Breaking news, every hour Tuesday, April 21, 2026

Young hacker’s Instagram boasts lead to guilty plea in US government breach

April 21, 2026 · Coran Dawwell

A 24-year-old cybercriminal has pleaded guilty to gaining unauthorised access to multiple United States state infrastructure after brazenly documenting his illegal activities on Instagram under the username “ihackedthegovernment.” Nicholas Moore admitted in court to illegally accessing secure systems belonging to the US Supreme Court, AmeriCorps, and the Department of Veterans Affairs throughout 2023, leveraging compromised usernames and passwords to obtain access on multiple instances. Rather than concealing his activities, Moore openly posted screenshots and sensitive personal information on digital networks, including details extracted from a veteran’s health records. The case demonstrates both the vulnerability of state digital defences and the irresponsible conduct of digital criminals who prioritise online notoriety over operational security.

The shameless online attacks

Moore’s cyber intrusion campaign showed a concerning trend of repeated, deliberate breaches across several government departments. Court filings show he gained entry to the US Supreme Court’s electronic filing system at least 25 times over a period lasting two months, systematically logging into restricted platforms using credentials he had secured through unauthorised means. Rather than attempting a single opportunistic breach, Moore returned to these infiltrated networks several times per day, indicating a deliberate strategy to explore sensitive information. His actions compromised protected data across three different government departments, each containing material of considerable national importance and individual privacy concerns.

The AmeriCorps platform and the Department of Veterans Affairs’ MyHealtheVet system were compromised by Moore’s intrusions, with the latter breach proving particularly egregious due to its exposure of confidential veteran health records. Prosecutors emphasised that Moore’s motivations seemed grounded in online vanity rather than financial gain or espionage. His choice to record and distribute evidence of his crimes on Instagram converted what could have stayed hidden into a widely recorded criminal record. The case exemplifies how digital arrogance can compromise otherwise advanced cyber attacks, turning would-be anonymous cybercriminals into easily identifiable offenders.

  • Utilised Supreme Court filing system 25 times over two months
  • Breached AmeriCorps accounts and Veterans Affairs health platform
  • Posted screenshots and private data on Instagram publicly
  • Logged into protected networks multiple times daily using stolen credentials

Social media confession turns out to be expensive

Nicholas Moore’s opt to share his unlawful conduct on Instagram became his undoing. Using the handle “ihackedthegovernment,” the 24-year-old openly shared screenshots of his breaches and private data belonging to victims, including confidential information extracted from military medical files. This flagrant cataloguing of federal crimes converted what might have remained hidden into irrefutable evidence readily available to law enforcement. Prosecutors noted that Moore’s primary motivation appeared to be impressing online acquaintances rather than profiting from his unauthorised breach. His Instagram account effectively served as a confessional, supplying law enforcement with a thorough sequence of events and account of his criminal enterprise.

The case represents a warning example for digital criminals who give priority to online infamy over operational security. Moore’s actions showed a basic lack of understanding of the consequences associated with disclosing federal crimes. Rather than staying anonymous, he produced a enduring digital documentation of his unauthorised access, complete with visual documentation and individual remarks. This reckless behaviour expedited his apprehension and prosecution, ultimately leading to criminal charges and legal proceedings that have now become public knowledge. The contrast between Moore’s technical skill and his appalling judgment in broadcasting his activities highlights how social networks can turn advanced cybercrimes into straightforward prosecutable offences.

A tendency towards open bragging

Moore’s Instagram posts showed a disturbing pattern of escalating confidence in his criminal abilities. He repeatedly documented his access to restricted government platforms, sharing screenshots that proved his breach into sensitive systems. Each post represented both a admission and a form of online bragging, designed to highlight his hacking prowess to his social media audience. The content he shared included not only evidence of his breaches but also private data of individuals whose data he had compromised. This obsessive drive to publicise his crimes indicated that the excitement of infamy mattered more to Moore than the seriousness of what he had done.

