material he posted included not only evidence of his breaches but also personal information of people whose information he had exposed. This obsessive drive to broadcast his offences suggested that the thrill of notoriety took precedence over Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as more performative than predatory, observing he was motivated primarily by the desire to impress acquaintances rather than leverage stolen information for financial advantage. His Instagram account functioned as an accidental confession, with each post providing law enforcement with additional evidence of his guilt. The platform’s permanence meant Moore could not simply remove his crimes from existence; instead, his digital self-promotion created a comprehensive record of his activities spanning multiple breaches and multiple government agencies. This pattern ultimately determined his fate, converting what might have been challenging cybercrimes to prove into straightforward cases.

Lenient sentences and structural weaknesses

Nicholas Moore’s sentencing proved remarkably lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors declined to recommend custodial punishment, citing Moore’s precarious situation and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to internet contacts further contributed to the lenient result.

The prosecution’s assessment painted a portrait of a young man with significant difficulties rather than a dangerous criminal mastermind. Court documents highlighted Moore’s persistent impairments, restricted monetary means, and almost entirely absent employment history. Crucially, investigators uncovered nothing that Moore had misused the pilfered data for personal gain or granted permissions to external organisations. Instead, his crimes appeared driven by youthful arrogance and the need for social validation through digital prominence. Judge Howell further noted during sentencing that Moore’s technical proficiency indicated considerable capacity for constructive involvement to society, provided he refocused his efforts away from criminal activity. This assessment demonstrated a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case exposes worrying gaps in US government cyber security infrastructure. His capacity to breach Supreme Court filing systems 25 times over two months using compromised login details suggests concerningly weak credential oversight and permission management protocols. Judge Howell’s pointed commentary about Moore’s potential for good—given how effortlessly he penetrated restricted networks—underscored the systemic breakdowns that facilitated these intrusions. The incident illustrates that public sector bodies remain at risk to moderately simple attacks dependent on stolen login credentials rather than advanced technical exploits. This case serves as a warning example about the implications of inadequate credential security across federal systems.

Wider implications for government cybersecurity

The Moore case has reignited anxiety over the security stance of American federal agencies. Security experts have repeatedly flagged that government systems often underperform compared to private enterprise practices, relying on aging systems and variable authentication procedures. The fact that a 24-year-old with no formal training could continually breach the Court’s online document system prompts difficult inquiries about resource allocation and departmental objectives. Agencies tasked with protecting critical state information demonstrate insufficient investment in essential security safeguards, creating vulnerability to targeted breaches. The leaks revealed not just organisational records but personal health records of military personnel, illustrating how weak digital security significantly affects susceptible communities.

Going forward, cybersecurity experts have advocated for compulsory audits across government and modernisation of legacy systems still relying on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems repeatedly without triggering alarms indicates inadequate oversight and intrusion detection capabilities. Federal agencies must focus resources in skilled cybersecurity personnel and system improvements, especially considering the growing complexity of state-sponsored and criminal hacking operations. The Moore case illustrates that even low-tech breaches can compromise classified and sensitive information, making basic security hygiene a matter of national importance.

  • Public sector organisations require mandatory multi-factor authentication across all systems
  • Routine security assessments and penetration testing should identify potential weaknesses in advance
  • Cybersecurity staffing and development demands substantial budget increases across federal government