Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Former Cybersecurity Incident Responders Plead Guilty to
Former Cybersecurity Incident Responders Plead Guilty to
NEWS

Former Cybersecurity Incident Responders Plead Guilty to

An incident response manager and a ransomware negotiator face up to 20 years after admitting to conducting BlackCat (ALPHV) ransomware attacks against...

Dylan H.

News Desk

March 1, 2026
2 min read

The Fox Guarding the Henhouse

In one of the most striking insider-threat cases in recent memory, two American cybersecurity professionals are awaiting sentencing on March 12, 2026, after admitting to operating as affiliates of the BlackCat (ALPHV) ransomware gang while simultaneously holding positions at legitimate cybersecurity firms.

DefendantAgeRoleEmployer
Ryan Goldberg40, GeorgiaIncident Response ManagerSygnia
Kevin Martin36, TexasRansomware NegotiatorDigitalMint

Attacking the Organizations They Were Trained to Defend

Between April and December 2023, Goldberg and Martin — along with an unnamed co-conspirator also employed at DigitalMint — conducted ransomware attacks against five U.S. companies. Three of the five victims were healthcare organizations, a sector frequently targeted due to the critical nature of patient care and the urgency to restore operations.

The attackers agreed to pay BlackCat administrators a 20% share of any ransoms collected in exchange for access to the ransomware toolkit and the group's extortion platform.

Their roles at legitimate firms gave them deep insight into:

  • Common security postures and defensive gaps
  • Incident response playbooks and procedures
  • Ransomware negotiation tactics and payment processes
  • How organizations prioritize and fund ransom payments

Guilty Pleas and Sentencing

Both defendants entered guilty pleas on December 18 in the U.S. District Court for the Southern District of Florida to one count of conspiracy to obstruct, delay, or affect commerce by extortion.

Each defendant faces:

  • Up to 20 years imprisonment
  • 3 years of supervised release
  • Fine of up to $250,000 or twice the gross gain or loss of the offense

Lessons for the Industry

The case serves as a stark reminder that insider threats can emerge from even the most trusted positions within the cybersecurity industry. Organizations should consider:

  1. Background checks with ongoing monitoring for employees with privileged access
  2. Separation of duties in incident response and negotiation workflows
  3. Behavioral analytics on employee network activity, especially for those with knowledge of defensive tools
  4. Whistleblower programs to encourage reporting of suspicious colleague behavior
  5. Vendor vetting for third-party incident response and negotiation firms

The DOJ emphasized that the case demonstrates the government's commitment to prosecuting cybercriminals regardless of their professional backgrounds.

#Ransomware#Insider Threat#BlackCat#ALPHV#Healthcare#Law Enforcement#DOJ

Related Articles

Phobos Ransomware Admin Pleads Guilty — 1,000+ Victims

Evgenii Ptitsyn, 43, a Russian national who administered the Phobos ransomware-as-a-service operation, pleaded guilty to wire fraud conspiracy in the U.S....

7 min read

Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

Ilya Angelov, co-leader of the TA551/Mario Kart cybercrime group, was sentenced to two years in prison for operating a phishing botnet that sent 700,000...

4 min read

Russian Hacker Who Helped Yanluowang Ransomware Gang Gets Nearly 7-Year Prison Sentence

Aleksei Volkov, a Russian initial access broker who sold unauthorized access to U.S. companies for the Yanluowang ransomware group, has been sentenced to...

3 min read
Back to all News