DOJ Ransomware Indictment 2025: $1.2M Insider Betrayal

DOJ Ransomware Indictment 2025: $1.2M Insider Betrayal

Summary

The U.S. Department of Justice has indicted Kevin Tyler Martin (DigitalMint) and Ryan Clifford Goldberg (ex-Sygnia), along with an unnamed accomplice, for allegedly using insider access to launch ALPHV/BlackCat ransomware against five U.S. companies between May 2023 and April 2025. One Florida medical device company reportedly paid $1.2 million in Bitcoin after data was stolen and systems encrypted. The accused are described as negotiators and incident responders who allegedly turned their expertise into a scheme to extort victims, exploiting trust and insider knowledge. DOJ charges include computer fraud and extortion, exposing individuals to decades behind bars if convicted.

Key Points

  1. Indictment names Kevin Tyler Martin and Ryan Clifford Goldberg for alleged insider-enabled ALPHV/BlackCat attacks on five U.S. firms.
  2. A Florida med-tech victim allegedly paid $1.2 million in Bitcoin; total proceeds remain undisclosed after ALPHV’s cut.
  3. Accused insiders reportedly used privileged access and negotiation roles to steal data, deploy ransomware and demand payment.
  4. ALPHV/BlackCat is a powerful RaaS platform (written in Rust) with affiliates and a revenue-sharing model that fuels large payouts.
  5. DOJ charged the defendants with multiple counts of computer fraud (18 U.S.C. § 1030) and extortion (18 U.S.C. § 875), carrying lengthy prison terms and heavy fines.
  6. Industry impact: ransomware projected to cost ~ $40bn globally in 2025; insider threats are driving higher premiums and greater operational risk.
  7. Recommended CEO actions: enforce zero-trust, deploy behaviour-based monitoring, audit crypto flows, strengthen vetting and offboarding.

Context and Relevance

This indictment shines a harsh light on a growing danger: the insider who weaponises their role. It’s not just another breach — it underlines that response teams, negotiators and trusted contractors can be vectors for the attack itself. For boards, CISOs and CEOs this changes the threat model: technical defences alone aren’t enough if the human element can be turned into the attack path. The case also underscores how RaaS ecosystems like ALPHV/BlackCat amplify harm by providing sophisticated tooling and revenue splits that make insider collusion lucrative.

Author’s take

Punchy and blunt: this is a wake-up call. When the very people paid to remediate and negotiate are accused of staging the crime, every assumption about trust and access must be re-set. Read the details — policies, monitoring and culture need urgent upgrades.

Why should I read this?

Because this story is wild and worrying. Negotiators and incident responders flipping to extortion? That’s not hypothetical — it’s happening. If you run a company, manage cyber risk or buy cyber insurance, the tactics and fixes outlined here could save you millions and your reputation. Short version: tighten access, watch crypto flows, and treat insider risk like the top-tier threat it now is.

Source

Source: https://www.ceotodaymagazine.com/2025/11/doj-ransomware-insider-indictment-2025/