Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Brylen Calmore

A 24-year-old hacker has pleaded guilty to breaching several United States federal networks after openly recording his illegal activities on Instagram under the handle “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to illegally accessing secure systems run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs during 2023, leveraging compromised usernames and passwords to obtain access on numerous occasions. Rather than covering his tracks, Moore brazenly distributed screenshots and sensitive personal information on social media, including details extracted from a veteran’s health records. The case demonstrates both the fragility of government cybersecurity infrastructure and the irresponsible conduct of digital criminals who seek internet fame over security protocols.

The audacious online attacks

Moore’s unauthorised access campaign showed a troubling pattern of systematic, intentional incursions across numerous state institutions. Court filings disclose he accessed the US Supreme Court’s electronic filing system at least 25 times over a two-month period, consistently entering secure networks using credentials he had secured through unauthorised means. Rather than conducting a lone opportunistic attack, Moore repeatedly accessed these infiltrated networks multiple times daily, implying a planned approach to explore sensitive information. His actions revealed sensitive information across three separate government institutions, each containing material of considerable national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its disclosure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than monetary benefit or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case demonstrates how online hubris can undermine otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court document repository 25 times over two months
  • Compromised AmeriCorps systems and Veterans Affairs medical portal
  • Distributed screenshots and personal information on Instagram publicly
  • Accessed protected networks numerous times each day using stolen credentials

Social media confession proves expensive

Nicholas Moore’s choice to publicise his illegal actions on Instagram proved to be his undoing. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and private data belonging to victims, including confidential information extracted from military medical files. This brazen documentation of federal crimes transformed what might have remained hidden into undeniable proof readily available to law enforcement. Prosecutors noted that Moore’s chief incentive appeared to be gaining favour with digital associates rather than benefiting financially from his unlawful entry. His Instagram account effectively served as a confessional, furnishing authorities with a comprehensive chronology and record of his criminal enterprise.

The case represents a cautionary example for digital criminals who place emphasis on digital notoriety over security practices. Moore’s actions demonstrated a core misunderstanding of the ramifications linked to disclosing federal crimes. Rather than staying anonymous, he generated a permanent digital record of his unauthorised access, complete with photographic evidence and personal commentary. This careless actions accelerated his apprehension and prosecution, ultimately leading to criminal charges and court proceedings that have now become widely known. The contrast between Moore’s technical skill and his catastrophic judgment in sharing his activities highlights how social media can turn advanced cybercrimes into readily prosecutable crimes.

A tendency towards open bragging

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his criminal abilities. He consistently recorded his access to classified official systems, sharing screenshots that proved his breach into confidential networks. Each post represented both a confession and a form of online bragging, designed to display his hacking prowess to his online followers. The material he posted included not only proof of his intrusions but also private data of people whose information he had exposed. This pressing urge to broadcast his offences suggested that the thrill of notoriety mattered more to Moore than the gravity of his actions.

Prosecutors characterised Moore’s behaviour as performative in nature rather than predatory, observing he was motivated primarily by the wish to impress acquaintances rather than utilise stolen information for financial advantage. His Instagram account functioned as an accidental confession, with every post offering law enforcement with further evidence of his guilt. The permanence of the platform meant Moore was unable to erase his crimes from existence; instead, his digital self-promotion created a comprehensive record of his activities covering multiple breaches and numerous government agencies. This pattern ultimately determined his fate, transforming what might have been hard-to-prove cybercrimes into straightforward prosecutions.

Mild sentences and systemic vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than handing down the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors refrained from recommending custodial punishment, pointing to Moore’s difficult circumstances and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—seemed to carry weight in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to web-based associates further contributed to the lenient result.

The prosecution’s assessment characterised a young man with significant difficulties rather than a major criminal operator. Court documents highlighted Moore’s long-term disabilities, restricted monetary means, and practically non-existent employment history. Crucially, investigators discovered no indication that Moore had exploited the stolen information for financial advantage or granted permissions to external organisations. Instead, his crimes were apparently propelled by youthful self-regard and the desire for peer recognition through internet fame. Judge Howell even remarked during sentencing that Moore’s computing skills suggested significant potential for beneficial participation to society, provided he redirected his interests away from criminal activity. This assessment reflected a judicial philosophy prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case exposes worrying gaps in US government cybersecurity infrastructure. His success in entering Supreme Court filing systems 25 times across two months using stolen credentials suggests concerningly weak password management and permission management protocols. Judge Howell’s pointed commentary about Moore’s potential for good—given how easily he accessed sensitive systems—underscored the institutional failures that enabled these security incidents. The incident shows that federal organisations remain vulnerable to relatively unsophisticated attacks relying on breached account details rather than complex technical methods. This case acts as a cautionary tale about the consequences of insufficient password protection across government networks.

Extended implications for public sector cyber security

The Moore case has reignited concerns about the security stance of federal government institutions. Security professionals have repeatedly flagged that public sector infrastructure often underperform compared to commercial industry benchmarks, relying on legacy technology and variable authentication procedures. The circumstance that a 24-year-old with no formal training could continually breach the US Supreme Court’s electronic filing system creates pressing concerns about financial priorities and organisational focus. Agencies tasked with protecting classified government data seem to have under-resourced in basic security measures, leaving themselves vulnerable to exploitative incursions. The breaches exposed not simply administrative files but healthcare data from service members, illustrating how inadequate protection directly impacts susceptible communities.

Looking ahead, cybersecurity experts have advocated for compulsory audits across government and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor verification and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without setting off alerts indicates inadequate oversight and intrusion detection capabilities. Federal agencies must prioritise investment in experienced cybersecurity staff and infrastructure upgrades, particularly given the growing complexity of state-backed and criminal cyber attacks. The Moore case illustrates that even low-tech breaches can reveal classified and sensitive information, making basic security practices a matter of national importance.

  • Government agencies require mandatory multi-factor authentication across all systems
  • Routine security assessments and security testing must uncover potential weaknesses in advance
  • Security personnel and training require substantial budget increases at federal level