The recent verdict against two cybersecurity professionals involved in attacks with the Ransomware known as BlackCat (ALPHV) highlights a disturbing reality: not only are there sophisticated external threats, but they can also come from those who should protect us. The accused, who worked in companies in the sector and agreed to distribute a percentage of the rescue with the Ransomware operators, combined technical knowledge and privileged access to violate systems and extort victims in the United States.
Beyond judicial history - which describes the payment of bailouts in Bitcoin, the subsequent laundering of funds and the abuse of internal functions to inflate negotiations - the main lesson is that Ransomware- as- a- Service (RaaS) model allows actors with different roles to work together to maximize illegal profits. Although specific groups may disappear or change their names, the technical and economic scheme persists and evolves, which requires both organizational and regulatory responses.

From the point of view of risk management, there are several immediate implications: the need to strengthen confidence in third parties and contractors, to review privileges and access of staff with high technical capacity, and to improve the monitoring of those involved in negotiations or incident responses. It is also clear that the existence of cyberinsurance policies can become an exploitable variable by internal and external actors, so information on limits and conditions should be handled with extreme care.
At the technical level, traditional defences remain necessary but not sufficient. It is essential to combine proven and isolated backup, network segmentation, minimum privilege principle, multifactor authentication and modern endpoint detection and response solutions (EDR). Also, keeping an updated asset inventory and applying patches as a priority reduces the attack area that RaaS groups often take advantage of.
For organizations that manage the response to incidents, it is appropriate to establish clear procedures on who can negotiate, what information is shared and how each step is documented, always involving legal advice and security forces when appropriate. Negotiations without transparency or with internal actors providing sensitive data increase the risk of higher payments and subsequent legal implications.

In the area of recruitment and human resources, companies should expand risk assessments by recruiting critical technical profiles: background checks, continued privilege controls, job separation policies and monitoring of unusual activities. Ethical and security training for personnel with advanced capabilities can reduce the likelihood of deliberate abuse.
Judicial action against these individuals is a reminder that the fight against cybercrime requires coordination between the private sector and the authorities, as well as transparency in reporting incidents to prevent malicious actors from repeating effective tactics. Official resources on Ransomware prevention and response provide practical guidance for review and implementation: for example, the CISA recommendations on Ransomware https: / / www.cisa.gov / ransomware and general information on FBI cyber research https: / / www.fbi.gov / investigate / cyber.
Finally, for any organization, the recommendation is clear: not delegating confidence in mere credentials or technical experience without compensatory controls, strengthening the governance of access and responses, and designing resilience plans to restore operations without succumbing to blackmail. The combination of preventive measures, early detection and cooperation with authorities reduces both the economic attractiveness of attacks and the ability of internal actors to become facilitators of crime.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...