Four-Year Sentence for Cybersecurity Experts Who Became Ransomware Hackers

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Sentencing of Ex-Cybersecurity Experts for Ransomware Engagements

Two former cybersecurity specialists have been sentenced to four years in prison after leveraging their insider expertise to orchestrate ransomware attacks.

Key Highlights:

  • Two professionals from the U.S. cybersecurity sector were sentenced to four years each for their participation in BlackCat ransomware activities.
  • The individuals, an incident responder and a ransom negotiator, were trusted insiders in the industry.
  • They operated as affiliates within a ransomware-as-a-service (RaaS) framework, splitting profits with the notorious ALPHV/BlackCat syndicate.
  • At least one organisation suffered a $1.2 million loss in Bitcoin, which was subsequently laundered.
  • A third individual involved is pending sentencing

Transition from Guardian to Aggressor

The U.S. Department of Justice has revealed that Ryan Goldberg, age 40, and Kevin Martin, age 36, received four-year prison sentences for their involvement in ransomware activities executed in 2023.

Unlike typical criminals, these two were entrenched within the cybersecurity realm, playing crucial roles designed to combat such threats.

Goldberg was an incident response manager, whereas Martin excelled as a ransomware negotiator, placing them in direct dialogue with victims during critical breaches.

In a twist of fate, they chose to exploit that very knowledge for malicious aims.

Crucially, court documents illustrate that Goldberg and Martin allied with the infamous ALPHV/BlackCat ransomware group, recognised as one of the most formidable operations in the RaaS domain.

Their collaboration adhered to a well-trodden RaaS blueprint:

  • They secured access to the ransomware’s infrastructure and platforms.
  • As compensation, they relinquished 20% of the ransom gains to the operators.
  • They executed the intrusions, encryption processes, and extortion.

From April to December 2023, the duo targeted various U.S. enterprises across multiple sectors, successfully extorting $1.2 million in Bitcoin from at least one of their victims, which they subsequently laundered.

The broader ALPHV/BlackCat collective has reportedly attacked over 1,000 victims worldwide, solidifying its reputation as one of the most detrimental ransomware entities in recent history, as stated by the U.S. Department of Justice in a press release:

ALPHV/BlackCat has targeted the computer networks of more than 1,000 victims globally, employing a ransomware-as-a-service model in which developers created and maintained the malware and infrastructure.

Affiliates were tasked with identifying and attacking high-value targets, subsequently sharing the extorted ransom.

Breach of Trust at a Critical Juncture

What exacerbates this situation is the attackers’ access to sensitive information. Angelo Martino, 41, from Florida, a co-conspirator still awaiting sentencing, allegedly utilised his position as a ransomware negotiator to divulge confidential information to the attackers, amplifying pressure on victims to capitulate.

Reporting from the previous month revealed that between April and November 2023, Martino negotiated for several ransomware victims while allegedly leaking vital data, including insurance limits and internal negotiation tactics, to the attackers.

Assistant Attorney General A. Tysen Duva of the Justice Department’s Criminal Division articulated the gravity of this betrayal:

The individuals in question were entrusted as cybersecurity professionals, meant to safeguard organisations.

Instead, they manipulated their advanced capabilities for personal gain. This transcends mere cybercrime—it’s a profound breach of trust within the cybersecurity community itself.

This intelligence presumably enabled the group to fine-tune their extortion demands, leading to heightened ransom amounts. In some instances, Martino reportedly took part in deploying malware into victim networks.

Plea Agreements

In December 2025, both Goldberg and Martin submitted guilty pleas to one count of conspiracy to obstruct, delay, or influence commerce through extortion.

Last month, co-conspirator Angelo Martino also admitted guilt regarding his involvement in the conspiracy.

The DOJ remarked, “In addition to conspiring with Goldberg and Martin in launching ransomware assaults, Martino exploited his negotiator role by sharing sensitive victim information with threat actors to enhance the ransom’s value.”

Wooden letter tiles on a wooden surface spell out the word LAUNCH with a blurred green and white background.

Due to his more profound entanglement in the scheme, Martino may face a sterner sentence, with his hearing scheduled for July 9.

This sentencing is part of broader U.S. initiatives to dismantle BlackCat operations. In 2023, the FBI confiscated crucial infrastructure and introduced a decryption tool that facilitated the recovery of numerous systems and averted an estimated $99 million in ransom payments.

Source link: Bitdefender.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Neil Hemmings

I'm Neil Hemmings from Anaheim, CA, with an Associate of Science in Computer Science from Diablo Valley College. As Senior Tech Associate and Content Manager at RS Web Solutions, I write about AI, gadgets, cybersecurity, and apps – sharing hands-on reviews, tutorials, and practical tech insights.
Share the Love
Related News Worth Reading