Fraud Management & Cybercrime,
Ransomware
U.S. Cybersecurity Professionals Plead Guilty to BlackCat Ransomware Scheme Targeting Medical Firms

In a significant development within the cybersecurity landscape, two professionals admitted guilt in a Miami federal court after being implicated as affiliates of the notorious BlackCat ransomware group. Ryan Goldberg, 40, from Georgia, and Kevin Martin, 36, from Texas, both utilized advanced malware tactics to extort multiple U.S. organizations, including three in the healthcare sector.
The indictment suggests that Goldberg and Martin collaborated with a third accomplice based in Land O’Lakes, Florida, who is believed to have played a role in the attacks. Prosecutors revealed that all three were employed in cybersecurity firms while conducting their illicit activities. Martin and the unnamed co-conspirator functioned as ransomware negotiators for DigitalMint, while Goldberg held the position of incident response manager at Sygnia.
Assistant Attorney General A. Tysen Duva condemned their actions, emphasizing that their expertise in cybersecurity should have been leveraged to thwart such crimes rather than commit them. On December 18, both men pleaded guilty to conspiring to obstruct commerce through extortion—a charge carrying a maximum penalty of 20 years in prison, alongside hefty financial penalties.
The duo’s guilty pleas come as a stark reminder that the threat landscape is not confined to external actors; it can emanate from within established organizations. Their activities included employing BlackCat ransomware, also known as Alphv, against various targets from April 2023 to December 2023, which resulted in at least $1.2 million in ransom—a substantial portion derived from a medical device manufacturer.
According to the MITRE ATT&CK framework, several adversary tactics and techniques likely underpin their actions, including initial access—through phishing or exploiting vulnerabilities in such medical technologies. Furthermore, persistence and privilege escalation techniques may have enabled them to maintain control over compromised systems, thus facilitating extended extortion efforts.
As part of the plea agreement, counts involving intentional damage to protected computer systems were dismissed, yet the severity of their offense is underscored by the implications for patients and healthcare providers alike. The indictment underscores that cybersecurity professionals must not only defend against these threats but also hold themselves to ethical standards that preclude collusion with adversaries.
Goldberg’s attempt to flee the U.S., highlighted by a trip to Paris shortly after an FBI interview, underscores the gravity of the investigation. Though he returned to the U.S. shortly after, the incident illustrates the lengths to which individuals may go to evade accountability.
The response from their former employers was prompt, with both DigitalMint and Sygnia asserting that they were unaware of the illegal activities and have since cooperated fully with law enforcement. Their statements reaffirm the importance of maintaining robust internal oversight mechanisms to detect illicit practices among personnel.
Implications for the Cybersecurity Industry
As the BlackCat operation continues to thrive, having amassed an expansive portfolio of victims and generating significant ransom amounts, organizations must remain vigilant. The ransomware-as-a-service model, in which affiliates access sophisticated tools for conducting attacks, indicates a systemic risk affecting various sectors. The FBI’s recent actions—including releasing decryption tools for certain victims—reveal an ongoing commitment to counter these sophisticated adversaries.