Ransomware infections usually come from malicious hackers. But in a rarity, a string of attacks was sourced to a pair of cybersecurity employees out to extort millions from victims. Kevin Tyler Martin, a ransomware threat negotiator at cybersecurity provider DigitalMint, and Ryan Clifford Goldberg from Sygnia Cybersecurity Services, are allegedly behind the scheme, according to the Chicago Sun-Times.
A 12-page court document shows a federal grand jury indicted Goldberg and Martin last month for conspiring to spread the ALPHV ransomware to five unnamed companies, including a drone manufacturer, an engineering company in California, and three other healthcare firms. Federal investigators allege that the two started their scheme around May 2023 by spreading a ransomware infection to a victim company. The pair initially demanded $10 million to decrypt the infected computers, which led to the company paying a smaller, but still sizable $1.2 million.[1]
The scheme continued until April 2025, with the help of an unnamed co-conspirator. According to an FBI affidavit, the group acquired an “affiliate” account for the ALPHV/Blackcat gang, which sold access to its ransomware program to other hackers in exchange for a cut of the profits. The same affidavit says Goldberg confessed to the FBI about the scheme in June after initially denying his involvement. “Goldberg told the agents that he conducted the attacks to get out of debt and that he was ‘going to federal prison for the rest of [his] life,’” the document says.
The affidavit also indicates that only one of the ransomware attack was successfully pulled off, “Additionally, Ryan Goldberg stated that he was contacted by Co-Conspirator 2 after the FBI conducted a search of the residence of Co-Conspirator 1 on or about April 3, 2025. According to Goldberg, Co-Conspirator 2 was 'freaking out about the FBI raiding [Co-Conspirator 1],'" the document further notes. However, the second suspect, Martin, pleaded not guilty. Meanwhile, DigitalMint and Sygnia indicate both employees went rogue and were subsequently fired. “The charged conduct took place outside of DigitalMint’s infrastructure and systems,” the company told PCMag. “The co-conspirators did not access or compromise client data as part of the charged conduct.”
Sygnia added: “Immediately upon learning of the situation, [Goldberg] was terminated. While Sygnia is not a target of this investigation, we are continuing to work closely with the Federal Bureau of Investigation. We cannot provide further comment on the ongoing federal investigation."
This article is shared with permission at no charge for educational and informational purposes only.
Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization. We provide indicators of compromise information via a notification service (RedXray) or an analysis service (CTAC). For questions, comments or assistance, please contact the office directly at 1-844-492-7225, or feedback@redskyalliance.com
Weekly Cyber Intelligence Briefings:
- Reporting: https://www.redskyalliance.org/
- Website: https://www.redskyalliance.com/
- LinkedIn: https://www.linkedin.com/company/64265941
Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5207428251321676122
[1] https://www.msn.com/en-us/news/crime/us-traces-ransomware-attacks-to-2-people-working-for-cybersecurity-firms/ar-AA1PM1MB/
Comments