On December 30, 2025, the U.S. Department of Justice announced that two American cybersecurity professionals, Ryan Goldberg and Kevin Martin, pleaded guilty to charges related to their involvement with the ALPHV/BlackCat ransomware operation. Goldberg, a former incident response manager, and Martin, a ransomware negotiator, abused their specialized skills and insider knowledge to function as affiliates for the notorious Ransomware-as-a-Service (RaaS) group. They targeted multiple U.S. organizations, primarily in the healthcare sector, throughout 2023. In one instance, they successfully extorted approximately $1.2 million in Bitcoin from a Florida medical device firm. This case serves as a stark reminder of the potent threat posed by malicious insiders who can weaponize their trusted access and technical expertise for personal gain. Both men face a maximum sentence of 20 years in prison.
The case highlights a dangerous convergence of insider threat and the Ransomware-as-a-Service (RaaS) ecosystem. Ryan Goldberg, 40, and Kevin Martin, 36, leveraged their professional backgrounds to effectively carry out attacks. Goldberg's experience at the cybersecurity firm Sygnia gave him deep insight into corporate defenses and incident response playbooks, while Martin's role at DigitalMint provided expertise in ransomware negotiation and cryptocurrency laundering.
As affiliates of ALPHV/BlackCat, they were responsible for gaining access to victim networks, deploying the ransomware, and extorting victims. In exchange, they agreed to pay the ALPHV administrators a 20% cut of the ransom payments. Their victims included:
This demonstrates a clear targeting of organizations with sensitive data and a perceived ability to pay, particularly within the healthcare industry.
While the court documents do not detail the specific initial access vectors, the actors' roles suggest they may have exploited knowledge of common security gaps or used social engineering techniques informed by their professional experience. The core of their operation involved deploying the ALPHV/BlackCat ransomware.
ALPHV/BlackCat TTPs typically include:
T1190), using stolen credentials (T1078), or leveraging compromised remote access services.T1059.001, T1059.003).T1562).T1567.002).T1486).The duo laundered their 80% share of the extorted funds, converting the Bitcoin payments into fiat currency.
The actions of Goldberg and Martin had a significant impact on their victims. The attack on the California doctor's office involved the theft and publication of patient photos on the ALPHV leak site, a severe breach of privacy with lasting consequences for the individuals affected. The $1.2 million extortion from the Florida medical firm represents a substantial financial loss.
More broadly, this case damages the trust between organizations and the cybersecurity professionals they hire to protect them. It underscores the critical need for robust background checks, access controls, and behavioral monitoring for employees in sensitive and privileged roles, especially within the cybersecurity industry itself. The fact that insiders could operate for an extended period in 2023 highlights potential gaps in oversight even within firms dedicated to fighting cybercrime.
Detecting a malicious insider with legitimate access is exceptionally challenging. Detection must focus on behavioral anomalies rather than just unauthorized access.
Detection Strategies:
D3-UBA) Deploy UEBA solutions to baseline normal activity for privileged users like incident responders. Alert on deviations, such as accessing systems outside of normal job duties, unusual data access patterns, or activity during non-business hours.D3-DAM) Regularly audit access logs for critical systems. Scrutinize the activities of privileged accounts, especially those with access to sensitive data or security infrastructure.Preventing insider threats requires a combination of technical controls, administrative policies, and a strong security culture.
D3-UAP) Strictly enforce the principle of least privilege for all employees, including cybersecurity staff. Access to sensitive systems and data should be granted on a need-to-know basis and revoked as soon as it is no longer required.Implementing strict controls and monitoring over privileged accounts to detect anomalous or unauthorized activities.
Establishing a formal insider threat program and training employees to recognize and report suspicious internal activities.
Conducting regular, thorough audits of all privileged user activity to identify patterns that deviate from expected behavior.
Using UEBA and other behavioral analytics to detect when a trusted user's actions deviate significantly from their established baseline.
Mapped D3FEND Techniques:
To counter sophisticated insider threats like the one involving Goldberg and Martin, organizations must move beyond simple access controls and implement User Behavior Analysis (UBA) or broader UEBA platforms. These systems ingest logs from Active Directory, VPNs, file servers, and applications to create a baseline of normal behavior for every user, especially those in privileged roles like IT and cybersecurity. For an incident responder, this baseline would include typical systems accessed, data transfer volumes, and hours of operation. The UEBA system should be configured to alert on high-risk deviations, such as an IR team member accessing financial systems unrelated to an active case, attempting to exfiltrate large volumes of data, or using tools like Mimikatz or Cobalt Strike outside of a sanctioned red team exercise. This provides a critical layer of detection for misuse of legitimate credentials.
This case underscores the absolute necessity of enforcing the Principle of Least Privilege (PoLP), even for trusted cybersecurity staff. Access should be granular and time-bound. For example, an incident responder's elevated privileges should only be active for the duration of a specific, ticketed incident and restricted to only the systems involved in that incident. Implement a Privileged Access Management (PAM) solution to vault credentials and require just-in-time (JIT) access with a documented business justification for every privileged session. This prevents 'standing privileges' that can be abused. Furthermore, implement separation of duties; the individuals who respond to ransomware should not be the same individuals involved in negotiating or authorizing payments, creating a natural check and balance.
To combat the double-extortion tactics used by ALPHV/BlackCat, a robust Data Loss Prevention (DLP) program is essential. DLP solutions can monitor and block the exfiltration of sensitive data. Configure DLP policies to identify and flag large outbound data transfers, especially to personal cloud storage, unsanctioned file-sharing sites, or via encrypted channels to unknown destinations. For highly sensitive data, policies should be set to block such transfers automatically. This technique directly counters the data theft portion of the attack, reducing the attacker's leverage for extortion even if they manage to encrypt files. It is a critical defense against the 'steal then encrypt' model favored by modern ransomware groups.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats