Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

872+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Former Incident Responders Sentenced to 4 Years for Ransomware Attacks on Clients
Former Incident Responders Sentenced to 4 Years for Ransomware Attacks on Clients
NEWS

Former Incident Responders Sentenced to 4 Years for Ransomware Attacks on Clients

Ryan Goldberg and Kevin Martin, who worked as incident responders, were sentenced to four years in federal prison after using their trusted access to attack five companies and extort nearly $1.3 million from one victim in 2023.

Dylan H.

News Desk

April 30, 2026
3 min read

Two former cybersecurity professionals who turned their expertise against the very clients they were hired to protect have been sentenced to four years in federal prison. Ryan Goldberg and Kevin Martin, who previously worked as incident responders, carried out ransomware attacks against five companies in 2023 and extorted nearly $1.3 million from at least one of their victims.

From Defenders to Attackers

Incident responders occupy a uniquely trusted position in cybersecurity. Organizations hire them in moments of crisis — after a breach, during an active intrusion, or when systems have been compromised — and grant them deep access to internal networks, sensitive data, and security infrastructure. Goldberg and Martin exploited exactly this trust.

Rather than use their specialized knowledge solely to help clients recover, the two leveraged their insider access and technical expertise to conduct their own ransomware campaigns. The scheme targeted five separate organizations, making it a systematic abuse of their professional standing rather than an isolated incident.

The Attacks and Extortion

The attacks occurred in 2023 while Goldberg and Martin were working in the incident response field. Prosecutors confirmed that the pair deployed ransomware to encrypt victim systems and then demanded payment in exchange for decryption keys. At least one victim paid approximately $1.3 million to regain access to their data.

The combination of insider knowledge — including how organizations structure their defenses, where sensitive data resides, and how backup systems are configured — gave the attackers a significant advantage over typical ransomware operators who must first discover this information through reconnaissance.

Sentencing and Charges

Both Goldberg and Kevin Martin were sentenced to four years in federal prison. The case highlights an uncomfortable reality in the cybersecurity industry: the very skills and access required to defend organizations can be weaponized against them by individuals willing to cross ethical and legal lines.

The prosecutions also underscore the growing attention law enforcement is paying to cybersecurity insiders. As organizations grant incident responders and security consultants sweeping access privileges, the legal consequences for abuse of that access are becoming increasingly severe.

Industry Implications

The case raises important questions about background screening, credential management, and access controls for external cybersecurity contractors. Key takeaways for organizations that hire incident responders and security consultants include:

  • Limit access scope — Grant only the minimum access required to complete incident response tasks, and revoke it promptly when the engagement concludes
  • Log everything — Maintain detailed audit logs of all actions taken by external responders on internal systems
  • Segment sensitive data — Ensure incident responders do not have automatic access to all critical systems or backup infrastructure
  • Verify credentials — Conduct thorough background checks on all cybersecurity contractors with privileged access
  • Post-engagement review — After any incident response engagement, audit what was accessed and whether any anomalous activity occurred

A Growing Pattern

This case follows a broader pattern of cybersecurity professionals facing criminal charges for misusing their skills. Security researchers, penetration testers, and now incident responders have all appeared in court for conduct that crossed from authorized security work into criminal territory. For the industry, these cases serve as a reminder that technical expertise carries both opportunity and responsibility — and that law enforcement has developed the capabilities to investigate and prosecute offenses by technically sophisticated defendants.

The four-year sentences handed to Goldberg and Martin represent one of the more significant penalties imposed on cybersecurity insiders who have turned their knowledge against the organizations that trusted them.

#Ransomware#Cybercrime#Sentencing#Insider Threat

Related Articles

Sandhills Medical Says Ransomware Breach Affects 170,000

Healthcare organization took nearly one year to publicly disclose a data breach after being targeted by Inc Ransom ransomware, with approximately 170,000 patients now being notified.

3 min read

Vect 2.0 Ransomware Acts as Wiper Thanks to Design Error

The emerging Vect 2.0 ransomware — deployed against TeamPCP supply chain attack victims — permanently destroys files larger than 131KB due to a critical design flaw, making decryption impossible even with a paid key.

5 min read

VECT 2.0 Ransomware Irreversibly Destroys Files Over 131KB on Windows, Linux, ESXi

Threat hunters warn that VECT 2.0 ransomware contains a critical flaw in its encryption implementation that acts more like a wiper for files over 131KB across Windows, Linux, and ESXi variants, rendering recovery impossible even after paying the ransom.

8 min read
Back to all News