Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Ivaan Garwell

A 24-year-old cybercriminal has admitted to infiltrating numerous United States government systems after openly recording his crimes on Instagram under the username “ihackedthegovernment.” Nicholas Moore admitted in court to unlawfully penetrating protected networks run by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, using stolen usernames and passwords to obtain access on multiple instances. Rather than covering his tracks, Moore brazenly distributed classified details and personal files on online platforms, including details extracted from a veteran’s health records. The case highlights both the vulnerability of state digital defences and the irresponsible conduct of digital criminals who pursue digital celebrity over operational security.

The shameless digital breaches

Moore’s cyber intrusion campaign revealed a worrying pattern of systematic, intentional incursions across multiple government agencies. Court filings disclose he gained entry to the US Supreme Court’s digital filing platform at least 25 times over a span of two months, systematically logging into protected systems using credentials he had acquired unlawfully. Rather than conducting a lone opportunistic attack, Moore went back to these breached platforms several times per day, implying a planned approach to investigate restricted materials. His actions revealed sensitive information across three distinct state agencies, each containing information of significant national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system fell victim to Moore’s intrusions, with the latter breach being especially serious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations appeared rooted in online vanity rather than monetary benefit or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a publicly documented criminal record. The case demonstrates how online hubris can compromise otherwise sophisticated hacking attempts, converting potential anonymous offenders into easily identifiable offenders.

  • Utilised Supreme Court document repository on 25 occasions across a two-month period
  • Compromised AmeriCorps accounts and Veterans Affairs medical portal
  • Distributed screenshots and private data on Instagram to the public
  • Accessed restricted systems multiple times daily using stolen credentials

Public admission on social media proves expensive

Nicholas Moore’s opt to share his criminal activity on Instagram became his undoing. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and private data belonging to victims, including confidential information extracted from military medical files. This brazen documentation of federal crimes changed what might have gone undetected into conclusive documentation promptly obtainable to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be winning over internet contacts rather than profiting from his unlawful entry. His Instagram account practically operated as a confessional, providing investigators with a detailed timeline and record of his criminal enterprise.

The case serves as a warning example for cybercriminals who prioritise digital notoriety over operational security. Moore’s actions revealed a basic lack of understanding of the ramifications linked to disclosing federal crimes. Rather than preserving anonymity, he generated a permanent digital record of his unauthorised access, complete with photographic evidence and personal commentary. This irresponsible conduct accelerated his apprehension and prosecution, ultimately culminating in criminal charges and court proceedings that have now entered the public domain. The contrast between Moore’s technical proficiency and his appalling judgment in broadcasting his activities highlights how social networks can turn advanced cybercrimes into straightforward prosecutable offences.

A pattern of public boasting

Moore’s Instagram posts displayed a concerning pattern of escalating confidence in his criminal abilities. He repeatedly documented his entry into restricted government platforms, sharing screenshots that illustrated his infiltration of confidential networks. Each post constituted both a admission and a form of digital boasting, intended to showcase his hacking prowess to his online followers. The material he posted included not only proof of his intrusions but also private data of people whose information he had exposed. This obsessive drive to broadcast his offences implied that the thrill of notoriety was more important to Moore than the gravity of his actions.

Prosecutors described Moore’s behaviour as performative in nature rather than predatory, observing he appeared motivated by the desire to impress acquaintances rather than exploit stolen information for financial exploitation. His Instagram account operated as an unintentional admission, with each post supplying law enforcement with additional evidence of his guilt. The platform’s permanence meant Moore could not simply delete his crimes from existence; instead, his online bragging created a comprehensive record of his activities spanning multiple breaches and various government agencies. This pattern ultimately determined his fate, turning what might have been hard-to-prove cybercrimes into straightforward cases.

Mild sentences and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the seriousness of his crimes. Rather than imposing the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell chose instead a single year of probation. Prosecutors chose not to recommend custodial punishment, pointing to Moore’s vulnerable circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s absence of financial motive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to online acquaintances further influenced the lenient outcome.

The prosecution’s own evaluation characterised a troubled young man rather than a major criminal operator. Court documents highlighted Moore’s long-term disabilities, limited financial resources, and practically non-existent employment history. Crucially, investigators uncovered nothing that Moore had misused the pilfered data for personal gain or granted permissions to third parties. Instead, his crimes seemed motivated by youthful self-regard and the wish for online acceptance through online notoriety. Judge Howell additionally observed during sentencing that Moore’s technical capabilities indicated considerable capacity for positive contribution to society, provided he redirected his interests away from criminal activity. This assessment demonstrated a judicial philosophy emphasising rehabilitation over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Expert evaluation of the case

The Moore case exposes concerning gaps in US government cyber security infrastructure. His ability to access Supreme Court filing systems 25 times over two months using pilfered access credentials suggests concerningly weak password management and access control protocols. Judge Howell’s pointed commentary about Moore’s capacity for positive impact—given how easily he accessed sensitive systems—underscored the organisational shortcomings that enabled these intrusions. The incident shows that federal organisations remain exposed to moderately simple attacks relying on stolen login credentials rather than complex technical methods. This case functions as a warning example about the repercussions of inadequate credential security across public sector infrastructure.

Extended implications for public sector cyber security

The Moore case has revived concerns about the digital defence position of US government bodies. Cybersecurity specialists have repeatedly flagged that government systems often lag behind commercial industry benchmarks, relying on aging systems and irregular security procedures. The fact that a 24-year-old with no formal training could repeatedly access the Court’s online document system raises uncomfortable questions about resource allocation and departmental objectives. Organisations charged with defending classified government data appear to have underinvested in fundamental protective systems, leaving themselves vulnerable to targeted breaches. The breaches exposed not just internal documents but healthcare data of military personnel, showing how inadequate protection directly impacts at-risk groups.

Moving forward, cybersecurity experts have called for compulsory audits across government and updating of outdated infrastructure still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor verification and zero-trust security frameworks across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without setting off alerts indicates insufficient monitoring and intrusion detection capabilities. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, particularly given the increasing sophistication of state-backed and criminal cyber attacks. The Moore case shows that even basic security lapses can reveal classified and sensitive data, making basic security practices a matter of national importance.

  • Public sector organisations require mandatory multi-factor authentication throughout all systems
  • Routine security assessments and penetration testing should identify vulnerabilities proactively
  • Cybersecurity staffing and training require substantial budget increases across federal government