Two American cybersecurity professionals pleaded guilty to operating as BlackCat/ALPHV ransomware affiliates, using their security expertise to attack US organizations including healthcare providers. The case highlights the insider threat risk when security professionals turn to cybercrime.

Incident overview

AttributeDetails
DefendantsRyan Goldberg, Kevin Martin
RansomwareALPHV/BlackCat
Attack periodApril - December 2023
Victims5 US organizations
Total losses$9.5+ million
Largest single ransom$1.2 million
Plea dateJanuary 2, 2026
Sentencing dateMarch 12, 2026
Maximum sentence20 years

The defendants

NameAgeLocationEmployerRole
Ryan Clifford Goldberg40GeorgiaSygniaIncident Response Manager
Kevin Tyler Martin36TexasDigitalMintRansomware Negotiator
Unnamed co-conspiratorLand O’Lakes, FloridaDigitalMintRansomware Negotiator

Both men worked in cybersecurity roles that gave them deep knowledge of how organizations respond to ransomware attacks. Martin and an unnamed co-conspirator were employed as ransomware negotiators at DigitalMint, a company that helps victims communicate with attackers. Goldberg worked as an incident response manager at Sygnia, an Israeli cybersecurity firm.

The attacks

Between April and December 2023, Goldberg and Martin operated as BlackCat affiliates, targeting five US organizations:

TargetIndustryLocation
Medical device companyHealthcareFlorida
Pharmaceutical companyHealthcareMaryland
Doctor’s officeHealthcareCalifornia
Engineering companyTechnologyCalifornia
Drone manufacturerDefense/TechVirginia

Three of the five targets were healthcare organizations—a sector particularly vulnerable to ransomware due to patient safety concerns and regulatory pressure.

How the operation worked

As affiliates, Goldberg and Martin handled the operational side of attacks:

PhaseActivity
1. Target identificationSelecting and researching victim organizations
2. Initial compromiseGaining access to victim networks
3. DeploymentInstalling BlackCat ransomware
4. NegotiationCommunicating ransom demands to victims
5. CollectionReceiving cryptocurrency payments
6. LaunderingConverting and dispersing funds

In exchange for access to the BlackCat ransomware and extortion infrastructure, they paid 20% of collected ransoms to the ransomware administrators.

Professional advantage

Insider knowledgeExploitation
Incident response proceduresKnew how victims would respond
Negotiation tacticsUnderstood what victims would pay
Recovery timelinesCould pressure victims on deadlines
Insurance coverage patternsInformed ransom demands
Technical defensesKnew common security gaps

Financial impact

MetricAmount
Total victim losses$9.5+ million
Traced proceeds (Goldberg & Martin)$342,000 each
Single attack (Florida medical company)$1.2 million
ALPHV administrator cut20% ($240,000 from Florida attack)
Affiliate share80%

After successfully extorting one victim for approximately $1.2 million in Bitcoin, the men split their 80% share three ways and laundered the funds.

Forfeiture

Both defendants are ordered to forfeit $342,000, representing the value of proceeds traced to their crimes.

Flight risk

After being interviewed by the FBI, Goldberg and his wife allegedly purchased one-way flights to Paris just 10 days later—raising significant flight risk concerns that likely influenced subsequent legal proceedings.

Both defendants pleaded guilty in Miami federal court to one count of conspiracy to obstruct commerce by extortion.

Legal detailStatus
ChargeConspiracy to obstruct commerce by extortion
CourtU.S. District Court, Southern District of Florida
Maximum sentence20 years in prison
Sentencing dateMarch 12, 2026
Forfeiture$342,000 each

DOJ statements

“These defendants used their sophisticated cybersecurity training and experience to commit ransomware attacks—the very type of crime that they should have been working to stop.” — Assistant Attorney General A. Tysen Duva

“Ransomware is not just a foreign threat—it can come from inside our own borders. Goldberg and Martin used trusted access and technical skill to extort American victims and profit from digital coercion.” — U.S. Attorney Jason A. Reding Quiñones

Employer responses

Sygnia

Sygnia stated that Goldberg was fired as soon as the company learned of the situation:

“While Sygnia is not a target of this investigation, we are continuing to work closely with the Federal Bureau of Investigation.”

