LmCast :: Stay tuned in

Hacker admits to leaking stolen Supreme Court data on Instagram

Recorded: Jan. 19, 2026, 5:03 p.m.

Original Summarized

Hacker admits to leaking stolen Supreme Court data on Instagram

News

Featured
Latest

StealC hackers hacked as researchers hijack malware control panels

Hackers now exploiting critical Fortinet FortiSIEM flaw in attacks

Malicious GhostPoster browser extensions found with 840,000 installs

Cisco finally fixes AsyncOS zero-day exploited since November

Hacker admits to leaking stolen Supreme Court data on Instagram

Jordanian pleads guilty to selling access to 50 corporate networks

Ingram Micro says ransomware attack affected 42,000 people

Become fluent in up to 14 languages with this Babbel lifetime offer

Tutorials

Latest
Popular

How to access the Dark Web using the Tor Browser

How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11

How to use the Windows Registry Editor

How to backup and restore the Windows Registry

How to start Windows in Safe Mode

How to remove a Trojan, Virus, Worm, or other Malware

How to show hidden files in Windows 7

How to see hidden files in Windows

Webinars
Downloads

Latest
Most Downloaded

Qualys BrowserCheck

STOPDecrypter

AuroraDecrypter

FilesLockerDecrypter

AdwCleaner

ComboFix

RKill

Junkware Removal Tool

Deals

Categories

eLearning

IT Certification Courses

Gear + Gadgets

Security

VPNs

Popular

Best VPNs

How to change IP address

Access the dark web safely

Best VPN for YouTube

Forums
More

Virus Removal Guides
Startup Database
Uninstall Database
Glossary
Send us a Tip!
Welcome Guide

HomeNewsSecurityHacker admits to leaking stolen Supreme Court data on Instagram

Hacker admits to leaking stolen Supreme Court data on Instagram

By Sergiu Gatlan

January 19, 2026
11:04 AM
0

A Tennessee man has pleaded guilty to hacking the U.S. Supreme Court's electronic filing system and breaching accounts at the AmeriCorps U.S. federal agency and the Department of Veterans Affairs.
Federal prosecutors said that 24-year-old Nicholas Moore, of Springfield, Tennessee, had accessed the Supreme Court's restricted electronic filing system at least 25 times between August and October 2023 using stolen credentials.
Additionally, he sometimes logged into the Supreme Court's systems multiple times per day using the same compromised credentials.

Moore allegedly bragged about the breaches on Instagram, posting screenshots containing victims' names and filing system details from the Supreme Court account to an account named @ihackedthegovernment.
"On three occasions, Moore posted screenshots to his Instagram account, @ihackedthegovernment, of his victim’s Supreme Court filing system details including the victim’s name and other information," the Justice Department said on Friday.
He also used compromised MyAmeriCorps credentials to access a second victim's AmeriCorps account seven times between August and October 2023, obtaining personal information from the agency's servers (including name, date of birth, email address, home address, phone number, citizenship status, veteran status, service history, and the last four digits of his social security number), and leaking it on the same Instagram account.
Moore also used stolen login credentials from a U.S. Marine Corps veteran to access the Department of Veterans Affairs' My HealtheVet online personal health record (PHR) portal on five occasions between September and October 2023. The Department of Veterans Affairs also operates the largest integrated health care system in the country, providing care at 1,380 health care facilities across the United States.
"The hack allowed Moore to access the veteran's private health information including prescribed medications and other intimate data," prosecutors said in court documents. "Moore then posted the veterans' health information to @ihackedthegovernment and boasted about gaining access to the VA’s servers."
Moore confessed to one count of computer fraud, a misdemeanor carrying a maximum one-year prison sentence and a $100,000 fine.

The 2026 CISO Budget Benchmark
It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.
Learn how top leaders are turning investment into measurable impact.
Download Now

Related Articles:
NordVPN denies breach claims, says attackers have "dummy data"Ingram Micro says ransomware attack affected 42,000 peopleMonroe University says 2024 data breach affects 320,000 peopleVictorian Department of Education says hackers stole students’ dataSpanish energy giant Endesa discloses data breach affecting customers

AmeriCorps
Breach
Data Breach
Data Leak
Hacking
Instagram
Supreme Court
Veterans Administration Health System

Sergiu Gatlan
Sergiu is a news reporter who has covered the latest cybersecurity and technology developments for over a decade. Email or Twitter DMs for tips.

Previous Article

Post a Comment Community Rules

You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Popular Stories

Microsoft: Some Windows PCs fail to shut down after January update

Microsoft: Windows 11 update causes Outlook freezes for POP users

StealC hackers hacked as researchers hijack malware control panels

Sponsor Posts

New webinar: Choose-your-own-investigation walkthrough of modern browser attacks

Discover how to scale IT infrastructure reliably without adding toil or burnout.

  Upcoming Webinar

Follow us:

Main Sections

News
Webinars
VPN Buyer Guides
SysAdmin Software Guides
Downloads
Virus Removal Guides
Tutorials
Startup Database
Uninstall Database
Glossary

Community

Forums
Forum Rules
Chat

Useful Resources

Welcome Guide
Sitemap

Company

About BleepingComputer
Contact Us
Send us a Tip!
Advertising
Write for BleepingComputer
Social & Feeds
Changelog

Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure

Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved

Login

Username

Password

Remember Me

Sign in anonymously

Sign in with Twitter

Not a member yet? Register Now


Reporter

Help us understand the problem. What is going on with this comment?

