US cybersecurity professionals plead guilty to blackcat ransomware attacks

Two US-based cybersecurity professionals have pleaded guilty to participating in Blackcat ransomware attacks. Ryan Clifford Goldberg and Kevin Tyler Martin face potential years in prison for their involvement.

In a significant development in cybersecurity crime, Ryan Clifford Goldberg and Kevin Tyler Martin, both described as US cybersecurity professionals, have admitted guilt in connection with attacks carried out by the Blackcat ransomware group. The pleas mark a key step in efforts to dismantle the operations of this notorious ransomware syndicate, which has targeted various organizations. According to reports, the duo's actions contributed to the group's disruptive activities, prompting federal charges that could result in lengthy prison sentences. Details of the case highlight ongoing challenges in combating insider threats within the cybersecurity field, where individuals with specialized knowledge allegedly turned to criminal endeavors. The Blackcat group, also known as ALPHV, has been linked to numerous high-profile incidents, though specifics of Goldberg and Martin's roles remain under legal proceedings. This case underscores the US government's commitment to prosecuting ransomware perpetrators, potentially deterring similar activities.

ተያያዥ ጽሁፎች

U.S. authorities seize $15 billion in Bitcoin from Cambodian crypto scam, showing agents with evidence and wanted poster in a DOJ setting.
በ AI የተሰራ ምስል

U.S. seizes $15 billion in bitcoin from Cambodian crypto scam

በAI የተዘገበ በ AI የተሰራ ምስል

Federal prosecutors have charged Chen Zhi, chairman of Cambodia's Prince Holding Group, with wire fraud and money laundering in a global cryptocurrency scam that exploited forced labor. The U.S. government seized bitcoin worth approximately $15 billion, marking the largest forfeiture action in Department of Justice history. Chen remains at large, facing up to 40 years in prison if convicted.

A notorious group of Russian cybercriminals has resurfaced with a new ransomware variant. However, security experts note that files encrypted by this malware can be easily decrypted.

በAI የተዘገበ

Two individuals connected to China's Salt Typhoon hacking group reportedly underwent training at Cisco's networking academy. This revelation highlights potential vulnerabilities in global cybersecurity education programs. Separately, US lawmakers warn of inadequate safeguards in expanded wiretap authorities.

Pro-Russian hackers known as Curly COMrades are exploiting Microsoft's Hyper-V technology to embed lightweight Alpine Linux virtual machines within compromised Windows systems. This tactic allows them to run custom malware like CurlyShell and CurlCat undetected by traditional endpoint detection tools. The campaign, uncovered by Bitdefender in collaboration with the Georgian CERT, targets organizations in Europe and beyond.

በAI የተዘገበ

Spanish authorities have arrested five individuals accused of murdering a man and kidnapping his partner during a cryptocurrency theft in southern Spain. The incident occurred in April, leading to the man's death and the woman's eventual release. Four others face charges in Denmark for related offenses.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

በAI የተዘገበ

North Korean hackers have begun exploiting a critical vulnerability known as React2Shell in malware attacks. This follows similar actions by Chinese hackers, indicating a growing interest in this security flaw. The issue poses significant risks to affected systems.

 

 

 

ይህ ድረ-ገጽ ኩኪዎችን ይጠቀማል

የእኛን ጣቢያ ለማሻሻል ለትንታኔ ኩኪዎችን እንጠቀማለን። የእኛን የሚስጥር ፖሊሲ አንብቡ የሚስጥር ፖሊሲ ለተጨማሪ መረጃ።
ውድቅ አድርግ