The U.S. Department of Justice (DoJ) announced Thursday the sentencing of two cybersecurity professionals, Ryan Goldberg and Kevin Martin, to four years each in federal prison for their instrumental roles in facilitating sophisticated BlackCat (ALPHV) ransomware attacks throughout 2023. This landmark sentencing underscores the federal government’s escalating efforts to combat cybercrime, particularly schemes orchestrated by individuals with privileged knowledge of cybersecurity defenses. The case serves as a stark warning about the severe consequences awaiting those who betray professional ethics and weaponize their expertise for illicit gain.
Detailed Account of the Sentencing and Charges
Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, of Texas, received their four-year prison terms following their guilty pleas in December 2025. The prosecution detailed their involvement in deploying the notorious BlackCat ransomware against numerous victims across the United States between April and December 2023. Both men, leveraging their professional backgrounds in cybersecurity, collaborated with Angelo Martino, 41, of Florida, who is also facing sentencing in connection with the same conspiracy. The charges against them included conspiracy to commit computer fraud and abuse, and conspiracy to commit money laundering, reflecting the multifaceted nature of their criminal enterprise.
The DoJ’s investigation revealed that Goldberg and Martin, alongside Martino, entered into an agreement with the administrators of the ALPHV/BlackCat ransomware-as-a-service (RaaS) operation. Under this arrangement, the trio was granted access to the BlackCat ransomware tools and its extortion platform. In exchange, they committed to paying the ALPHV BlackCat administrators a 20% share of any ransoms successfully extracted from their victims. This operational model exemplifies the prevalent RaaS ecosystem, where cybercriminal developers provide sophisticated malware and infrastructure to affiliates, who then execute the attacks, sharing a percentage of their illicit proceeds.
The BlackCat Ransomware Ecosystem: A Primer
The ALPHV, more commonly known as BlackCat, emerged as a highly disruptive ransomware variant in late 2021. It quickly gained notoriety for its advanced capabilities, including its unique characteristic of being written in the Rust programming language, which offers performance advantages and cross-platform compatibility. BlackCat operated as a Ransomware-as-a-Service (RaaS) model, a business structure in the cybercriminal underworld where core developers create the ransomware and infrastructure, then recruit affiliates to deploy it against targets. These affiliates, often skilled in network penetration and exploitation, are responsible for identifying vulnerabilities, gaining initial access to victim networks, deploying the ransomware, and negotiating ransom payments.
BlackCat distinguished itself through its double extortion tactics, a common but devastating practice. Beyond encrypting a victim’s data and demanding payment for its decryption, the group would also exfiltrate sensitive information. If the victim refused to pay the ransom for decryption, BlackCat threatened to publish the stolen data on their dark web leak site, adding immense pressure and increasing the likelihood of payment. This tactic significantly raises the stakes for victims, who face not only operational disruption but also severe reputational damage, regulatory fines, and legal liabilities from data breaches.
Before its reported disruption in late 2023 and early 2024 by international law enforcement agencies (most notably Operation Cronos led by the FBI and Europol), BlackCat was estimated to have targeted the computer networks of more than 1,000 victims worldwide. These victims spanned critical infrastructure sectors, including energy, financial services, government, healthcare, manufacturing, and legal services, causing hundreds of millions of dollars in damages globally. The group’s pervasive reach and sophisticated methods made it one of the most significant ransomware threats in recent years.
The Conspiracy Unveiled: Inside the Attack Mechanics
The criminal conspiracy involving Goldberg, Martin, and Martino was meticulously planned and executed. Utilizing their specialized skills, the trio identified vulnerable organizations across the U.S., infiltrated their networks, and deployed the BlackCat ransomware. Once the ransomware encrypted critical systems and data, they initiated ransom demands, often accompanied by threats of data leakage.
In one particularly egregious instance cited by the DoJ, the defendants successfully extorted approximately $1.2 million in Bitcoin from a victim organization. Following the successful payment, Goldberg, Martin, and Martino split their 80% share of the ransom (after remitting the 20% cut to the BlackCat administrators). To obscure their illicit gains and evade detection, they subsequently engaged in sophisticated money laundering operations, converting the cryptocurrency through various channels to cover their tracks. Such actions highlight the intricate financial infrastructure supporting modern cybercrime, where digital currencies play a central role in facilitating anonymous transactions.
Professional Betrayal: Cybersecurity Experts Turned Criminals
Perhaps the most alarming aspect of this case is the professional background of the defendants. As the DoJ statement emphasized, "All three men worked in the cybersecurity industry — meaning that they had special skills and experience in securing computer systems against harm, including the type of harm they themselves were committing against the victims in this case." This revelation underscores a profound breach of trust and professional ethics.

Ryan Goldberg was employed as an incident response manager for Sygnia, a prominent cybersecurity company. His role would have involved helping organizations recover from and prevent cyberattacks, a direct contradiction to his criminal activities. Similarly, Kevin Martin and Angelo Martino worked for DigitalMint, a company that provides cryptocurrency ATMs and related services, implying familiarity with digital asset security and transactions. Their positions granted them unique insights into organizational vulnerabilities, defensive strategies, and incident response protocols, knowledge they twisted to exploit rather than protect.
