BACK_TO_WIRE
NEWSTHEREGISTER.COM

Cybersecurity Experts Turned Ransomware Operators: How Trusted Skills Were Weaponized Against the Industry

Sunday, January 4, 20265 MIN READSource
Cybersecurity Experts Turned Ransomware Operators: How Trusted Skills Were Weaponized Against the Industry

Cybersecurity Experts Turned Ransomware Operators: How Trusted Skills Were Weaponized Against the Industry

Look. You know those guys who used to work in security—deeply technical, always on the lookout for cracks in a system? The ones who’d spend nights analyzing logs, hunting down zero-day exploits, and telling companies how to stop attackers from getting in?

Now, two of them—Ryan Clifford Goldberg and Kevin Tyler Martin—are admitting they used that same skill set to launch attacks. Not just any attacks. Ransomware attacks. The kind that shut down hospitals, disrupted supply chains, and left entire businesses scrambling for answers.

It’s not just shocking. It’s a gut punch.

The U.S. Department of Justice confirmed it Monday: Goldberg, Martin, and an unnamed third co-conspirator were indicted in October 2025 for conspiracy to obstruct, delay, or affect commerce through extortion. Their operation ran from May to November 2023—and it wasn’t just random. They targeted five different industries: a medical device maker, a pharma company, a private doctor’s office, an engineering firm, and a drone startup.

Here’s the thing: they didn’t just pick weak spots. They knew where the weak spots were.

Because they were once on the other side of the firewall.

They used their training in incident response and threat intelligence to find vulnerabilities—real ones, not just guesswork. They built infection vectors that slipped past alarms, stayed hidden for days, and made it look like the victim had just been careless.

And here’s where it gets weird: they struck a deal with the ALPHV BlackCat ransomware group. They agreed to pay 20% of every ransom they collected—in exchange for access to the tools. That means they weren’t just attacking. They were helping run the operation.

One of the victims—yes, just one—actually paid up. A medical device company settled for about $1.2 million in Bitcoin. That money was split equally. And the group tried to clean it up—moved it through multiple crypto wallets, layered it, buried it. It’s like they knew law enforcement would be watching. And they were right.

The trail is messy. The money’s hard to trace. That’s the reality now. When you’re dealing with crypto, it’s not just about the amount. It’s about how you hide it. And in this case, they did it well.

Assistant Attorney General A. Tysen Duva didn’t sugarcoat it: “These defendants used their sophisticated cybersecurity training and experience to commit ransomware attacks—the very type of crime that they should have been working to stop.”

That line cuts deep.

Because it’s not just about these two people. It’s about the system. How do we trust someone who once protected systems to now break them? How do we know who’s really on the inside?

The timing? Coincidental? No.

ALPHV BlackCat exploded in 2024 with the Change Healthcare attack. That one messed up prescription drug access across CVS, Walgreens, and others. Millions couldn’t get meds. The breach cost the system. And blockchain analysts found $22 million in crypto flowing into the group’s wallets.

Then—just days later—the FBI took down their public site. They said the group was gone. Retired.

But here’s where it gets interesting: ransomware gangs don’t usually just vanish. They take breaks. They regroup. They rebuild.

So maybe ALPHV wasn’t retired. Maybe it was dormant. And now, with new players—people with real security experience—this operation is back. More organized. More precise.

And now, two professionals with formal training in incident response and threat analysis are at the center of it.

That’s not just a case. That’s a pattern.

We’ve seen it before. Former penetration testers. Former analysts. People who used to find flaws so others could fix them. Now, they’re using those flaws to create the attacks.

And the worst part? They’re not just doing it in secret. They’re doing it with the tools they were trained to defend against.

So what’s the real problem here?

It’s not just that they did it. It’s that it worked.

They didn’t just exploit a system. They exploited the trust in it.

And that’s what’s so dangerous.

Cybersecurity isn’t just about firewalls or patches. It’s about people. About trust. About who you believe to be on your side.

When someone who once helped protect your network starts turning that same knowledge into a weapon… that’s not just a breach. That’s a betrayal.

The legal part? Still pending. A federal district court will sentence them in March. Each could get up to 20 years.

But that’s not the end of the story.

This isn’t an isolated case. It’s a symptom. A sign that the ecosystem is breaking down.

If we don’t start vetting people more closely—checking who’s working in the field, who’s building tools, who’s analyzing threats—then the line between defense and offense will keep blurring.

And one day, the person you trusted to keep your data safe might be the one who locks it up and demands payment.

So the question isn’t just: did they do it?

It’s: how do we stop it from happening again?

Because right now, in the world of cybercrime, even the most well-intentioned people might find themselves on the wrong side of a digital ledger.

And that’s not just scary. It’s a wake-up call.

Share This

More From The Wire

VIEW_ALL