Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hacker Pleads Guilty For Stealing Supreme Court Documents and Leaking via Instagram

Hacker Pleads Guilty For Stealing Supreme Court Documents and Leaking via Instagram

Posted on January 20, 2026January 20, 2026 By CWS

Nicholas Moore, 24, from Springfield, Tennessee, pleaded responsible to unauthorized laptop entry and fraud, marking a major case of presidency cybersecurity breach.

Moore hacked a number of U.S. authorities techniques and publicly disclosed delicate data by social media, exposing vital vulnerabilities in federal digital infrastructure.

Between August and October 2023, Moore executed a coordinated sequence of intrusions focusing on three high-value authorities techniques.

Utilizing stolen credentials from licensed customers, Moore breached the U.S. Supreme Court docket’s digital submitting system at the very least 25 instances over 25 days, usually accessing the platform a number of instances inside a single day.

The assault demonstrated persistent unauthorized entry to a system restricted to licensed personnel solely.

Moore’s intrusion methodology relied on credential theft relatively than refined exploitation strategies. He obtained login credentials from a number of licensed customers and used them throughout completely different authorities platforms.

This credential-based assault vector highlights the continuing vulnerability of presidency techniques to stolen authentication components, regardless of safety protocols designed to stop such entry.

Multi-System Breach Scope

Moore’s hacking marketing campaign prolonged past the Supreme Court docket. Between August 17 and October 13, 2023, Moore accessed AmeriCorps techniques utilizing stolen credentials, extracting private data from a second sufferer’s account.

Moreover, Moore accessed the Division of Veterans Affairs’ MyHealthEVet platform 5 instances between September 14 and October 14, 2023, utilizing compromised credentials from a U.S. Marine Corps veteran.

This entry enabled Moore to view the veteran’s non-public well being data, together with prescribed medicines and confidential medical particulars, with out authorization.

Moore’s most important operational error was publicly posting proof of his breaches on Instagram below the account @ihackedthegovernment.

On three separate events, Moore uploaded screenshots containing particulars of the Supreme Court docket submitting system, sufferer names, and different figuring out data.

He equally posted AmeriCorps sufferer private data and proof of the Veterans Affairs breach to the identical public account, accompanied by boasts about accessing VA servers.

This public disclosure of stolen knowledge by social media grew to become the first proof path resulting in Moore’s identification and prosecution.

The case demonstrates how risk actors ceaselessly compromise operational safety by publicizing their actions for notoriety or bragging rights.

Moore pleaded responsible to a single depend of laptop fraud, a Class A misdemeanor. He faces as much as one 12 months in jail and $100,000 in fines at sentencing scheduled for April 17, 2026, earlier than Decide Beryl A. Howell in U.S. District Court docket.

The investigation concerned the Supreme Court docket Police Protecting Intelligence Unit, the FBI Washington Subject Workplace, the Veterans Affairs Workplace of Inspector Normal, and the AmeriCorps Workplace of Inspector Normal, coordinated by Assistant U.S. Attorneys John Borchert and Rami Sibay.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Court, Documents, Guilty, Hacker, Instagram, Leaking, Pleads, Stealing, Supreme

Post navigation

Previous Post: Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol
Next Post: Everest Ransomware Group Allegedly Claims to Have Breached McDonald’s India

Related Posts

Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News
Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery Midnight Ransomware Decrypter Flaws Opens the Door to File Recovery Cyber Security News
European Space Agency Confirms Breach of Servers Outside the Corporate Network European Space Agency Confirms Breach of Servers Outside the Corporate Network Cyber Security News
Critical Flaw in API Keys Plugin Enables Account Takeovers Critical Flaw in API Keys Plugin Enables Account Takeovers Cyber Security News
Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Salesloft Drift Hacked to Steal OAuth Tokens and Exfiltrate from Salesforce Corporate Instances Cyber Security News
GitLab SSRF Vulnerability Exploited: CISA Issues Warning GitLab SSRF Vulnerability Exploited: CISA Issues Warning Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark