
In a significant development this week, the U.S. Department of Justice (DoJ) announced the indictment of three former employees of prominent security firms involved in the spread of the notorious BlackCat ransomware (also known as ALPHV). The three individuals, whose actions contributed to a wide-ranging cyber extortion scheme, were charged with cybercrimes spanning from May to November of 2023.
The accused include Kevi Tyler, a former employee of DigitalMint, and Ryan Clifford, along with an unnamed individual, both ex-employees of Sygnia, a renowned cybersecurity firm. The DoJ alleges that the trio engaged in digital extortion, intentionally damaging corporate networks with the ultimate goal of acquiring illicit funds through ransom payments.
Charges and Legal Consequences
Legal experts assert that the three individuals could face substantial legal consequences, including up to 20 years in prison, substantial financial penalties, or both, for their involvement in causing intentional harm to computer systems. The charges highlight a growing trend where individuals with trusted roles in the cybersecurity industry exploit their access to facilitate major cyberattacks.
This case further underscores the evolving nature of cybersecurity threats, where insiders, rather than just external hackers, are increasingly implicated in the spread of ransomware.
Ransomware Payments and Victims Revealed
The Chicago Sun-Times was the first to break the story, which quickly spread across social media platforms. According to the report, the three individuals were caught in possession of significant evidence, including decryption keys that had been returned to victims after they paid a ransom. In these instances, the criminals promised not to leak the stolen data online, a common tactic to reassure victims and force payment.
The ransom amounts varied, with victims reporting payments between $300,000 and $10 million in cryptocurrency. Some of the confirmed victims named by the DoJ include a California-based engineering firm, a Virginia-based drone manufacturer, a Tampa-based medical device maker, and a Pharmaceutical company based in Maryland.
The individuals allegedly worked in collaboration with hackers behind the BlackCat ransomware-as-a-service operation, a growing trend in cybercrime where ransomware tools are rented out to other cybercriminals. Over time, the three former employees were lured into this illicit business, eventually leading to their involvement in the attack and subsequent capture by law enforcement.
Connection to Earlier Reports and Industry Practices
This case also sheds light on a disturbing pattern of behavior that was highlighted in a 2019 ProPublica report. The investigation revealed that certain U.S.-based data recovery firms, particularly those specializing in digital forensics, were secretly paying hackers responsible for spreading BlackCat ransomware. These firms would then charge victims exorbitant fees to recover their encrypted data, creating a cycle of financial exploitation.
While not all data recovery firms were involved, the ProPublica report brought attention to the unethical practices within the industry, revealing a hidden facet of the ransomware business. The illicit payments, made in secret, allowed the attackers to continue their operations while the firms profited from assisting victims in recovering their encrypted files.
BlackCat’s Focus on Healthcare
This new indictment also coincides with an ongoing warning from U.S. authorities about the BlackCat ransomware group’s targeted attacks on the healthcare sector. In a joint statement issued in February 2025, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) reiterated that BlackCat operators were specifically focusing on healthcare organizations. These groups are typically involved in attacks that disrupt critical healthcare services, posing significant risks to patient care and safety.
In light of this, both agencies urged healthcare providers and other potential victims not to engage with cybercriminals by paying ransoms. Instead, they recommended that victims report the incident to law enforcement to mitigate further damage and ensure a coordinated response to these threats.
A Growing Threat: The Inside Job
This indictment serves as a stark reminder of the growing complexities in the world of cybercrime. While ransomware attacks have traditionally been attributed to external hackers or criminal groups, this case reveals how insiders—people who were once entrusted with securing sensitive information—can become active participants in these crimes. This trend raises new challenges for the cybersecurity industry, as it underscores the need for even greater vigilance and accountability.
As authorities continue to pursue cybercriminals, this case is expected to serve as a warning to others in the industry who may be tempted to engage in similar activities. It also highlights the increasing need for comprehensive cybersecurity measures to protect organizations from both external threats and potential insider risks.
Join our LinkedIn group Information Security Community!













