Two Cybersecurity Experts Plead Guilty to ALPHV/BlackCat Ransomware

Two Cybersecurity Experts Plead Guilty to ALPHV/BlackCat Ransomware

A significant breach of trust within the cybersecurity industry came to light when two professionals tasked with defending organizations against cyberattacks pleaded guilty to orchestrating a widespread ransomware extortion scheme.

Ryan Clifford Goldberg, 40, from Watkinsville, Georgia, and Kevin Tyler Martin, 36, from Roanoke, Texas, admitted to conspiring to obstruct commerce through extortion using the notorious ALPHV/BlackCat ransomware operation.

The guilty pleas were accepted on December 29, 2025, by the U.S. District Court for the Southern District of Florida, marking a swift resolution after both men were arrested in the autumn of 2025.

Goldberg was taken into custody on September 22, while Martin was arrested on October 14. The pair reached their plea agreements with prosecutors on December 18, 2025. Sentencing is scheduled for March 12, 2026, where each defendant faces a maximum prison sentence of 20 years.

The Inside Threat

At the time of their criminal activities, Goldberg and Martin held positions of responsibility within legitimate cybersecurity firms dedicated to incident response—the very operations designed to combat the attacks they would subsequently perpetrate. Goldberg served as an incident response manager at Sygnia, a firm specializing in helping organizations recover from cyber incidents.

Martin worked as a ransomware threat negotiator at DigitalMint, another cybersecurity company focused on incident response and ransomware mitigation. His role explicitly involved negotiating with extortion groups on behalf of victimized companies, providing him with intimate knowledge of ransomware tactics and payment procedures.

The pair collaborated with an unnamed third conspirator who also worked at DigitalMint in the same ransomware negotiator position. This individual obtained an affiliate account on the ALPHV platform, granting the trio access to the ransomware-as-a-service infrastructure.

In exchange for deploying the malware and extorting victims, the three agreed to surrender 20 percent of their ransom proceeds to the ALPHV administrators.

The Campaign: Targets and Tactics

Between May and November 2023, the conspiracy targeted five U.S. companies across multiple sectors and states.

The victims included a medical device manufacturer in Tampa, Florida; a pharmaceutical company based in Maryland; a physician's office in California; an engineering firm in California; and a drone manufacturer in Virginia.

The attackers employed sophisticated methodology reflective of their professional training. They accessed victim networks using stolen credentials and exploited unpatched software vulnerabilities to establish initial footholds.

Once inside systems, they deployed BlackCat ransomware to encrypt critical data and exfiltrate sensitive information, including patient records and proprietary research. The operational security was deliberate: they attempted to cover their tracks through cryptocurrency laundering, moving Bitcoin through multiple wallets to obscure the origin of illicit proceeds.

Ransom demands were aggressive and well-calibrated. The group sought payments ranging from $300,000 to $10 million per victim, with the Tampa medical device company facing the highest demand of $10 million.

When organizations refused payment, the conspirators escalated pressure by publishing stolen data on ALPHV's public leak site—a tactic designed to force compliance through public shame and regulatory exposure.

Financial Impact and Recovery

The attacks caused losses exceeding $9.5 million in aggregate, according to the plea agreements. However, only one victim—the Tampa medical device manufacturer—capitulated to extortion demands. That company paid $1.27 million in May 2023, though significantly less than the $10 million demanded.

After paying the 20 percent commission to ALPHV administrators, the remaining proceeds were divided among the three conspirators, generating approximately $1 million per perpetrator before operational costs and cryptocurrency exchanges were considered.

Other victims refused payment, limiting the financial scope of the actual extortion scheme.

However, the attempted extortions still inflicted substantial collateral damage through operational disruption, forensic investigation costs, and regulatory notification expenses that extended far beyond the explicit ransom amounts.

The Broader ALPHV Context

BlackCat, operating under the ALPHV alias, represents one of the most dangerous ransomware operations active globally. The group first emerged in late 2021 and became particularly notorious for exploiting cloud backup systems—infrastructure specifically designed to provide resilience against ransomware encryption.

The organization operates on a pure affiliate model, recruiting external operators to conduct attacks while the core development team maintains the malware and infrastructure.

The broader ALPHV operation achieved a scale that far exceeded the activities of these three operatives. According to Department of Justice assessments, the ransomware group targeted more than 1,000 victims worldwide and accumulated at least $300 million in ransom payments from organizations through September 2023.

