Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat

March 25, 2026

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

CyberTech Daily: Top News & Insights

March 25, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Prosecutors accuse incident responders of using ALPHV/BlackCat in a series of ransomware attacks
Cybercrime and Ransomware

Prosecutors accuse incident responders of using ALPHV/BlackCat in a series of ransomware attacks

Staff WriterBy Staff WriterNovember 3, 2025No Comments5 Mins Read3 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Summary Points

  1. Three U.S.-based cybersecurity professionals, including Ryan Goldberg and Kevin Martin, allegedly used the BlackCat ransomware to breach five U.S. companies in 2023, disguising their activities as cybersecurity efforts.
  2. They received nearly $1.3 million in ransom from a Florida medical company but failed to extort other victims, prompting indictments on charges of conspiracy, extortion, and computer damage.
  3. Goldberg, who was a cybersecurity incident response director, and Martin, a ransomware negotiator, were arrested and face up to 50 years in prison; Goldberg admitted to FBI his role in the attacks.
  4. The group behind BlackCat has a notorious reputation, linked to major attacks including the $22 million ransom on UnitedHealth’s subsidiary, with the indicted individuals allegedly operating outside their prior employment and infrastructure.

Underlying Problem

In 2023, three U.S. cybersecurity professionals—Ryan Clifford Goldberg, Kevin Tyler Martin, and an unnamed co-conspirator—allegedly betrayed their roles and used their technical skills to launch a series of ransomware attacks against five American companies. These individuals, working from May 2023 to April 2025, exploited the ALPHV (BlackCat) ransomware to target a variety of organizations, including a Florida medical firm, a Maryland pharmaceutical company, and others across California and Virginia, demanding and collecting nearly $1.3 million in ransom payments, notably from the Florida medical business. According to court documents, Goldberg, a former director at Sygnia Cybersecurity, and Martin, a ransomware negotiator at DigitalMint, along with their unlisted partner, orchestrated these cybercrimes—despite their professional expertise—raising questions about trust and the integrity within the cybersecurity field. Their reporting comes from the U.S. District Court in Florida, which has indicted them for conspiracy and extortion, with Goldberg having been caught while attempting to flee to Europe, allegedly confessing to his involvement and motives, including debt alleviation, in FBI interviews.

The case underscores the troubling reality that individuals in cybersecurity can pivot from defenders to offenders, leveraging sophisticated ransomware tools like ALPHV, which has been notorious for attacks on critical infrastructure, including a major breach involving UnitedHealth Group subsidiary Change Healthcare that compromised data on roughly 190 million people. Both Goldberg and Martin face severe federal charges, with potential penalties up to 50 years in prison, after their arrests—Goldberg in September and Martin in October—and subsequent court appearances. The incidents have not only highlighted vulnerabilities in corporate defenses but also exposed internal threats posed by trusted professionals exploiting their positions for personal gain and criminal activity, with the legal process now unraveling their motives and actions as reported by federal authorities and cybersecurity investigators.

Risks Involved

The allegation that incident response professionals used the ALPHV/BlackCat ransomware to carry out a series of attacks highlights a profound and alarming risk: any business, regardless of size or industry, can become an unwitting participant in or victim of sophisticated cybercriminal activities. If such malicious actors exploit insider knowledge or breach trust, they can execute devastating ransomware attacks that lock down critical data, disrupt operations, and result in staggering financial losses, legal liabilities, and reputational damage. This scenario underscores the importance of rigorous security protocols, vigilant oversight, and ethical standards in cybersecurity, because if even those trusted to respond to incidents turn malicious, the fallout can be catastrophic, exposing vulnerabilities across the entire digital landscape of any enterprise.

Possible Next Steps

In the realm of cybersecurity, the promptness of remediation plays a crucial role in limiting damage, restoring normal operations, and preventing future incursions—particularly when sophisticated threat actors, such as those using ALPHV/BlackCat ransomware, are involved. The speed of response directly influences the overall security posture and reduces the likelihood of prolonged exploitation.

Containment Strategies

Rapidly isolate affected systems to prevent the ransomware from spreading further across the network. Disconnect compromised devices from network connections and disable shared drives or network access points to contain the threat.

Investigation and Analysis

Conduct thorough forensic analysis to understand the breach, including identifying the entry point, attack vectors, and extent of data encryption or exfiltration. Gather and preserve evidence to support legal and recovery efforts.

Eradication Procedures

Remove malicious software, such as ransomware variants, by cleaning infected systems or replacing compromised hardware if necessary. Patch vulnerabilities exploited during the attack, including outdated software or misconfigurations.

Restoration Plan

Restore systems from secure, offline backups to ensure data integrity. Validate the restored data before bringing systems back online and monitor for any residual threats.

Preventative Measures

Implement strengthened security practices: multi-factor authentication, network segmentation, updated security patches, and comprehensive employee training to recognize social engineering tactics. Additionally, deploy advanced threat detection solutions capable of identifying early signs of ransomware activity.

Communication and Reporting

Notify relevant stakeholders, including law enforcement, regulatory bodies, and affected parties, in compliance with legal requirements. Maintain clear communication channels to provide updates and mitigate reputational harm.

Policy and Review

Review and update incident response plans, security policies, and procedures based on lessons learned. Regularly conduct drills and assessments to ensure readiness against similar threats.

Stay Ahead in Cybersecurity

Discover cutting-edge developments in Emerging Tech and industry Insights.

Learn more about global cybersecurity standards through the NIST Cybersecurity Framework.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

ALPHV CISO Update cyber risk cybercrime Cybersecurity department of justice (doj) Incident response indictment MX1 Ransomware ransomware negotiation risk management
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUkrainian Extradited to US Over Jabber Zeus Cybercrime Charges
Next Article KELA Unveils National Cyber Resilience Suite to Combat Cyber Threats
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads

March 25, 2026

New Research Reveals How Infostealer Infections Hit Dark Web in 48 Hours

March 25, 2026

Comments are closed.

Latest Posts

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads

March 25, 2026

New Research Reveals How Infostealer Infections Hit Dark Web in 48 Hours

March 25, 2026

500GB Stolen from Namibia Airports: A Wake-Up Call for Aviation Security

March 25, 2026
Don't Miss

RedLine Infostealer Conspirator Extradited to U.S.

By Staff WriterMarch 25, 2026

Top Highlights An Armenian man, Hambardzum Minasyan, was extradited to the US and appeared in…

Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads

March 25, 2026

New Research Reveals How Infostealer Infections Hit Dark Web in 48 Hours

March 25, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat
  • RedLine Infostealer Conspirator Extradited to U.S.
  • CyberTech Daily: Top News & Insights
  • Pay2Key Ransomware Targets Organizations, Virtualization Hosts, and Cloud Workloads
  • LeakBase Admin Nabbed in Russia for Massive Credential Marketplace
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The Kill Chain Is Obsolete When Your AI Agent Becomes the Threat

March 25, 2026

RedLine Infostealer Conspirator Extradited to U.S.

March 25, 2026

CyberTech Daily: Top News & Insights

March 25, 2026
Most Popular

Protecting MCP Security: Defeating Prompt Injection & Tool Poisoning

January 30, 202629 Views

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.