DOJ: Former Incident Responders Accused of Aiding BlackCat Ransomware

CyberSecureFox 🦊

U.S. federal prosecutors have charged three individuals — including two former cybersecurity professionals — with allegedly compromising the networks of five American companies and participating in a multimillion‑dollar BlackCat (ALPHV) ransomware scheme. According to court filings, the defendants demanded cryptocurrency ransoms ranging from $300,000 to $10 million, with at least one confirmed payment of $1.27 million following a May 2023 attack.

Charges and alleged role in the ransomware operation

Who was charged and potential penalties

The indictment names 28‑year‑old Kevin Tyler Martin of Texas, 33‑year‑old Ryan Clifford Goldberg of Georgia, and an unnamed co‑conspirator. They face counts of conspiracy to interfere with interstate commerce by extortion, interference with commerce, and intentional damage to protected computers. If convicted on all counts, the maximum combined penalty could reach up to 50 years in prison.

Professional backgrounds and alleged tactics

Per the complaint and media reports, Martin and the unnamed accomplice previously worked at DigitalMint, a firm known for facilitating ransomware negotiations, while Goldberg led incident response at Sygnia. Investigators allege the trio operated as affiliates within the BlackCat ecosystem — obtaining initial access, stealing data, and deploying the encryptor to coerce payment through “double extortion.”

Victim profile and ransom demands

Court documents identify affected organizations across healthcare, pharmaceuticals, engineering, and aerospace: a Tampa‑based medical device manufacturer, a Maryland pharmaceutical firm, an engineering company and a medical clinic in California, and a Virginia drone developer. Demands varied between $300,000 and $10 million. The only confirmed payment cited in filings is a $1.27 million transfer by the Florida manufacturer after the May 2023 intrusion.

BlackCat/ALPHV: how the RaaS model scales attacks

BlackCat (ALPHV) is a major ransomware‑as‑a‑service (RaaS) operation in which core developers maintain tooling and infrastructure, while affiliates conduct intrusions and share proceeds. The FBI has attributed 1,000+ attacks and at least $300 million in ransom payments to ALPHV‑linked activity over its first two years. In December 2023, U.S. authorities announced a disruption of the group’s infrastructure and released a decryptor to aid victims, reflecting ongoing pressure on RaaS ecosystems (see DOJ; CISA StopRansomware).

Typical intrusion chain and negotiation dynamics

While the indictment does not enumerate TTPs, campaigns of this type typically follow a familiar pattern: initial access via phishing or exploitation of exposed services (VPNs, remote access, web apps), privilege escalation and lateral movement, data exfiltration prior to encryption (the “double extortion” lever), and negotiations conducted over anonymized channels. Payment demands are denominated in cryptocurrency, with deadlines and escalating threats of public data leakage.

Risks to enterprises and actionable defense measures

The case illustrates cross‑sector exposure — from clinics and manufacturers to aerospace startups — and the risk posed when threat actors possess insider‑level knowledge of incident response and negotiation playbooks. Organizations should emphasize security fundamentals and resilience:

Identity and access: enforce MFA (preferably phishing‑resistant FIDO2/WebAuthn), least‑privilege access, secure password policies, and conditional access; harden and monitor RDP and VPNs.

Vulnerability and exposure management: aggressively patch internet‑facing services; minimize attack surface with asset inventories, rapid mitigation of high‑severity CVEs, and configuration baselines.

Detection and response: deploy EDR/XDR with behavioral analytics; centralize logs in a SIEM; set high‑fidelity alerts for credential abuse, suspicious PowerShell, and data staging.

Segmentation and backups: segment critical OT/IT assets; maintain offline or immutable backups and routinely test restores; restrict backup credentials and network paths.

Governance and legal readiness: codify ransomware response policies, including engagement criteria for law enforcement and external counsel; consider OFAC guidance on sanctions risk related to ransom payments; preserve forensic artifacts to accelerate containment and recovery (see FBI IC3 2023).

Preparedness: exercises, roles, and communication

Tabletop exercises, clearly defined roles, and pre‑approved communication channels reduce dwell time and decision friction during an incident. Maintain out‑of‑band contact methods, identify systems of record for logging (identity providers, endpoint sensors, firewall/netflow), and rehearse executive briefings. Establish thresholds for public disclosure and takedown of stolen data from leak sites in concert with legal teams and authorities.

Allegations that former incident responders aided a RaaS operation underscore a hard reality: threat actors increasingly bring professional expertise to bear. Prioritizing identity security, rapid patching, layered detection, and tested recovery is the most reliable way to blunt extortion leverage. Review business continuity plans, validate restore times against ransomware scenarios, and ensure executive sponsorship for sustained cyber hygiene — the speed of recovery often determines the outcome of negotiations and the ultimate impact on the business.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.