The group's victim roster included major corporations and healthcare systems. Most notably, ALPHV claimed responsibility for the 2023 attack on UnitedHealth Group's Change Healthcare subsidiary, which resulted in a $22 million ransom payment and compromised personal data belonging to approximately 190 million individuals—constituting the largest healthcare data breach on record.

The group also claimed responsibility for significant attacks on MGM Resorts, Reddit, and numerous other organizations across critical infrastructure sectors.

Federal Takedown and Disruption

The consequences for the broader ALPHV operation proved severe. In December 2023, the Federal Bureau of Investigation breached ALPHV's servers and developed decryption tools that undermined the group's extortion capability.

The intervention benefited hundreds of victims by enabling data recovery without ransom payment. The FBI's action is estimated to have saved over $99 million in ransom payments across the affected organizations.

By March 2024, ALPHV appeared to dissolve under circumstances suggesting leadership conflicts or law enforcement pressure. The group's operators claimed they were conducting an exit scam against their affiliates, leading to internal collapse of the operation.

Cybersecurity researchers have noted inconsistencies in these claims, but the practical effect was the dismantling of the infrastructure that Goldberg and Martin exploited.

Legal Framework and Sentencing Considerations

Goldberg and Martin each pleaded guilty to a single count: conspiracy to interfere with interstate commerce by extortion. This charge carries a maximum sentence of 20 years in prison and requires a maximum fine of $250,000 per defendant, plus forfeiture of proceeds.

Both men are ordered to forfeit $342,000, representing the value of ransom proceeds traced to their identities and accounts.

Federal prosecutors have indicated they will recommend sentence reductions contingent upon full cooperation, accurate disclosure of their offenses, and continued lawful conduct during the pre-sentencing period.

The court also noted that both defendants abused a position of trust and employed specialized skills—characteristics that typically aggravate sentencing calculations in federal guidelines.

The rapid plea resolution—from indictment in October to guilty plea acceptance in December—suggests prosecutors presented compelling evidence, likely including cryptocurrency transaction records, encrypted communications, and victim testimony.

The Justice Department declined to pursue additional charges beyond the single conspiracy count, indicating either evidentiary limitations on remaining charges or prosecutorial judgment that the conspiracy conviction provided adequate leverage for sentencing purposes.

Industry Implications and Trust Erosion

This case exposes a critical vulnerability in cybersecurity operations: insider threat risk among personnel with the deepest knowledge of defensive systems.

Incident responders and threat negotiators occupy positions of maximum information asymmetry—they understand victim network architectures, security vulnerabilities, ransom negotiation psychology, and incident response procedures. This combination of knowledge and access makes them exceptionally dangerous if recruitment or motivation falters.

The scale of compensation in ransomware-as-a-service operations creates measurable temptation. ALPHV's standard affiliate arrangement offered operators 80 percent of ransom proceeds—compensation levels far exceeding what legitimate cybersecurity firms typically provide incident responders.

For professionals earning six-figure salaries in incident response, the prospect of extracting millions from a single target presents compelling financial incentive, particularly if they harbor grievances regarding compensation or career advancement.

Sygnia and DigitalMint have both issued formal statements condemning their former employees' conduct and emphasizing full cooperation with federal investigators. DigitalMint explicitly stated that Goldberg and Martin's actions violated company values and ethical standards and were undertaken without organizational knowledge or authorization.

Nevertheless, the reputational damage to these firms is substantial, and clients may demand enhanced due diligence and continuous monitoring of personnel with privileged access.

Conclusion and Ongoing Risks

The guilty pleas of Goldberg and Martin represent a singular but concerning phenomenon: the weaponization of cybersecurity expertise against the organizations these professionals were employed to defend.

The case demonstrates that insider threats in cybersecurity extend beyond data theft or backdoor installation to encompass direct participation in extortion operations. Federal authorities have prioritized ransomware prosecution, and this conviction signal s sustained commitment to pursuing operators regardless of their professional credentials.

Sentencing in March 2026 will establish precedent for how the federal judiciary treats insider threats within the cybersecurity industry. The 20-year maximum exposure and likely substantial prison sentences will serve as deterrent messaging to other professionals contemplating similar betrayal.

Nevertheless, the financial incentives embedded within ransomware-as-a-service operations remain substantial, and organizations must recognize that employees with advanced defensive knowledge represent persistent recruitment targets for criminal enterprises.

Alex Murphy - image

Alex Murphy

Alex Murphy is the tech correspondent and innovation enthusiast. His passion is dissecting the strategies of Startups & Entrepreneurship, the influence of Business Technology (AI, Cloud), and providing unbiased Software & Service Reviews.