Two Americans Sentenced to Prison for Using BlackCat Ransomware to Attack Multiple Entities
Threat Overview
Two U.S.-based cybersecurity professionals, Ryan Goldberg and Kevin Martin, have been sentenced to prison for deploying BlackCat/ALPHV ransomware against multiple organizations. The defendants operated under a 20% affiliate commission structure with BlackCat operators, converting their security expertise into criminal activity. This case demonstrates a disturbing trend: insider knowledge weaponized against the very systems security professionals are trained to protect. According to IBM Security's 2024 Cost of a Data Breach Report, the average breach now costs healthcare organizations $9.8 million with an average lifecycle of 258 days from initial compromise to containment. When attackers possess legitimate security credentials and training, detection timelines extend significantly.
Attack Vector & Tactics
BlackCat/ALPHV operates as a Ransomware-as-a-Service (RaaS) platform, recruiting technically sophisticated affiliates rather than relying on opportunistic script operators. The affiliate model allows experienced security practitioners to bypass the technical learning curve and immediately deploy enterprise-grade malware. Key characteristics of this approach:
- Legitimate credential abuse: Security professionals possess valid access patterns that evade behavioral analytics
- Knowledge of defensive gaps: Attackers understand exactly which logging systems to disable and which backup architectures to target
- Professional social engineering: Security backgrounds enable convincing impersonation of IT staff or vendors
- Revenue-sharing incentives: The 20% commission structure motivates prolonged, multi-target campaigns rather than single-incident attacks
For independent practices, this threat profile is particularly concerning because the attackers think like defenders—they know small practices rarely have 24/7 monitoring or segregated backup infrastructure.
Defense Measures
Protection against sophisticated insider-style attacks requires layered technical controls rather than reliance on perimeter defenses alone:
- Immutable audit logging: Deploy tamper-proof access logs that capture administrative actions, ensuring attackers cannot erase evidence of reconnaissance activity
- Zero Trust architecture: Authenticate every access request regardless of network position, eliminating the "trusted insider" assumption
- Automated threat detection: Real-time monitoring systems that flag unusual administrative behavior patterns, credential usage outside normal hours, or rapid data enumeration
- Segregated backup systems: Air-gapped or append-only backups that ransomware operators cannot encrypt or delete
- Vendor BAA enforcement: All technology partners must sign Business Associate Agreements with defined security obligations—no exceptions
What This Means for Your Practice
The Goldberg-Martin case proves that credential authenticity no longer guarantees trustworthiness. Your practice must assume:
- Former IT contractors or security consultants could possess residual access credentials
- Vendors with remote support capabilities represent potential lateral movement paths for ransomware affiliates
- Email domains and communication patterns can be perfectly mimicked by technically trained attackers
Immediate action items:
- Audit all administrative accounts and revoke credentials for former staff or vendors
- Implement session-based access logging for every ePHI system
- Test backup restoration procedures monthly under simulated attack conditions
- Require multi-factor authentication for all remote access, no exceptions
- Document all vendor relationships with signed BAAs and security questionnaires
The Goldberg-Martin case proves that credential authenticity no longer guarantees trustworthiness.
How Patient Protect Helps
Patient Protect's ePHI Audit Logging creates immutable, per-session access records that ransomware operators cannot alter or delete—the permanent evidence trail this case likely relied on. The platform's Security Alerts provide real-time monitoring for unusual administrative activity, flagging credential misuse before attackers can move laterally across systems.
The Vendor Risk Scanner tracks all Business Associate Agreements and assesses vendor security postures, ensuring every partner with system access meets documented security standards. Combined with Zero Trust Architecture and AES-256-GCM encryption, Patient Protect assumes no user or system is inherently trusted—every access request requires verification.
For practices concerned about sophisticated attacks, the Breach Simulator models ransomware scenarios against your actual deployed controls, identifying gaps before attackers do. Starting at $39/month with no contracts, Patient Protect adds the security-first layer that documentation-focused compliance platforms weren't designed to provide.
Start a free trial at hipaa-port.com or check your risk at patient-protect.com/risk-assessment.
This editorial was generated by AI from publicly available source material and is clearly labeled as such. It does not constitute legal, compliance, or professional advice. Inclusion of any entity does not imply wrongdoing. Patient Protect makes no warranties regarding accuracy or completeness. Verify all information with the original source before relying on it.

