Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

740+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks Against U.S. Companies
Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks Against U.S. Companies
NEWS

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks Against U.S. Companies

Angelo Martino, 41, a former employee of cybersecurity incident response firm DigitalMint, has pleaded guilty to targeting U.S. companies with BlackCat (ALPHV) ransomware attacks in 2023 — turning his position as a trusted negotiator into a vector for criminal extortion.

Dylan H.

News Desk

April 22, 2026
4 min read

Insider Turned Attacker

In a case that highlights the risk of insider threats in the cybersecurity industry, Angelo Martino, 41, a former employee of ransomware negotiation and incident response company DigitalMint, has pleaded guilty to participating in BlackCat (ALPHV) ransomware attacks against U.S. companies in 2023.

Martino, who held a position that gave him access to sensitive victim information and negotiation channels, allegedly leveraged that insider knowledge to facilitate attacks rather than defend against them — a stark betrayal of the trust placed in incident response professionals.

The Case Against Martino

According to court documents, Martino conspired with BlackCat (ALPHV) ransomware affiliates to attack U.S. organizations during 2023. The charges reflect a pattern where Martino allegedly:

  • Used his access to information about victim organizations to assist ransomware actors
  • Leveraged insider knowledge of incident response processes to maximize extortion leverage
  • Participated in the financial chain of the BlackCat ransomware operation

The Department of Justice has not disclosed the full list of victim organizations or the total amount of ransom paid as a direct result of Martino's activities, but the BlackCat ransomware group was responsible for attacks against hundreds of organizations globally, including critical infrastructure, healthcare systems, and large enterprises.

BlackCat (ALPHV): Background

BlackCat, also known as ALPHV, was one of the most prolific and sophisticated ransomware-as-a-service (RaaS) operations of the 2022–2024 period. Operating as a RaaS platform, BlackCat provided ransomware tooling and infrastructure to affiliates who carried out attacks in exchange for a share of the ransom proceeds.

Key characteristics of BlackCat operations:

AttributeDetail
PlatformRansomware-as-a-Service (RaaS)
LanguageRust (cross-platform capability)
Extortion ModelTriple extortion (encrypt, exfiltrate, DDoS)
Notable VictimsChange Healthcare, MGM Resorts, Caesars Entertainment
Law Enforcement ActionFBI disruption operation December 2023
Current StatusOperationally disbanded after FBI action

The Insider Threat Dimension

The Martino case raises serious concerns about the insider threat risk within cybersecurity incident response firms. These organizations routinely handle some of the most sensitive information available:

  • Victim organization's network architecture — acquired during remediation engagements
  • Negotiation strategy and ransom payment capacity — determined through financial discussions with victims
  • Existing security gaps — identified during post-breach forensic analysis
  • Law enforcement coordination details — including whether victims have engaged the FBI

An employee with access to this information who is also in contact with ransomware threat actors represents an exceptionally high risk. Martino's case is a rare public example of a confirmed insider-threat scenario within the incident response industry.

Industry Implications

The cybersecurity incident response and ransomware negotiation industry is a critical component of the broader defense ecosystem, but it operates with limited formal regulation and varying standards for employee vetting. Martino's case has prompted discussion about:

  • Background screening for individuals with access to victim data during incident response
  • Separation of duties between negotiation teams and technical responders
  • Insider threat monitoring within incident response firms themselves
  • Regulatory oversight of ransomware negotiation and payment facilitation services

Sentencing and DOJ Context

Martino pleaded guilty to conspiracy charges and faces a federal prison sentence. The exact sentencing date has not been publicly announced at time of writing. The Department of Justice has increasingly prioritized prosecuting not just ransomware operators but also those who facilitate, enable, or benefit from ransomware operations — including negotiators, affiliates, and infrastructure providers.

This case follows a broader pattern of DOJ enforcement actions targeting the ransomware ecosystem from multiple angles, including disrupting infrastructure, sanctioning cryptocurrency addresses, and now prosecuting individuals within the legitimate cybersecurity sector who crossed legal lines.

References

  • BleepingComputer — Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks
  • DOJ Press Releases — Cybercrime Prosecutions
  • CISA — BlackCat/ALPHV Ransomware Advisory
#Ransomware#BleepingComputer#Cybercrime#BlackCat#DOJ

Related Articles

Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

Ilya Angelov, co-leader of the TA551/Mario Kart cybercrime group, was sentenced to two years in prison for operating a phishing botnet that sent 700,000...

4 min read

The Backup Myth That Is Putting Businesses at Risk

Backups protect your data, but they don't keep your business running during downtime. Understanding the difference between backup and BCDR is critical as ransomware and outages continue to grow in frequency and cost.

5 min read

The Gentlemen Ransomware Now Uses SystemBC for Bot-Powered Attacks

Researchers have discovered a SystemBC proxy botnet of over 1,570 compromised hosts linked to Gentlemen ransomware operations. The gang's affiliate is leveraging the botnet as infrastructure for bot-powered ransomware delivery.

5 min read
Back to all News