The "insider threat" posed by such individuals is particularly insidious. They possess not only the technical prowess but also an understanding of corporate defenses, internal processes, and potential weak points that external attackers might struggle to discover. This insider knowledge allowed them to execute attacks with greater precision and potentially bypass security measures designed to thwart typical external threats. Their actions not only caused direct financial and operational damage to their victims but also eroded trust in the cybersecurity industry as a whole, raising concerns about the integrity of those tasked with safeguarding digital assets.
Chronology of Legal Proceedings and Broader Context
The legal journey leading to Thursday’s sentencing began with the active phase of the ransomware attacks between April and December 2023. Federal investigators, likely in collaboration with cybersecurity firms and international partners, meticulously tracked the digital footprints of the BlackCat operations and the specific activities of Goldberg, Martin, and Martino.
By December 2025, the weight of evidence led Goldberg and Martin to plead guilty to their crimes, acknowledging their culpability in the elaborate scheme. Their sentencing on May 1, 2026, marks a significant milestone in the prosecution of this particular cell within the BlackCat ecosystem.
Just a week prior to Goldberg and Martin’s sentencing, their co-conspirator, Angelo Martino, also pleaded guilty to similar charges. Martino’s case revealed an additional layer of deception: he allegedly abused his role as a ransomware negotiator. In this capacity, he would have been privy to confidential information about victim organizations, including their insurance policy limits. The DoJ alleges that Martino shared this sensitive intelligence with the BlackCat operators, allowing them to tailor ransom demands to maximize payouts, further exploiting the victims’ vulnerabilities. Martino is scheduled to be sentenced in July 2026, and given the aggravating circumstances of his dual role, his sentence could reflect the enhanced severity of his actions.
The disruption of the broader BlackCat RaaS scheme, notably through "Operation Cronos" in late 2023 and early 2024, provides crucial context. This international law enforcement effort involved seizing BlackCat’s dark web infrastructure, including its leak site and payment portals, and releasing decryption tools to victims. While the group attempted to resurface, the coordinated global action significantly crippled its operations. The successful prosecution of individuals like Goldberg, Martin, and Martino demonstrates that even if the overarching RaaS infrastructure is disrupted, the affiliates who carried out the attacks remain targets for justice.
Statements from Authorities and Broader Implications
U.S. Attorney Jason A. Reding Quiñones for the Southern District of Florida, whose office played a pivotal role in the prosecution, articulated the gravity of the defendants’ actions: "These defendants exploited specialized cybersecurity knowledge not to protect victims, but to extort them. They used ransomware to lock down critical systems, steal sensitive data, and pressure American businesses into paying to regain access to their own information." His statement underscores the betrayal of professional trust and the direct harm inflicted upon American businesses.
The DoJ’s consistent messaging in these cases highlights a zero-tolerance policy for cybercriminals, especially those who use their expertise to facilitate such destructive attacks. The department emphasized that the sentencings serve as a deterrent and demonstrate the commitment of federal law enforcement to dismantle ransomware operations from all angles – targeting both the developers and the affiliates who deploy the malware.
Implications for the Cybersecurity Industry and Law Enforcement
The sentencing of Ryan Goldberg and Kevin Martin carries significant implications across several domains:
- Deterrence Effect: The four-year prison sentences send a strong message to potential cybercriminals, particularly those with cybersecurity backgrounds, that leveraging their skills for illegal activities will result in severe penalties. This tangible consequence could act as a deterrent, prompting individuals to reconsider criminal enterprises.
- Erosion of Trust and Ethical Concerns: The involvement of cybersecurity professionals in these attacks raises uncomfortable questions about trust within the industry. Companies hiring cybersecurity experts must redouble their efforts in background checks, ethical training, and internal monitoring to mitigate the insider threat. This case may prompt a broader discussion on professional accountability and the ethical frameworks governing the cybersecurity profession.
- Challenges in Combating RaaS Models: While the BlackCat RaaS scheme has been disrupted, the underlying model persists. Law enforcement agencies face an ongoing challenge in identifying and prosecuting affiliates who operate under various RaaS banners. This case demonstrates a successful strategy of tracing the financial flows and digital footprints to identify and apprehend the human operators behind the keyboard.
- Importance of Inter-Agency and International Cooperation: The success of this investigation and prosecution likely involved extensive cooperation between federal agencies like the FBI, DoJ, and potentially international partners, given the global nature of BlackCat’s operations. Such collaborative efforts are crucial in dismantling sophisticated cybercriminal networks that often transcend national borders.
- Focus on Money Laundering: The emphasis on money laundering charges alongside computer fraud highlights the DoJ’s strategy to attack cybercrime from multiple angles. Disrupting the financial infrastructure that enables cybercriminals to profit is as critical as stopping the attacks themselves.
This case serves as a poignant reminder that the battle against cybercrime is multifaceted, involving not just external threats but also the potential for betrayal from within. As technology advances and the digital landscape evolves, the integrity of cybersecurity professionals remains paramount, and law enforcement’s resolve to pursue those who abuse that trust continues to strengthen. The sentences handed down to Goldberg and Martin are a testament to the ongoing commitment to bring justice to victims and uphold the rule of law in the digital age.
