Friday, January 9, 2026
GCN
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Cybersecurity
  • Public Safety
  • Flash News
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Cybersecurity
  • Public Safety
  • Flash News
No Result
View All Result
GCN
No Result
View All Result

Two cybersecurity workers plead guilty over involvement in BlackCat ransomware operations

by Kyle L.
January 8, 2026
in Cybersecurity
Two cybersecurity workers plead guilty over involvement in BlackCat

January 3, 2026, marked a milestone for the Justice Department as two U.S.-based cybersecurity professionals pled guilty to their involvement in ransomware attacks associated with the infamous BlackCat (also referred to as ALPHV) group; the plea marks an important step in the ongoing battle against cybercrime. In addition to the guilty pleas, the Justice Department also highlighted the increasing number of cases involving “insider” threats where insiders use their technical expertise for personal financial gain. According to the Department of Justice, the two defendants were part of a larger affiliate group for the BlackCat ransomware-as-a-service (RaaS) operation.

BlackCat uses a business model similar to many other types of ransomware operations

The business model allows the core developers of the ransomware to create tools that they then sell or rent to others (affiliates), who in turn, carry out ransomware attacks. The affiliates receive a portion of any ransoms paid by the victim organization in exchange for the decryption key to restore access to the encrypted data.

Cyber intruder claims extended access to ESA networks and offers stolen data for sale

European Space Agency acknowledges cyber incident affecting third-party server infrastructure

SonicWall debuts next-generation firewalls as part of its Generation 8 lineup

New security standards will become mandatory for all smart devices by 2026

U.S. extends Cybersecurity Information Sharing Act through January 2026

South Korea fines SK Telecom for failures leading to major data breach

The court documents indicate that the defendants used their previous employment experience as IT and cybersecurity professionals to obtain inside information about their target organizations’ networks. Using this inside information, the defendants used their technical expertise to circumvent the organizations’ security protocols and install the BlackCat ransomware on the organizations’ systems.

The defendants got a cut of the ransom money, too

According to authorities, the defendants received a percentage of the ransoms paid by the victim organizations. In many instances, ransoms ranged from $500,000 to $5 million.

The Justice Department identifies BlackCat as one of the most dangerous ransomware variants available

The BlackCat developers utilize a profit-sharing model for their ransomware operation, resulting in a decentralized network of hackers that can attack targets anywhere in the world.

Justice Department investigators worked closely with cybersecurity experts to identify and connect the dots between the two defendants’ actions and the numerous ransomware attacks carried out against U.S.-based organizations.

The defendants’ guilty pleas demonstrate the Justice Department’s continued efforts to dismantle ransomware networks and prosecute those who assist and enable these networks.ย Assistant Attorney General Kenneth A. Polite Jr. said:

โ€œThis case demonstrates that even individuals with legitimate cybersecurity backgrounds can face severe consequences if they choose to exploit their skills for criminal purposes.โ€

It is unclear how much financial damage was caused by the defendants’ attacks

Officials confirmed that the organizations targeted included both private and public organizations. The defendants now face lengthy prison sentences, with formal sentencing hearings scheduled for later this year.

The case brings to light a disturbing trend in the industry

Insiders who possess legitimate cybersecurity backgrounds are now using their skills for malicious purposes. Experts agree that insider threats are particularly challenging, since insiders typically possess a deeper understanding of the defenses being implemented by the organization, and therefore can utilize this insight to compromise vulnerabilities within the system with greater accuracy. Organizations are encouraged to implement additional layers of internal monitoring, enforce stricter control over access to their systems, and perform regular audits to mitigate the risk of insider threats.

Cybersecurity analysts also point out that the ransomware-as-a-service models, such as BlackCat, reduce the barriers to entry for cyber-attackers worldwide.

With the RaaS model, attackers can outsource the development of the malware and focus on compromising the target’s systems and extorting money from the compromised organization, making it increasingly more difficult for law enforcement to keep up. The message is clear: for all businesses and government organizations facing the ever-evolving threat landscape of ransomware, implementing proactive defense strategies, performing thorough employee vetting, and collaborating with law enforcement agenciesares paramount to combating this threat for good.

GCN

ยฉ 2025 by GCN

  • Contact
  • Legal notice

No Result
View All Result
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Cybersecurity
  • Public Safety
  • Flash News

ยฉ 2025 by GCN