Security Professionals Plead Guilty in ALPHV Ransomware Case

Two U.S. cybersecurity professionals pleaded guilty to working as ALPHV/BlackCat ransomware affiliates, highlighting insider threat risks.

Written By
thumbnail
Ken Underhill
Ken Underhill
Jan 2, 2026
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Two U.S.-based cybersecurity professionals have pleaded guilty after admitting they used their technical expertise to carry out ransomware attacks instead of defending against them. 

The case underscores a troubling insider threat scenario, where trusted security knowledge was weaponized to extort victims as part of the notorious ALPHV/BlackCat ransomware operation.

“These defendants used their sophisticated cybersecurity training and experience to commit ransomware attacks — the very type of crime that they should have been working to stop,” said Assistant Attorney General A. Tysen Duva of the Justice Department’s Criminal Division.

How the Ransomware Scheme Worked

According to the U.S. Department of Justice, Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, of Texas, pleaded guilty to conspiracy to commit extortion for their roles as ransomware affiliates. 

Court documents show that the defendants used their cybersecurity expertise to identify and exploit weaknesses in victim environments. 

After gaining access, they deployed ALPHV BlackCat ransomware and participated directly in extortion negotiations. In one confirmed incident, the group successfully extorted approximately $1.2 million in Bitcoin from a victim.

After the ransom was paid, the conspirators split their 80% share and laundered the proceeds through various channels to conceal their origins. 

The structured revenue-sharing model mirrors how modern RaaS operations scale rapidly by recruiting technically capable affiliates rather than conducting all attacks themselves.

ALPHV BlackCat has been one of the most active ransomware groups globally, targeting more than 1,000 organizations across multiple industries. 

Its operations have caused widespread financial damage and operational disruption, making it a priority target for U.S. law enforcement.

Advertisement

Law Enforcement Strikes Back at BlackCat

In December 2023, the FBI delivered a blow to ALPHV BlackCat by developing and releasing a free decryption tool

The tool enabled hundreds of victims to recover encrypted systems without paying ransoms, saving an estimated $99 million. 

Authorities also seized several websites associated with the group’s infrastructure, disrupting ongoing operations.

The investigation into Goldberg and Martin was led by the FBI’s Miami Field Office, with assistance from the U.S. Secret Service.

Both defendants face up to 20 years in prison and are scheduled for sentencing in March 2026.

How to Reduce Insider-Assisted Ransomware Risk

The following measures outline practical steps organizations can take to reduce insider-assisted ransomware risk by strengthening access governance, oversight, and response readiness.

  • Enforce least-privilege and just-in-time access for security personnel, supported by regular access reviews and segregation of duties.
  • Monitor privileged activity and user behavior using logging and behavioral analytics to detect anomalous or high-risk actions.
  • Require multi-party approval for sensitive operations such as disabling security controls, accessing backups, or deploying high-risk tools.
  • Conduct thorough background checks, ethics training, and provide clear, protected channels for reporting suspicious or unethical behavior.
  • Incorporate insider-assisted ransomware scenarios into incident response plans and test them through regular simulations and tabletop exercises.

Together, these controls help limit insider abuse, reduce the impact of privileged access misuse, and contain the blast radius of insider-assisted ransomware incidents. 

Rather than relying solely on external access or opportunistic attacks, ransomware groups are actively recruiting insiders with legitimate technical expertise to accelerate intrusions, bypass defenses, and increase the success of extortion efforts.  

As insider involvement becomes a deliberate tactic in ransomware campaigns, IT leaders must rethink how they identify, manage, and mitigate insider threats across their organizations.

thumbnail
Ken Underhill

Ken Underhill is an award-winning cybersecurity professional, bestselling author, and seasoned IT professional. He holds a graduate degree in cybersecurity and information assurance from Western Governors University and brings years of hands-on experience to the field.

Recommended for you...

AI Agent Safety Checklist
Girish Redekar
Mar 12, 2026
Active Directory Flaw Enables SYSTEM Privilege Escalation
Ken Underhill
Mar 12, 2026
400K WordPress Sites Exposed by Elementor Ally Plugin SQL Flaw
Ken Underhill
Mar 12, 2026
Iran-Linked Hacktivists Claim Wiper Attack on Stryker Systems
Ken Underhill
Mar 12, 2026
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.