Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Home/CyberSecurity News/US Cyber Pros Plead Guilty as ALPHV/Black Security
CyberSecurity News

US Cyber Pros Plead Guilty as ALPHV/Black Security

Marcus Rodriguez
Marcus Rodriguez
January 1, 2026 One Min Read
15 0

Cyber Pros Plead Guilty as ALPHV/Black Security

This is a pretty wild story, actually. A federal court down in the Southern District of Florida just accepted guilty pleas from two cybersecurity professionals. And here’s the twist: instead of using their expertise to *stop* ransomware attacks, they were actually using those very skills to *conduct* them. Talk about a betrayal of trust, right?

Ryan Goldberg, 40, from Georgia, and Kevin Martin, 36, from Texas, pleaded guilty to conspiracy to commit extortion through ransomware operations.

Between April and December 2023, Goldberg and Martin, along with a third conspirator, deployed the ALPHV BlackCat ransomware against multiple U.S. victims.

The defendants leveraged their knowledge of computer security to exploit vulnerable systems rather than protect them.

They agreed to pay ALPHV BlackCat administrators 20% of all ransom payments in exchange for access to the ransomware and the group’s extortion platform.

After successfully extorting one victim for approximately $1.2 million in Bitcoin, the three men split their 80% share of the ransom and laundered the proceeds through various channels.

This case demonstrates a troubling trend where insiders weaponize their technical skills for criminal purposes.

ALPHV BlackCat operates as a ransomware-as-a-service model, meaning developers maintain the malware and infrastructure. At the same time, affiliates identify and attack high-value targets.

The group has targeted over 1,000 victims worldwide, causing extensive financial damage across industries. The Justice Department has prioritized disrupting ALPHV BlackCat operations.

In December 2023, the FBI developed a decryption tool that helped hundreds of victims restore their systems without paying ransoms, saving approximately $99 million. The FBI also seized several websites operated by the criminal group.

Goldberg and Martin each face up to 20 years in prison for conspiracy to commit extortion. They are scheduled to be sentenced on March 12, 2026.

The investigation was led by the FBI’s Miami Field Office, with assistance from the U.S. Secret Service, underscoring a multi-agency approach to combating ransomware threats.

This case underscores a critical security concern: trusted cybersecurity professionals can pose a threat when compromised.

Organizations must implement stringent background checks, monitoring, and ethical training for security personnel.

The guilty pleas send a clear message that domestic ransomware operators will be prosecuted and held accountable, regardless of their technical expertise or industry position.

Tags:

AttackBitcoinCybersecurityExploitMalwareransomwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Adidas Data Breach: Customers’ Personal Information Exposed

Next Post

Threat Actors Manipulate LLMs for Automated Exploits

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FBI & CISA Release Zero Trust Guide for Released Principles
April 30, 2026
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us