Spam

Abusive or Harmful

Inappropriate content

Strong language

Other

Read our posting guidelinese to learn what content is prohibited.

Submitting...
SUBMIT

A Tennessee man has pleaded guilty to hacking the U.S. Supreme Court’s electronic filing system and breaching accounts at federal agencies, including AmeriCorps and the Department of Veterans Affairs. According to federal prosecutors, 24-year-old Nicholas Moore of Springfield, Tennessee, accessed the Supreme Court’s restricted electronic filing system at least 25 times between August and October 2023 using stolen credentials. He also frequently logged into the system multiple times daily with the same compromised access, exploiting vulnerabilities in the court’s digital infrastructure. Moore allegedly shared details of these breaches on Instagram, where he posted screenshots containing victims’ names and filing system information under the account @ihackedthegovernment. On three occasions, he disclosed specific details about Supreme Court cases, including victims’ names and other sensitive data, as part of his online boasts. The Justice Department highlighted that these actions violated federal cybersecurity laws and exposed confidential judicial processes to public scrutiny.

In addition to targeting the Supreme Court, Moore exploited stolen credentials from AmeriCorps, a federal agency supporting community service programs. Between August and October 2023, he accessed a second victim’s AmeriCorps account seven times, obtaining personal information stored on the agency’s servers. This data included names, dates of birth, email addresses, home addresses, phone numbers, citizenship status, veteran status, service history, and the last four digits of social security numbers. Moore then leaked this information on his Instagram account, further amplifying the breach’s impact. His actions compromised the privacy of individuals relying on AmeriCorps for critical services, raising concerns about the security of federal databases handling sensitive personal data.

Moore’s criminal activities extended to the Department of Veterans Affairs (VA), where he used stolen login credentials from a U.S. Marine Corps veteran to access the My HealtheVet online health record portal five times between September and October 2023. The VA, which operates the largest integrated health care system in the U.S., provides services at 1,380 facilities nationwide. By infiltrating the veteran’s private health records, Moore gained access to information about prescribed medications and other intimate details. He subsequently posted this sensitive data on his Instagram account, showcasing the breach and boasting about his ability to infiltrate the VA’s systems. The Justice Department emphasized that this act not only violated the veteran’s privacy but also exposed the vulnerabilities of healthcare infrastructure critical to national security.

Moore’s actions led to a single count of computer fraud, a misdemeanor charge that carries a maximum penalty of one year in prison and a $100,000 fine. The case underscores the growing threat of cyberattacks targeting governmental institutions and the potential consequences of inadequate security measures. Prosecutors noted that Moore’s breaches exploited weak authentication protocols and the reuse of compromised credentials, highlighting systemic risks in federal digital systems. The incident also raised questions about the adequacy of protections for sensitive data, particularly in agencies handling vast amounts of personal and health information.

The case has drawn attention to the broader issue of cybercrime in public institutions, where breaches can have far-reaching implications for national security and individual privacy. Moore’s use of social media to publicize his exploits illustrates the dual threat posed by cybercriminals: not only do they compromise data, but they also leverage platforms to spread stolen information, amplifying the harm caused. The Supreme Court’s electronic filing system, which facilitates access to legal proceedings, became a focal point of the breach, raising concerns about the integrity of judicial processes. Meanwhile, the VA’s health records system, designed to serve veterans, was exploited for personal gain, emphasizing the need for stronger cybersecurity measures in healthcare infrastructure.

The article also references related cybersecurity incidents, such as ransomware attacks and malware exploits, which collectively highlight the persistent challenges faced by organizations in safeguarding digital assets. While Moore’s case is an isolated example, it reflects a broader pattern of cyber threats targeting governmental and institutional systems. The Justice Department’s prosecution of Moore serves as a cautionary tale about the legal repercussions of cybercrime, even for individuals operating under pseudonyms on social media. However, critics argue that such cases often fail to address the root causes of vulnerabilities, such as outdated systems or insufficient investment in cybersecurity.

The incident has prompted discussions about the need for stricter regulations and improved security protocols within federal agencies. Experts emphasize that breaches like Moore’s could have been mitigated through multi-factor authentication, regular system audits, and enhanced monitoring for suspicious activity. The case also underscores the importance of public awareness about cybersecurity risks, particularly for individuals whose data may be inadvertently exposed through institutional lapses. As government agencies continue to digitize operations, the balance between accessibility and security remains a critical challenge.

Sergiu Gatlan, the article’s author, has reported on cybersecurity developments for over a decade, providing insights into the evolving landscape of digital threats. His coverage highlights the intersection of technology and governance, shedding light on how cyberattacks can disrupt essential services and erode public trust. The summary of Moore’s case aligns with broader narratives about the increasing sophistication of cybercrime and the urgent need for proactive defense strategies. As digital infrastructure becomes more integral to daily life, the lessons from this incident remain relevant for policymakers, security professionals, and the general public.