Executive Summary

In late 2023, a Tennessee man illicitly accessed the U.S. Supreme Court’s restricted electronic filing system, as well as accounts at AmeriCorps and the Department of Veterans Affairs, through the repeated use of stolen credentials. Over multiple months, Nicholas Moore gained unauthorized entry to sensitive government systems at least 25 times, collecting and exfiltrating personal, legal, and health data. He then publicized this sensitive information via his Instagram handle, @ihackedthegovernment, exposing government, AmeriCorps, and veteran data, including personal identifiers and privileged health information.

This case underscores a rise in breaches involving compromised credentials, lateral movement, and public boasting on social media. With persistent attacker focus on governmental targets and data exfiltration, it exemplifies the ongoing risks of inadequate east-west and data-in-transit security, as well as the compliance pressure on federal agencies to shore up access controls and insider threat monitoring.

Why This Matters Now

The Supreme Court and agency breaches shine a spotlight on the urgent need for robust credential management and access controls. Attackers increasingly exploit reused or weak credentials to bypass defenses, often targeting sensitive public sector data for reputational or ideological impact. This incident highlights the importance of proactive threat detection and internal segmentation at a time of heightened scrutiny on public infrastructure security.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The breach revealed weaknesses in user credential management, east-west security controls, data loss prevention, and monitoring capabilities within public sector networks, exposing agencies to sensitive data leakage.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Applying Cloud Network Security Framework controls such as zero trust segmentation, strong east-west traffic security, egress enforcement, and detailed anomaly detection would have limited attacker movement, raised detection fidelity, and could have blocked data exfiltration to unauthorized destinations. These controls provide continuous monitoring and least privilege barriers, significantly reducing the attack surface and the impact caused by credential compromise.

Initial Compromise

Control: Zero Trust Segmentation

Mitigation: Limits initial access scope by restricting communication based on identity and least privilege.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Restricts lateral data access by enforcing least privilege and service identity boundaries.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Prevents unauthorized workload-to-workload or service-to-service access across regions.

Command & Control

Control: Threat Detection & Anomaly Response

Mitigation: Detects repeated, anomalous, or out-of-policy access attempts and triggers alerts.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Prevents and logs outgoing data flows to unauthorized destinations.

Impact (Mitigations)

Rapidly detects, contains, and enables response to policy violations and leaks across environments.

Impact at a Glance

Affected Business Functions

  • Legal Document Management
  • Volunteer Management
  • Veteran Health Records Management
Operational Disruption

Estimated downtime: 7 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Personal information of individuals associated with the U.S. Supreme Court, AmeriCorps, and the Department of Veterans Affairs was exposed, including names, dates of birth, email addresses, home addresses, phone numbers, citizenship status, veteran status, service history, and health information.

Recommended Actions

  • Enforce identity-based segmentation for all cloud workloads and SaaS access to prevent broad lateral movement by compromised users.
  • Deploy granular egress policy controls to detect and block unauthorized data exfiltration from all cloud and SaaS connected workloads.
  • Enhance east-west traffic inspection within and across clouds to spot and interrupt attacker pivoting and anomalous access.
  • Leverage real-time threat detection, traffic baselining, and anomaly alerting to rapidly surface credential misuse or repeat suspicious logins.
  • Centralize policy governance and visibility across multi-cloud and SaaS environments to ensure consistent zero trust enforcement and rapid incident response.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image