Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Daen Garridge

A 24-year-old hacker has admitted to infiltrating multiple United States federal networks after publicly sharing his crimes on Instagram under the account name “ihackedthegovernment.” Nicholas Moore acknowledged before the judge to illegally accessing restricted platforms operated by the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs across the year 2023, leveraging compromised usernames and passwords to obtain access on multiple instances. Rather than concealing his activities, Moore publicly shared classified details and personal files on online platforms, containing information sourced from a veteran’s medical files. The case underscores both the fragility of government cybersecurity infrastructure and the careless actions of online offenders who prioritise online notoriety over protective measures.

The audacious online attacks

Moore’s cyber intrusion campaign revealed a concerning trend of systematic, intentional incursions across multiple government agencies. Court filings reveal he accessed the US Supreme Court’s digital filing platform at least 25 times over a period lasting two months, repeatedly accessing protected systems using credentials he had secured through unauthorised means. Rather than attempting a single opportunistic breach, Moore returned to these compromised systems numerous times each day, indicating a deliberate strategy to explore sensitive information. His actions compromised protected data across three distinct state agencies, each containing material of considerable national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach being especially serious due to its exposure of confidential veteran health records. Prosecutors stressed that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram transformed what might have remained undetected into a widely recorded criminal record. The case demonstrates how digital arrogance can undermine otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Accessed Supreme Court filing system 25 times over two months
  • Breached AmeriCorps accounts and Veterans Affairs health platform
  • Distributed screenshots and personal information on Instagram to the public
  • Gained entry to restricted systems multiple times daily using stolen credentials

Public admission on social media turns out to be costly

Nicholas Moore’s choice to publicise his criminal activity on Instagram became his ruin. Using the handle “ihackedthegovernment,” the 24-year-old freely distributed screenshots of his breaches and personal information belonging to victims, including confidential information extracted from armed forces healthcare data. This audacious recording of federal crimes changed what might have gone undetected into undeniable proof promptly obtainable to law enforcement. Prosecutors noted that Moore’s main driving force appeared to be impressing online acquaintances rather than benefiting financially from his unauthorised breach. His Instagram account effectively served as a confessional, supplying law enforcement with a thorough sequence of events and documentation of his criminal enterprise.

The case serves as a cautionary example for cybercriminals who place emphasis on digital notoriety over operational security. Moore’s actions revealed a core misunderstanding of the consequences associated with broadcasting federal offences. Rather than staying anonymous, he created a permanent digital record of his unauthorised access, complete with photographic proof and individual remarks. This irresponsible conduct hastened his apprehension and prosecution, ultimately culminating in criminal charges and court proceedings that have now become public knowledge. The contrast between Moore’s technical skill and his appalling judgment in sharing his activities highlights how online platforms can turn advanced cybercrimes into straightforward prosecutable offences.

A habit of open bragging

Moore’s Instagram posts showed a concerning pattern of growing self-assurance in his illegal capabilities. He repeatedly documented his access to classified official systems, posting images that demonstrated his breach into sensitive systems. Each post constituted both a admission and a form of digital boasting, designed to highlight his hacking prowess to his online followers. The content he shared contained not only evidence of his breaches but also personal information belonging to people whose information he had exposed. This compulsive need to advertise his illegal activities indicated that the excitement of infamy took precedence over Moore than the seriousness of what he had done.

Prosecutors characterised Moore’s behaviour as performative in nature rather than predatory, observing he was motivated primarily by the urge to gain approval from acquaintances rather than leverage stolen information for financial exploitation. His Instagram account operated as an inadvertent confession, with each upload offering law enforcement with further evidence of his guilt. The enduring nature of the platform meant Moore could not erase his crimes from existence; instead, his digital self-promotion created a detailed record of his activities covering multiple breaches and multiple government agencies. This pattern ultimately determined his fate, turning what might have been challenging cybercrimes to prove into straightforward cases.

Lenient sentencing and structural vulnerabilities

Nicholas Moore’s sentencing was surprisingly lenient given the severity of his crimes. Rather than applying the maximum one-year prison sentence applicable to his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors chose not to recommend custodial punishment, pointing to Moore’s difficult circumstances and reduced risk of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s absence of financial motive for the breaches and absence of malicious intent beyond demonstrating his technical prowess to online acquaintances further influenced the lenient outcome.

The prosecution’s own assessment painted a portrait of a disturbed youth rather than a serious organised crime figure. Court documents noted Moore’s chronic health conditions, limited financial resources, and almost entirely absent employment history. Crucially, investigators found no evidence that Moore had misused the pilfered data for personal gain or granted permissions to external organisations. Instead, his crimes appeared driven by adolescent overconfidence and the wish for peer recognition through digital prominence. Judge Howell further noted during sentencing that Moore’s technical capabilities indicated considerable capacity for beneficial participation to society, provided he refocused his efforts away from criminal activity. This assessment embodied a sentencing approach prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case exposes concerning gaps in American federal cybersecurity infrastructure. His ability to access Supreme Court document repositories 25 times over two months using compromised login details suggests concerningly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s potential for good—given how readily he breached restricted networks—underscored the systemic breakdowns that allowed these breaches. The incident illustrates that public sector bodies remain exposed to relatively unsophisticated attacks dependent on compromised usernames and passwords rather than sophisticated technical attacks. This case serves as a cautionary tale about the repercussions of weak authentication safeguards across government networks.

Wider implications for government cyber defence

The Moore case has rekindled anxiety over the security stance of US government bodies. Security experts have long warned that state systems often underperform compared to private enterprise practices, making use of legacy technology and variable authentication procedures. The reality that a 24-year-old with no formal training could continually breach the US Supreme Court’s electronic filing system creates pressing concerns about resource allocation and institutional priorities. Bodies responsible for safeguarding sensitive national information seem to have under-resourced in essential security safeguards, exposing themselves to opportunistic attacks. The incidents disclosed not just organisational records but personal health records from service members, showing how weak digital security adversely influences susceptible communities.

Moving forward, cybersecurity experts have advocated for mandatory government-wide audits and updating of outdated infrastructure still relying on password-only authentication. The Department of Veterans Affairs, in particular, is under pressure to introduce multi-factor authentication and zero-trust security architectures across all platforms. Moore’s capacity to gain access to restricted systems on multiple occasions without setting off alerts indicates inadequate oversight and intrusion detection systems. Federal agencies must focus resources in experienced cybersecurity staff and infrastructure upgrades, particularly given the increasing sophistication of state-sponsored and criminal hacking operations. The Moore case shows that even basic security lapses can reveal classified and sensitive information, making basic security hygiene a matter of national importance.

  • Public sector organisations require compulsory multi-factor authentication throughout all systems
  • Routine security assessments and penetration testing must uncover vulnerabilities proactively
  • Cybersecurity staffing and training require substantial budget increases at federal level