Security & Infrastructure Tools
Two Former Ransomware Negotiators Sentenced to Four Years in Prison Over BlackCat (ALPHV) Attacks
Two former cybersecurity incident responders were sentenced to four years in prison each for conspiring to extort U.S. companies through the BlackCat/ALPHV ransomware operation, working as affiliates from May to November 2023 with accomplice Angelo Martino. They shared about 20% of ransoms and targeted multiple U.S. victims, including a Tampa medical device maker that paid $1.27 million on a $10 million demand. The FBI links BlackCat to more than 60 breaches and estimates at least $300 million in ransom payments from over 1,000 victims through September 2023.

US Ransomware Negotiators Sentenced to Four Years in Prison for BlackCat (ALPHV) Attacks
OverviewTwo former cybersecurity incident response professionals were sentenced to four years in prison for their roles in operating as BlackCat (ALPHV) ransomware affiliates. The individuals worked with a third accomplice to facilitate extortion schemes against U.S. companies, leveraging access to the BlackCat ransomware platform to encrypt networks, steal data, and pressure victims into paying sizable ransoms. The sentence highlights the legal consequences faced by individuals who assist ransomware operations, including affiliates who profit from access to widely used extortion tools.
Case Details and Key Players
- Primary defendants:
- Ryan Clifford Goldberg, age 40, formerly a Sygnia incident response manager.
- Kevin Tyler Martin, age 36, formerly a DigitalMint ransomware negotiator.
- Third accomplice:
- Angelo Martino, age 41, who pleaded guilty earlier in the investigation.
- Timeframe of activity:
- May 2023 to November 2023, during which the three acted as BlackCat affiliates and breached multiple U.S. targets.
- Legal outcomes:
- Goldberg and Martin were charged in November and pleaded guilty in December to conspiracy to obstruct commerce by extortion.
- Martino pleaded guilty in April to similar charges, tying him to the same ring.
How the Operation Worked
- Access and revenue sharing:
- The trio received a 20% share of ransoms in exchange for access to BlackCat’s ransomware and extortion platform, effectively enabling affiliates to deploy the toolkit against victims.
- Targeting pattern:
- The breaches affected a range of U.S. organizations across different industries, with extortion demands tied to the level of access gained and the perceived ability to disrupt operations.
Victims and Financial Demands
- Notable victims listed in court documents:
- A Maryland pharmaceutical company.
- A Tampa-based medical device manufacturer.
- A California engineering firm.
- A Virginia drone manufacturer.
- A California doctor’s office.
- Specifics of the Tampa incident:
- The Tampa medical device company paid $1.27 million after receiving a $10 million ransom demand in May 2023.
- The payment was laundered and split three ways with Martino, illustrating how funds moved within the criminal network.
- Range of other demands:
- Other breached organizations faced ransom demands ranging from $300,000 to $10 million, though the indictment does not specify which victims paid or whether additional payments were made beyond the Tampa case.
Prosecutors’ Statements and Official Reactions
- Public remarks:
- A U.S. attorney described the defendants’ actions as a deliberate exploitation of specialized cybersecurity knowledge to extort victims, rather than defending or protecting them.
- Industry response:
- DigitalMint’s leadership stated that the individuals’ criminal conduct violated company values and ethics, noting that they were terminated once the conduct came to light.
- FBI association and broader impact:
- The FBI has connected the BlackCat/ALPHV group to more than 60 breaches globally between November 2021 and March 2022, underscoring the scale of the operation.
- An FBI advisory indicates that the group collected at least $300 million in ransom payments from more than 1,000 victims through September 2023, highlighting the substantial financial footprint of the ransomware ecosystem.
Impact and Remediation Context
- Legal precedent:
- The four-year prison terms for Goldberg and Martin, along with Martino’s guilty plea, demonstrate the judiciary’s willingness to pursue and punish affiliate involvement in ransomware campaigns, including roles focused on negotiation and access provision.
- Sector implications:
- The case underscores the importance of robust incident response practices, rigorous vendor and affiliate oversight, and the ongoing need for organizations to maintain strong authentication, backup strategies, and network segmentation to reduce the impact of ransomware intrusions.
Timeline of Key Events
- May 2023 to November 2023:
- The period during which Goldberg, Martin, and Martino operated as BlackCat affiliates, breaching multiple U.S. targets and coordinating ransom demands.
- November 2023:
- Initial charges filed against the two main defendants.
- December 2023:
- Guilty pleas entered by Goldberg and Martin to conspiracy to obstruct commerce by extortion.
- April 2024 (contextual reference from the investigation timeline):
- Martino pleads guilty to related charges, tying him to the same criminal operation.
- Early 2024 onward:
- Sentencing proceedings culminate in four-year prison terms for Goldberg and Martin.
Contextual Note
- The broader BlackCat/ALPHV operation has been linked to extensive breaches and substantial ransom proceeds, reinforcing the perception of ransomware as a coordinated criminal enterprise with multiple participant roles, including negotiators, access providers, and affiliates who monetize access to sophisticated extortion platforms.
ConclusionThe sentencing of two former ransomware affiliates to four-year prison terms, in addition to the plea of a third accomplice, marks a notable enforcement milestone in the battle against ransomware. The case illustrates how criminal networks recruit and compensate individuals who facilitate attacks and extortion campaigns, and it reinforces the need for ongoing vigilance, robust security controls, and collaborative law enforcement efforts to disrupt and deter such schemes.