Forgot your password?
typodupeerror
Crime News

Cybersecurity Employees Plead Guilty To Ransomware Attacks 17

Two cybersecurity professionals who spent their careers defending organizations against ransomware attacks have pleaded guilty in a Florida federal court to using ALPHV/BlackCat ransomware to extort American businesses throughout 2023.

Ryan Goldberg, a 40-year-old incident response manager from Georgia, and Kevin Martin, a 36-year-old ransomware negotiator from Texas, admitted to conspiring to obstruct commerce through extortion. Between April and December 2023, Goldberg, Martin, and a third unnamed co-conspirator deployed the ransomware against multiple U.S. victims and agreed to pay ALPHV BlackCat's operators a 20% cut of any ransoms received. They successfully extracted approximately $1.2 million in Bitcoin from one victim, splitting their 80% share three ways before laundering the proceeds. Both men face up to 20 years in prison and are scheduled for sentencing on March 12, 2026.

The Justice Department noted that all three conspirators possessed specialized skills in securing computer systems against the very attacks they carried out. ALPHV BlackCat has targeted more than 1,000 victims globally and was the subject of an FBI disruption operation in December 2023 that saved victims an estimated $99 million through a custom decryption tool.
This discussion has been archived. No new comments can be posted.

Cybersecurity Employees Plead Guilty To Ransomware Attacks

Comments Filter:
  • by fahrbot-bot ( 874524 ) on Tuesday December 30, 2025 @05:35PM (#65891189)

    ... pleaded guilty in a Florida federal court ...

    Very little shocks/surprises me if the sentence contains the word, "Florida". :-)

    • by sound+vision ( 884283 ) on Tuesday December 30, 2025 @08:18PM (#65891523) Journal

      Note also the "ransomware negotiator" is from Texas. Texas has lately been making itself known as the destination for scams of all kinds.

      I think Mr. Martin's main fuckup here was not cutting off some of that BTC for Ken Paxton. Now that there are criminal charges and media scrutiny it's probably too late.

      • Note also the "ransomware negotiator" is from Texas. Texas has lately been making itself known as the destination for scams of all kinds.

        I saw that and am still pondering which is the "step up": moving from Texas to Florida or Florida to Texas.
        More and more, I'm leaning toward either being a lateral move. :-)

  • by Fly Swatter ( 30498 ) on Tuesday December 30, 2025 @05:37PM (#65891193) Homepage
    You do not negotiate, just play it like your corporate facility just burned down. No exceptions, no payments, no more perpetuating the ransom business model.
    • It's easy to say so when isn't your company that will "burn down" and close forever...

      Imagine an accountant's office that lost every single file from hundreds of clients, and the ransom is 30% of their yearly revenue... If they don't pay, they are out of the market. It's not easy to rebuild from scratch, and sometimes isn't even possible, it's pay or close doors.

      Some say "you should have backups!" and they are right, but not every company does backup right, and a lot don't even have backups at all. So
      • I can empathize with the loss, but that's all they get from me. It's like a plague - the only way to cure it is to choke it completely out.

        I am surprised someone didn't bring up a scenario where children's health history records are ransomed that are needed to maintain life. Quite the ethical dilemma.
  • If they were verbally slick like Mitnick, they'd have committed other crimes. So they're not going to talk their way back into the security world. They won't have a trusted position to abuse, so I'm not sure what else they have to offer organized cracker gangs.

    Hope the memories of that money serve them well when they're free and closing robot car doors for a living to make their restitution payments.

  • This is a continuation of a previous story: https://yro.slashdot.org/story... [slashdot.org]
  • Fundamentally a broken role. You never negotiate or pay ransom, fuckwits
  • Well they obviously weren't very skillful cybersecurity professionals as they didn't seem to know how to disguise the source of the ransomware attacks. Maybe they missed that particular module back in cybersecurity college /s

    Ryan Clifford Goldberg: Digital forensics and incident response professional at Sygnia Cybersecurity Services.

    “Goldberg, meanwhile, had seemingly registered a profile with Sans Institute [acs.org.au]. At the time of writing, Goldberg’s profile on the platform appears to have been t

How can you do 'New Math' problems with an 'Old Math' mind? -- Charles Schulz

Working...