Tuesday, April 21, 2026
Breaking news, every hour

Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Leven Rancliff

A 24-year-old digital attacker has pleaded guilty to infiltrating numerous United States government systems after openly recording his offences on Instagram under the account name “ihackedthegovernment.” Nicholas Moore admitted in court to unauthorisedly entering restricted platforms run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, leveraging compromised usernames and passwords to break in on numerous occasions. Rather than covering his tracks, Moore openly posted confidential data and private records on digital networks, including details extracted from a veteran’s health records. The case highlights both the vulnerability of government cybersecurity infrastructure and the reckless behaviour of cyber perpetrators who prioritise online notoriety over operational security.

The audacious cyber intrusions

Moore’s cyber intrusion campaign demonstrated a concerning trend of repeated, deliberate breaches across several government departments. Court filings reveal he gained entry to the US Supreme Court’s digital filing platform at least 25 times over a period lasting two months, consistently entering protected systems using credentials he had secured through unauthorised means. Rather than attempting a single opportunistic breach, Moore went back to these compromised systems multiple times daily, implying a planned approach to explore sensitive information. His actions exposed classified data across three separate government institutions, each containing material of considerable national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram transformed what might have remained undetected into a publicly documented criminal record. The case exemplifies how digital arrogance can undermine otherwise advanced cyber attacks, converting potential anonymous offenders into easily identifiable offenders.

  • Accessed Supreme Court document repository 25 times across a two-month period
  • Breached AmeriCorps accounts and Veterans Affairs health platform
  • Shared screenshots and private data on Instagram to the public
  • Gained entry to protected networks numerous times each day using stolen credentials

Public admission on social media proves costly

Nicholas Moore’s decision to broadcast his unlawful conduct on Instagram proved to be his ruin. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and private data belonging to victims, including sensitive details extracted from military medical files. This brazen documentation of federal crimes converted what might have gone undetected into conclusive documentation promptly obtainable to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be impressing online acquaintances rather than benefiting financially from his unauthorised breach. His Instagram account essentially functioned as a confessional, furnishing authorities with a comprehensive chronology and documentation of his criminal enterprise.

The case represents a cautionary tale for cyber offenders who place emphasis on digital notoriety over security protocols. Moore’s actions showed a core misunderstanding of the ramifications linked to publicising federal crimes. Rather than staying anonymous, he produced a permanent digital record of his intrusions, complete with photographic evidence and personal observations. This careless actions expedited his identification and prosecution, ultimately culminating in criminal charges and court proceedings that have now become public knowledge. The contrast between Moore’s technical proficiency and his appalling judgment in sharing his activities highlights how social networks can transform sophisticated cybercrimes into readily prosecutable crimes.

A tendency towards public boasting

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his illegal capabilities. He continually logged his access to restricted government platforms, posting images that proved his infiltration of confidential networks. Each post constituted both a confession and a form of online bragging, designed to highlight his technical expertise to his social media audience. The material he posted contained not only proof of his intrusions but also private data belonging to individuals whose data he had compromised. This compulsive need to publicise his crimes implied that the thrill of notoriety took precedence over Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as more performative than predatory, observing he seemed driven by the urge to gain approval from acquaintances rather than utilise stolen information for financial advantage. His Instagram account functioned as an accidental confession, with each upload providing law enforcement with more evidence of his guilt. The enduring nature of the platform meant Moore could not simply erase his crimes from existence; instead, his online bragging created a comprehensive record of his activities covering multiple breaches and numerous government agencies. This pattern ultimately sealed his fate, transforming what might have been hard-to-prove cybercrimes into clear-cut prosecutions.

Lenient sentencing and systemic weaknesses

Nicholas Moore’s sentencing proved remarkably lenient given the severity of his crimes. Rather than imposing the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s difficult circumstances and limited likelihood of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of monetary incentive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to internet contacts further shaped the lenient decision.

The prosecution’s own evaluation depicted a disturbed youth rather than a major criminal operator. Court documents noted Moore’s persistent impairments, limited financial resources, and practically non-existent employment history. Crucially, investigators found no evidence that Moore had used the compromised information for personal gain or granted permissions to external organisations. Instead, his crimes seemed motivated by adolescent overconfidence and the desire for online acceptance through internet fame. Judge Howell even remarked during sentencing that Moore’s technical proficiency pointed to substantial promise for positive contribution to society, provided he redirected his interests away from criminal activity. This assessment demonstrated a sentencing approach stressing rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case reveals troubling gaps in US government cybersecurity infrastructure. His ability to access Supreme Court filing systems 25 times across two months using pilfered access credentials suggests concerningly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s potential for good—given how readily he penetrated restricted networks—underscored the organisational shortcomings that facilitated these security incidents. The incident illustrates that federal organisations remain at risk to fairly basic attacks relying on breached account details rather than advanced technical exploits. This case acts as a cautionary example about the repercussions of weak authentication safeguards across government networks.

Extended implications for government cyber defence

The Moore case has rekindled anxiety over the digital defence position of US government bodies. Security professionals have consistently cautioned that state systems often fall short of private enterprise practices, making use of aging systems and irregular security procedures. The reality that a 24-year-old with no formal training could repeatedly access the Supreme Court’s digital filing platform creates pressing concerns about budget distribution and organisational focus. Agencies tasked with protecting sensitive national information seem to have under-resourced in fundamental protective systems, exposing themselves to exploitative incursions. The incidents disclosed not simply organisational records but healthcare data belonging to veterans, showing how poor cybersecurity directly impacts at-risk groups.

Moving forward, cybersecurity experts have advocated for mandatory government-wide audits and updating of outdated infrastructure still dependent on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to deploy multi-factor authentication and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems repeatedly without triggering alarms points to insufficient monitoring and intrusion detection systems. Federal agencies must prioritise investment in skilled cybersecurity personnel and system improvements, particularly given the growing complexity of state-backed and criminal cyber attacks. The Moore case demonstrates that even low-tech breaches can reveal classified and sensitive information, making basic security practices a issue of national significance.

  • Government agencies require mandatory multi-factor authentication across all systems
  • Regular security audits and security testing should identify potential weaknesses in advance
  • Cybersecurity staffing and training require significant funding growth at federal level