Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Brekin Calbrook

A 24-year-old cybercriminal has confessed to breaching multiple United States state infrastructure after openly recording his crimes on Instagram under the handle “ihackedthegovernment.” Nicholas Moore admitted in court to unlawfully penetrating restricted platforms belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, employing pilfered usernames and passwords to break in on several times. Rather than hiding the evidence, Moore publicly shared classified details and personal files on social media, containing information sourced from a veteran’s health records. The case underscores both the fragility of federal security systems and the irresponsible conduct of digital criminals who prioritise online notoriety over operational security.

The bold digital breaches

Moore’s cyber intrusion campaign revealed a concerning trend of recurring unauthorised access across several government departments. Court filings disclose he gained entry to the US Supreme Court’s electronic filing system at least 25 times over a period lasting two months, consistently entering protected systems using credentials he had secured through unauthorised means. Rather than making one isolated intrusion, Moore went back to these infiltrated networks numerous times each day, implying a planned approach to investigate restricted materials. His actions exposed classified data across three different government departments, each containing information of significant national importance and personal sensitivity.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its disclosure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than financial gain or espionage. His decision to document and share evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case demonstrates how digital arrogance can undermine otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system on 25 occasions across a two-month period
  • Infiltrated AmeriCorps accounts and Veterans Affairs health platform
  • Shared screenshots and personal information on Instagram to the public
  • Accessed restricted systems multiple times daily using stolen credentials

Social media confession turns out to be costly

Nicholas Moore’s opt to share his criminal activity on Instagram became his ruin. Using the handle “ihackedthegovernment,” the 24-year-old publicly posted screenshots of his breaches and private data belonging to victims, including confidential information extracted from veteran health records. This brazen documentation of federal crimes converted what might have gone undetected into conclusive documentation easily accessible to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be impressing online acquaintances rather than profiting from his unauthorised breach. His Instagram account practically operated as a confessional, providing investigators with a comprehensive chronology and record of his criminal enterprise.

The case constitutes a cautionary example for digital criminals who prioritise digital notoriety over operational security. Moore’s actions showed a fundamental misunderstanding of the consequences associated with broadcasting federal offences. Rather than staying anonymous, he generated a enduring digital documentation of his intrusions, complete with photographic evidence and individual remarks. This irresponsible conduct accelerated his identification and prosecution, ultimately leading to criminal charges and court proceedings that have now become public knowledge. The contrast between Moore’s technical capability and his disastrous decision-making in sharing his activities highlights how social media can turn advanced cybercrimes into straightforward prosecutable offences.

A tendency towards overt self-promotion

Moore’s Instagram posts revealed a concerning pattern of escalating confidence in his criminal abilities. He continually logged his access to classified official systems, posting images that demonstrated his penetration of sensitive systems. Each post served as both a confession and a form of digital boasting, designed to showcase his hacking prowess to his social media audience. The material he posted included not only proof of his intrusions but also personal information belonging to individuals whose data he had compromised. This pressing urge to broadcast his offences indicated that the excitement of infamy mattered more to Moore than the gravity of his actions.

Prosecutors portrayed Moore’s behaviour as performative rather than predatory, noting he seemed driven by the wish to impress acquaintances rather than exploit stolen information for monetary gain. His Instagram account functioned as an unintentional admission, with each upload offering law enforcement with further evidence of his guilt. The enduring nature of the platform meant Moore could not simply delete his crimes from existence; instead, his digital boasting created a detailed record of his activities encompassing multiple breaches and multiple government agencies. This pattern ultimately sealed his fate, transforming what might have been difficult-to-prove cybercrimes into clear-cut prosecutions.

Lenient sentencing and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the severity of his crimes. Rather than handing down the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors declined to recommend custodial punishment, citing Moore’s vulnerable circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s lack of monetary incentive for the breaches and lack of harmful intent beyond demonstrating his technical prowess to online acquaintances further influenced the lenient outcome.

The prosecution’s assessment depicted a troubled young man rather than a dangerous criminal mastermind. Court documents recorded Moore’s persistent impairments, limited financial resources, and virtually non-existent employment history. Crucially, investigators found no evidence that Moore had misused the pilfered data for personal gain or granted permissions to third parties. Instead, his crimes appeared driven by youthful arrogance and the wish for online acceptance through internet fame. Judge Howell even remarked during sentencing that Moore’s technical capabilities pointed to substantial promise for constructive involvement to society, provided he redirected his interests away from criminal activity. This assessment reflected a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Specialist review of the case

The Moore case uncovers troubling gaps in US government cybersecurity infrastructure. His capacity to breach Supreme Court document repositories 25 times over two months using stolen credentials suggests alarmingly weak credential oversight and access control protocols. Judge Howell’s pointed commentary about Moore’s potential for good—given how effortlessly he accessed restricted networks—underscored the institutional failures that allowed these security incidents. The incident illustrates that federal organisations remain exposed to fairly basic attacks dependent on compromised usernames and passwords rather than complex technical methods. This case functions as a warning example about the repercussions of insufficient password protection across public sector infrastructure.

Extended implications for public sector cyber security

The Moore case has revived anxiety over the digital defence position of US government bodies. Security professionals have consistently cautioned that government systems often underperform compared to private enterprise practices, relying on outdated infrastructure and inconsistent password protocols. The fact that a young person without professional credentials could repeatedly access the Supreme Court’s digital filing platform creates pressing concerns about budget distribution and departmental objectives. Organisations charged with defending classified government data seem to have under-resourced in basic security measures, creating vulnerability to opportunistic attacks. The incidents disclosed not just administrative files but personal health records from service members, demonstrating how poor cybersecurity directly impacts susceptible communities.

Going forward, cybersecurity experts have called for mandatory government-wide audits and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to introduce multi-factor authentication and zero-trust security architectures across all platforms. Moore’s ability to access restricted systems on multiple occasions without setting off alerts indicates inadequate oversight and intrusion detection systems. Federal agencies must focus resources in skilled cybersecurity personnel and infrastructure upgrades, particularly given the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case shows that even basic security lapses can compromise classified and sensitive information, making basic security practices a matter of national importance.

  • Public sector organisations need compulsory multi-factor authentication across all systems
  • Regular security audits and security testing should identify vulnerabilities proactively
  • Security personnel and development demands substantial budget increases at federal level