Fallen Defenders: Ex-Cybersecurity Experts Charged in $10M Ransomware Scheme
In a shocking turn of events that has rocked the cybersecurity community, two former IT professionals — once trusted to protect major U.S. companies from hackers — have been charged with using their insider knowledge to carry out cyberattacks worth millions.
Federal prosecutors allege that Kevin Tyler Martin, 34, of Roanoke, Texas, and Ryan Clifford Goldberg, 32, of Watkinsville, Georgia, joined forces to hack multiple American businesses and extort them for money using a notorious ransomware strain called ALPHV.
Both men previously worked for well-known cybersecurity firms before allegedly exploiting the same skills they were paid to use for protection.
From Defenders to Criminals
According to an indictment filed in the Southern District of Florida, Martin and Goldberg carried out a string of ransomware attacks in 2023, targeting a medical device company in Florida, a pharmaceutical firm in Maryland, and a drone manufacturer in Virginia.
Prosecutors say the pair demanded around $10 million from the Florida-based medical company to release its encrypted files, ultimately receiving $1.27 million in ransom payments before the FBI intervened.
Martin and Goldberg each face federal charges of extortion and intentional damage to a protected computer. Their attorneys have declined to comment on the ongoing investigation.
“It’s deeply disturbing to see professionals who were once part of the defense industry crossing the line,” said Allan Liska, a veteran threat analyst at Recorded Future. “These incidents erode the public’s trust and make an already difficult cybersecurity landscape even harder to manage.”
The ALPHV Ransomware Network
Authorities allege that Martin and Goldberg used ALPHV—also known as BlackCat—a sophisticated form of ransomware that operates as a “service model,” where developers sell the malware code to affiliates in exchange for a share of their profits.
ALPHV has been linked to numerous large-scale attacks, including the 2024 Change Healthcare breach that crippled hospital billing systems across the country and disrupted prescription services. Investigators have clarified that Martin and Goldberg were not involved in that particular incident.
DigitalMint, Martin’s former employer, said he acted “completely outside the scope of his employment” and that the company had “no knowledge or involvement” in any illegal activity. Sygnia Cybersecurity Services, where Goldberg worked, stated it immediately terminated his employment after learning of the investigation and has been cooperating with federal authorities.
When Cyber Experts Cross the Line
The charges highlight a growing concern in the cybersecurity world: insider threats. Unlike typical hackers, insiders already possess the credentials and knowledge to bypass complex defenses. For companies that rely heavily on their IT teams, this form of betrayal can be devastating.
Josephine Wolff, Associate Professor of Cybersecurity Policy at Tufts University Fletcher School, said cases like this underscore the risk that comes when trust and access intersect. “When a professional with legitimate access abuses that privilege, it’s more than a crime — it’s a breach of trust that undermines the foundation of cybersecurity itself,” she said.
Under U.S. federal law, specifically the Computer Fraud and Abuse Act, anyone who intentionally accesses a protected computer system without authorization can face significant prison time and financial penalties. For cybersecurity professionals, the standards are even higher.
The law, first passed in the 1980s, was originally designed to stop hackers from targeting government networks. Today, it also applies to employees who misuse authorized access for personal gain or sabotage.
For businesses, this case serves as a warning to strengthen internal monitoring systems, perform regular security audits, and include specific insider misuse clauses in employee contracts. The FBI estimates that insider attacks cost American companies more than $4.6 billion in 2024 alone — a figure that continues to rise as cybercriminals grow bolder.
Fallout and Industry Response
Both DigitalMint and Sygnia have reiterated their cooperation with law enforcement, stressing that no client systems were compromised through their infrastructure. However, the scandal has raised questions about the vetting and monitoring of cybersecurity employees who hold privileged access to sensitive corporate data.
“This isn’t just about one or two bad actors,” said one industry source familiar with the investigation. “It’s about the growing need for accountability in an industry that wields enormous power behind the scenes.”
The Department of Justice has described the case as one of the most significant insider cybercrime indictments of recent years, potentially setting new legal precedents for how insider attacks are prosecuted in the future.
Martin and Goldberg are expected to appear in federal court later this year. If convicted, they could face decades in prison and millions in fines.
For companies and consumers alike, the case serves as a sobering reminder: in the digital age, sometimes the biggest threats don’t come from strangers in the shadows — but from the people already inside the system.


















