:

HACKER WHO BREACHED SUPREME COURT GETS PROBATION

SECURITY DESK1 MIN READ
FRI, APR 17, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

Nicholas Moore, who hacked into three U.S. government networks using stolen credentials, was sentenced to probation. Moore publicly bragged about the breach and posted victims' personal data on Instagram.

Moore accessed the U.S. Supreme Court filing system along with two other federal networks by exploiting stolen login credentials. After gaining access, he posted evidence of the breach on Instagram under the handle @ihackedthegovernment, including victims' personal information. The hacker's public boasting led to his identification and arrest. Federal prosecutors argued the breaches posed significant risks to national security and violated the privacy of government employees and court users. Moore pleaded guilty to unauthorized computer access charges. The probation sentence reflects plea negotiations and his cooperation with authorities during the investigation. The case highlights vulnerabilities in federal cybersecurity practices and the dangers of credential-based attacks. The Supreme Court's systems were not permanently compromised, though the breach raised questions about how attackers obtained valid login credentials for multiple government agencies.

■ SOURCES

TechCrunch

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Bluesky attributed ongoing service disruptions to a sophisticated distributed denial-of-service attack Friday. The company said it found no evidence of unauthorized access to user data.

JUST NOWIndustry Desk

Grinex, a Russia-friendly cryptocurrency exchange, claims a Western intelligence agency orchestrated a $15 million cyberattack. The exchange stated the attack required resources available only to hostile state actors.

JUST NOWSecurity Desk

Sam Altman's World project is expanding partnerships to verify human identity, adding Zoom and others to its existing Tinder collaboration as it shifts focus from cryptocurrency to identity verification.

JUST NOWIndustry Desk

The Payouts King ransomware exploits QEMU emulation software to run concealed virtual machines on infected systems, allowing it to evade endpoint security tools. The technique uses reverse SSH backdoors to maintain hidden access.

2H AGOSecurity Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.