The Protectors Turned Perpetrators: Cyber Experts Behind the Attacks
In a shocking twist, two cybersecurity professionals — the very people trusted to stop cybercrime — now face federal charges for running their own ransomware extortion scheme.
According to U.S. prosecutors, Kevin Tyler Martin, a ransomware negotiator at DigitalMint, and Ryan Clifford Goldberg of Sygnia Cybersecurity Services, used their insider knowledge to infiltrate companies. They encrypted data and demanded multimillion-dollar ransoms. Their actions, authorities say, flipped their roles from protectors to perpetrators in one of the most alarming cybersecurity scandals this year.
What’s Happening & Why This Matters
The FBI’s Case: From Negotiators to Criminals

Court filings reveal the pair allegedly conspired to spread the ALPHV/BlackCat ransomware between May 2023 and April 2025. Their victims included a California engineering firm, a drone manufacturer, and three healthcare companies.
The initial ransom demand? $10 million.The payout: they received? $1.2 million.
The indictment shows that the pair even registered as “affiliates” of the ALPHV/BlackCat gang. This notorious cybercrime network licenses its ransomware tools to partners in exchange for a share of profits.
When questioned by the FBI, Goldberg reportedly confessed. He said he launched the attacks “to get out of debt” and admitted he expected to “spend the rest of his life in federal prison.”
The affidavit noted only one attack was fully successful. Yet the scale of planning and insider knowledge behind it exposes how deeply vulnerable even the cybersecurity industry can be when expertise turns rogue.
Corporate Fallout: Firms Distance Themselves
Both DigitalMint and Sygnia acted fast to fire the accused employees and reassure clients that no internal systems were compromised.
In a statement, DigitalMint said:
“The charged conduct took place outside of DigitalMint’s infrastructure and systems. The co-conspirators did not access or compromise client data.”
Sygnia echoed that message:
“Immediately upon learning of the situation, [Goldberg] was terminated. While Sygnia is not a target of this investigation, we continue to work closely with the FBI.”
Despite these assurances, the revelation that professionals with privileged security access used their skills for criminal purposes has rattled the cybersecurity community.
Reaction: Trust on the Line
Experts warn that this case could erode confidence in third-party cybersecurity providers. Paul Rosenzweig, a former senior counsel at the U.S. Department of Homeland Security, said, “This is the nightmare scenario — insiders with the keys to the digital vault turning those same tools against their clients.”
Cybersecurity training firms are now re-examining background screening, monitoring protocols, and contractor oversight to detect potential conflicts or financial motives before they turn into internal threats.
With ransomware attacks costing global businesses over $30 billion annually, insider involvement adds a new, disturbing dimension to the threat landscape.

TF Summary: What’s Next
The indictment of Martin and Goldberg denotes an important issue — cybersecurity risks aren’t always external. Sometimes, they come from within. As the investigation continues, both companies aim to rebuild client trust. Meanwhile, the Justice Department pushes for stronger oversight and accountability in the private security sector.
MY FORECAST: Expect stricter [U.S.] regulations around cybersecurity employment, especially for roles with ransomware access. The next frontier of defense cannot focus on hackers only — it’s got to monitor the monitors, too.
— Text-to-Speech (TTS) provided by gspeech