DigitalMint

DigitalMint condemned Martin’s actions:

“These actions were undertaken without the knowledge, permission, or involvement of the company.”

About ALPHV/BlackCat

BlackCat emerged in late 2021 and became one of the most sophisticated ransomware-as-a-service (RaaS) operations:

AttributeDetails
LaunchLate 2021
LanguageFirst major ransomware written in Rust
PlatformsWindows, Linux, VMware ESXi
TacticsTriple extortion (encryption + data theft + DDoS threats)
TargetsHealthcare, education, critical infrastructure
Scale1,000+ ransomware incidents globally

Notable ALPHV attacks

TargetImpact
Las Vegas hotelsMajor hospitality disruption
Real estate companiesMulti-billion dollar industry impact
UnitedHealth/Change HealthcareMassive healthcare payment disruption

FBI disruption (December 2023)

The FBI seized ALPHV’s infrastructure and developed a decryption tool that helped victims recover systems, preventing an estimated $99 million in ransom payments. However, the group later resurfaced with modified operations before eventually shutting down following the devastating UnitedHealth attack.

Group shutdown

Following devastating attacks including the Change Healthcare incident that disrupted insurance payments across the US healthcare system, ALPHV/BlackCat eventually ceased operations in 2024.

Insider threat patterns

The Goldberg/Martin case follows established patterns in insider-driven cybercrime:

PatternThis case
Access to sensitive knowledgeBoth had deep IR/negotiation expertise
Financial motivationCryptocurrency payments
RationalizationHealthcare targeting despite ethical concerns
Detection difficultyOperated outside employer systems
Eventual identificationCryptocurrency tracing, FBI investigation

Lessons for the security industry

Background checks and vetting

ConsiderationImplementation
Enhanced background checksSecurity roles require deeper vetting
Continuous evaluationPeriodic re-screening during employment
Financial stress indicatorsMonitor for concerning patterns
Behavioral analyticsUnusual access patterns

Access and monitoring

ControlPurpose
Activity monitoringEven trusted personnel face oversight
Separation of dutiesNo end-to-end visibility into attack/response
Role rotationReduce concentrated knowledge
Exit proceduresRevoke access immediately upon departure

Organizational controls

MeasureBenefit
Whistleblower programsAnonymous reporting of suspicious behavior
Ethics trainingReinforce professional boundaries
Conflict of interest policiesDisclosure requirements
Peer reviewCross-checking of sensitive activities

Recommendations

For security employers

PriorityAction
CriticalEnhanced vetting for IR and negotiation roles
HighImplement activity monitoring for sensitive positions
HighEstablish anonymous reporting channels
MediumPeriodic re-screening and financial wellness checks
OngoingEthics and professional responsibility training

For law enforcement

PriorityAction
HighCryptocurrency tracing capabilities
HighCoordination with security industry on insider cases
MediumBehavioral pattern analysis across RaaS affiliates
OngoingInternational cooperation on affiliate prosecution

For incident response firms

PriorityAction
HighReview employee access to victim data
HighImplement segregation of duties
MediumMonitor for unusual information requests
OngoingBackground verification for new hires

Context

Security professionals turning to cybercrime isn’t new, but the RaaS model makes it easier than ever. Affiliates don’t need to develop malware or maintain infrastructure—they just need to find and compromise targets. For insiders with security expertise, the technical barriers are minimal.

EnablerImpact
RaaS accessibilityLow barrier to entry for affiliates
CryptocurrencyAnonymous payment and laundering
Professional knowledgeUnderstanding of defenses and responses
Victim insightsKnowledge of what organizations will pay

The case also demonstrates that ransomware affiliate prosecution is possible. Law enforcement tracked cryptocurrency payments, linked them to identifiable individuals, and secured guilty pleas. The message: affiliates aren’t anonymous, and domestic prosecution is on the table.

For organizations hiring security personnel, the case reinforces that technical skills alone aren’t sufficient criteria—integrity matters, monitoring matters, and the insider threat extends to the defenders themselves.

The targeting of healthcare organizations—including a doctor’s office and medical device company—adds an ethical dimension to the case. These defendants knowingly endangered patient safety and healthcare delivery for financial gain, leveraging the very expertise they were trusted to use defensively.