Vb65obs0.putty PDocsCybersecurity
Related
How a Popular AI Library Became a Weapon for Data TheftLatest Linux Kernel Releases: What You Need to KnowMicrosoft Shatters Record with 167 Patches in April 2026 Update, Including Actively Exploited Zero-DaysNew Python Backdoor 'DEEP#DOOR' Exploits Tunneling Service to Breach Browser and Cloud CredentialsDo Babies Have a Sense of Beauty? How It Develops and Changes with Age7 Things You Need to Know About the Stealthy Credential Theft in Open Source Package element-dataOutpacing AI-Driven Attacks: A Guide to Automated Exposure ValidationFirefox 150 Patches Record 271 Zero-Day Vulnerabilities Discovered by AI

U.S. Court Sentences Two IT Security Experts to 4 Years for Aiding BlackCat Ransomware Attacks

Last updated: 2026-05-02 01:45:39 · Cybersecurity

U.S. Court Sentences Two IT Security Experts to 4 Years for Aiding BlackCat Ransomware Attacks

The U.S. Department of Justice (DoJ) on Thursday announced that two cybersecurity professionals have been sentenced to four years in federal prison for their role in facilitating BlackCat (ALPHV) ransomware attacks during 2023.

U.S. Court Sentences Two IT Security Experts to 4 Years for Aiding BlackCat Ransomware Attacks
Source: feeds.feedburner.com

Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, of Texas, admitted to deploying the ransomware against multiple U.S.-based victims between April and December 2023. The sentencing marks one of the first criminal prosecutions of technical facilitators in a major ransomware operation.

Sentencing Details

Goldberg and Martin each received a 48-month prison term, followed by three years of supervised release. The court also ordered them to pay $1.2 million in restitution to affected organizations.

According to court documents, the duo leveraged their IT security expertise to gain unauthorized access to victim networks, then deployed BlackCat's encryption payload. They then demanded ransoms ranging from $50,000 to $2 million.

“These defendants used their professional skills to betray the trust placed in them,” said Acting U.S. Attorney Joshua S. Levy. “Today’s sentence sends a clear message: Cybersecurity experts who become cybercriminals will face severe consequences.” (See what this means for the industry)

Background: BlackCat Ransomware as a Service

BlackCat, also known as ALPHV, is a ransomware-as-a-service (RaaS) operation that first emerged in late 2021. It targets large enterprises and critical infrastructure sectors, including healthcare, energy, and finance.

The group is notorious for its double extortion tactics: encrypting data while simultaneously stealing sensitive information to pressure victims into paying. In 2023, BlackCat affiliates claimed over 100 victims in the United States alone.

U.S. Court Sentences Two IT Security Experts to 4 Years for Aiding BlackCat Ransomware Attacks
Source: feeds.feedburner.com

Goldberg and Martin were not the core developers of BlackCat but served as affiliates—independent contractors who use the ransomware toolkit to carry out attacks in exchange for a cut of the ransom payments. Their technical background allowed them to bypass typical cybersecurity defenses.

What This Means

The sentencing signals a shift in law enforcement strategy: targeting not just ransomware masterminds but also the middlemen who provide technical access. This could deter other cybersecurity professionals from crossing ethical lines for profit.

Industry experts caution, however, that the penalty must be weighed against the global ransomware epidemic. “One prosecution won’t stop the flood, but it creates fear among facilitators,” said Dr. Emily Zhao, a cybersecurity researcher at MITRE. “If every affiliate knew they could face four years, many might reconsider.” (See sentencing details)

Organizations are now urged to vet third-party security contractors more rigorously and monitor for insider threats. The DoJ confirmed that the investigation into other BlackCat affiliates remains ongoing.

Key Facts at a Glance

  • Sentences: 48 months prison + 3 years supervised release
  • Restitution: $1.2 million to victims
  • Role: Deployed BlackCat ransomware after initial network access
  • Victim Profile: Multiple U.S. organizations (2023)
  • Legal Basis: Conspiracy to commit computer fraud and wire fraud