Key Facts
- ✓ Two former employees at cybersecurity firms pleaded guilty to carrying out ransomware attacks in 2023.
- ✓ The Department of Justice announced the guilty pleas of 40-year-old Ryan Goldberg and 36-year-old Kevin Martin.
- ✓ The pair extorted $1.2 million in Bitcoin from a medical device company and targeted several others.
- ✓ The attacks involved using ALPHV / BlackCat ransomware to encrypt and steal data.
- ✓ Martin and an unnamed co-conspirator previously worked as ransomware negotiators.
Quick Summary
Two former employees at cybersecurity firms have pleaded guilty to carrying out a series of ransomware attacks in 2023. The Department of Justice announced the guilty pleas on Tuesday, identifying the individuals as 40-year-old Ryan Goldberg and 36-year-old Kevin Martin.
The pair extorted $1.2 million in Bitcoin from a medical device company and targeted several others. Goldberg, Martin, and an unnamed co-conspirator were indicted for the attacks in October. The operation involved using ALPHV / BlackCat ransomware to encrypt and steal data from victims.
Reports indicate that Martin and the third conspirator worked as ransomware negotiators prior to the attacks. The guilty pleas highlight a growing concern regarding insider threats within the cybersecurity sector.
The Guilty Pleas
The Department of Justice announced on Tuesday that two former cybersecurity employees have pleaded guilty to their roles in a ransomware conspiracy. The defendants, Ryan Goldberg and Kevin Martin, were charged with orchestrating attacks against multiple organizations in 2023.
Goldberg, 40, and Martin, 36, admitted to their involvement in the scheme that targeted a medical device company. The indictment, returned in October, details how the trio utilized sophisticated malware to compromise corporate networks.
The legal proceedings are moving forward as the government continues to investigate the full scope of the damage caused by these breaches. The guilty pleas represent a formal admission of guilt regarding the charges filed against them.
Details of the Attacks 🛡️
The attacks centered on the use of ALPHV / BlackCat ransomware, a notorious strain of malware used to lock users out of their own systems. The conspirators used this tool to encrypt data and steal sensitive information from their victims.
Once the data was compromised, the group demanded payment to restore access. In the case of the medical device company, the attackers successfully extorted $1.2 million in Bitcoin.
The operation was not limited to a single victim. The indictment reveals that Goldberg, Martin, and their co-conspirator targeted several other entities, suggesting a calculated effort to maximize financial gain through digital extortion.
Background of the Defendants
The case highlights a disturbing trend of individuals with inside knowledge of cybersecurity defenses turning to crime. Ryan Goldberg and Kevin Martin were formerly employed at cybersecurity firms.
Specifically, reports indicate that Martin and the unnamed third conspirator worked as ransomware negotiators. This role typically involves communicating with threat actors on behalf of victims to facilitate payment and data recovery.
Their background in the security industry likely provided them with the technical expertise and insight necessary to execute these complex attacks. The indictment was returned in October, formally charging the three individuals with conspiracy to commit fraud and related cybercrimes.
Conclusion
The guilty pleas entered by Ryan Goldberg and Kevin Martin signal a significant step in the prosecution of cybercrimes involving insider threats. By admitting to their roles in the 2023 ransomware attacks, the defendants acknowledge their responsibility for extorting millions of dollars and compromising critical data.
The Department of Justice continues to pursue justice for the victims affected by the use of ALPHV / BlackCat ransomware. This case serves as a stark reminder of the vulnerabilities that can exist even within the ranks of those hired to protect digital infrastructure.