Prosecutors portrayed Moore’s behaviour as performative in nature rather than predatory, noting he was motivated primarily by the urge to gain approval from acquaintances rather than leverage stolen information for financial exploitation. His Instagram account operated as an accidental confession, with each upload supplying law enforcement with further evidence of his guilt. The permanence of the platform meant Moore could not remove his crimes from existence; instead, his online bragging created a thorough record of his activities encompassing multiple breaches and numerous government agencies. This pattern ultimately sealed his fate, turning what might have been challenging cybercrimes to prove into straightforward cases.

Mild sentencing and structural weaknesses

Nicholas Moore’s sentencing was surprisingly lenient given the severity of his crimes. Rather than imposing the maximum one-year prison sentence available for his misdemeanour computer fraud conviction, US District Judge Beryl Howell opted instead for a single year of probation. Prosecutors chose not to recommend custodial punishment, referencing Moore’s precarious situation and low probability of reoffending. The 24-year-old’s apology to the court—”I made a mistake” and “I am truly sorry”—appeared to weigh heavily in the judge’s decision. Moore’s absence of financial motive for the breaches and absence of deliberate wrongdoing beyond demonstrating his technical prowess to internet contacts further contributed to the lenient result.

The prosecution’s assessment depicted a disturbed youth rather than a major criminal operator. Court documents recorded Moore’s chronic health conditions, limited financial resources, and virtually non-existent employment history. Crucially, investigators discovered no indication that Moore had used the compromised information for financial advantage or sold access to third parties. Instead, his crimes seemed motivated by youthful arrogance and the desire for social validation through internet fame. Judge Howell even remarked during sentencing that Moore’s computing skills indicated considerable capacity for constructive involvement to society, provided he redirected his interests away from criminal activity. This assessment embodied a sentencing approach prioritising reform over punishment.

Factor Details
Sentence imposed One year probation; no prison time
Maximum penalty available Up to one year imprisonment and $100,000 fines
Government systems breached US Supreme Court, AmeriCorps, Department of Veterans Affairs
Motivation assessment Social validation and online notoriety rather than financial gain

Professional assessment of the case

The Moore case exposes troubling gaps in US government cyber security infrastructure. His success in entering Supreme Court document repositories 25 times over two months using pilfered access credentials suggests alarmingly weak password management and access control protocols. Judge Howell’s wry remark about Moore’s potential for good—given how easily he accessed restricted networks—underscored the systemic breakdowns that enabled these security incidents. The incident shows that public sector bodies remain at risk to fairly basic attacks dependent on stolen login credentials rather than advanced technical exploits. This case serves as a warning example about the implications of weak authentication safeguards across government networks.

Wider implications for public sector cyber security

The Moore case has rekindled concerns about the cybersecurity posture of US government bodies. Security professionals have long warned that government systems often underperform compared to private enterprise practices, depending upon outdated infrastructure and inconsistent password protocols. The fact that a young person without professional credentials could repeatedly access the Supreme Court’s digital filing platform creates pressing concerns about resource allocation and institutional priorities. Bodies responsible for safeguarding critical state information seem to have under-resourced in essential security safeguards, exposing themselves to opportunistic attacks. The incidents disclosed not simply internal documents but healthcare data from service members, showing how inadequate protection significantly affects vulnerable populations.

Moving forward, cybersecurity experts have called for compulsory audits across government and modernisation of legacy systems still dependent on password-only authentication. The Department of Veterans Affairs, in particular, faces pressure to deploy multi-factor verification and zero-trust security frameworks across all platforms. Moore’s ability to access restricted systems on multiple occasions without setting off alerts suggests insufficient monitoring and intrusion detection systems. Federal agencies must prioritise investment in experienced cybersecurity staff and infrastructure upgrades, especially considering the growing complexity of state-sponsored and criminal hacking operations. The Moore case shows that even low-tech breaches can reveal classified and sensitive data, making basic security practices a matter of national importance.

  • Government agencies need mandatory multi-factor authentication across all systems
  • Routine security assessments and penetration testing must uncover vulnerabilities proactively
  • Cybersecurity staffing and development demands substantial budget increases across federal government