Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Attackers Abuse Amazon SES for Authenticated Ph Send Phishing
May 5, 2026
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Home/Threats/DOJ Imprisons Two for ALPHV Black Sentences Americans
Threats

DOJ Imprisons Two for ALPHV Black Sentences Americans

On April 30, 2026, two American cybersecurity professionals were each sentenced to four years in federal prison. The Department of Justice confirmed these convictions for their role in ransomware...

Marcus Rodriguez
Marcus Rodriguez
May 4, 2026 3 Min Read
0 0

On April 30, 2026, two American cybersecurity professionals were each sentenced to four years in federal prison. The Department of Justice confirmed these convictions for their role in ransomware attacks that targeted multiple U.S. businesses. These individuals were found guilty of deploying the ALPHV BlackCat ransomware, according to an official Department of Justice announcement.

The U.S. Department of Justice confirmed the sentencing of Ryan Goldberg, 40, of Georgia, and Kevin Martin, 36, of Texas, both of whom had pleaded guilty in December 2025 to conspiracy charges related to extortion through ransomware activity targeting American companies.

ALPHV BlackCat first emerged as a serious threat around late 2021 and quickly became one of the most sophisticated ransomware families tracked by global security agencies.

Written in the Rust programming language, it was designed to run across multiple operating systems, including Windows and Linux, which made it highly adaptable to different environments.

The ransomware spread through several attack vectors such as stolen credentials, phishing emails, and exposed remote desktop protocol services.

Once inside a target network, it moved laterally, disabled security tools, and encrypted critical files before demanding payment in cryptocurrency.

Its operators ran a ransomware-as-a-service platform that allowed outside affiliates to use the malware in exchange for a share of the ransom proceeds.

The scale of destruction caused by this ransomware group was significant and far-reaching. Court documents confirmed that ALPHV BlackCat targeted more than 1,000 victims worldwide, including businesses providing medical and engineering services across the United States.

In one case, patient data from a doctor’s office was leaked after the victim did not comply with the ransom demand. Goldberg and Martin, along with co-conspirator Angelo Martino, 41, of Florida, successfully extorted approximately $1.2 million in Bitcoin from one victim alone, with the three men splitting their 80 percent share of the proceeds after laundering the funds through various means.

Justice.gov analysts and investigators from the FBI Miami Field Office identified and fully documented the scope of this criminal scheme, noting that all three defendants held active professional cybersecurity experience and used it to attack the very type of organizations they had been trained to protect.

The FBI’s investigation tracked Goldberg across 10 countries after he attempted to flee abroad to avoid prosecution, a clear demonstration of how far U.S. law enforcement will go to hold cybercriminals fully accountable for their actions.

One key aspect worth examining closely in this case is how the defendants leveraged the ransomware-as-a-service model to reduce their own exposure while maximizing financial gain.

In this setup, the core ALPHV BlackCat developers maintained the malware code, updated its capabilities, and managed backend infrastructure that included negotiation portals and data leak sites.

Affiliates such as Goldberg and Martin handled the actual intrusion work, identifying targets and deploying the ransomware in the field. After a victim paid, developers kept 20 percent and affiliates retained 80 percent of the ransom.

This clear division of labor made attribution harder for investigators since those conducting the attacks were entirely separate from those building the tools.

What further complicated this case was the insider dimension linked to Martino, who allegedly used his position as a ransomware negotiator for victims to pass confidential victim information directly to threat actors, allowing attackers to increase ransom demands in a targeted and calculated way. His sentencing hearing is currently scheduled for July 9, 2026.

The FBI had previously moved against ALPHV BlackCat in December 2023 by developing a decryption tool shared with hundreds of victims globally, saving approximately $99 million in ransom payments and seizing several websites the group had operated.

Organizations that believe they may be ransomware victims are advised to contact their local FBI field office or submit a report at ic3.gov.

Any individual holding information about ALPHV BlackCat activities may also be eligible for rewards through the Department of State’s Rewards for Justice program.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwarephishingransomwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

SAP npm Packages Steal GitHub, Cloud, Attackers Weaponize

Next Post

New xlabs_v1 Botnet Targets Minecraft Servers Through ADB-Exposed

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Android Zero-Click Flaw Grants Remote Shell Access
May 5, 2026
pnpm 11 Turns On Minimum Release Age by Default to Reduce npm
May 5, 2026
Microsoft Edge Vulnerability: Passwords in Cleartext Memory
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us