In a stark example of a malicious insider threat, Angelo Martino, a 41-year-old former ransomware negotiator, has pleaded guilty to federal charges of conspiring with the BlackCat (ALPHV) ransomware gang. While employed at DigitalMint, a crypto broker that helps victims pay ransoms, Martino secretly fed the attackers sensitive information about his own clients. This included details about their insurance coverage and internal negotiation limits, allowing BlackCat to extort higher payments. Martino also admitted to actively conspiring in ransomware attacks, betraying the trust of the companies he was hired to help. Authorities have seized approximately $10 million in assets from Martino.
This case highlights a dangerous evolution of the insider threat, where a trusted security professional actively colludes with a major ransomware group. Martino's role was twofold:
The scheme resulted in massive payouts from victims in hospitality, financial services, and non-profit sectors, with some ransoms reaching over $25 million.
While this is primarily a story of human betrayal, it intersects with the ransomware TTPs of the BlackCat group.
T1048 - Exfiltration Over Alternative Protocol), and finally, data encryption (T1486 - Data Encrypted for Impact).T1136 - Create Account), a common tactic to obscure the flow of illicit cryptocurrency.This case demonstrates that the 'human element' in cybersecurity is not just about user error; it can also be about malicious intent from those in positions of trust. It fundamentally changes the threat model for incident response.
No technical Indicators of Compromise were provided in the source articles.
Detecting this type of insider threat is extremely difficult and relies more on behavioral and procedural controls than technical indicators. However, some patterns might be observable:
While Martino was a malicious actor, this case highlights the need for strong ethics and insider threat awareness programs within the cybersecurity industry.
The Angelo Martino case is a stark reminder that third-party risk extends to incident response partners. Organizations must implement a stringent due diligence process when selecting a ransomware negotiator or IR firm. This includes conducting background checks, verifying industry reputation through trusted channels (like InfraGard or local ISACs), and checking for a history of successful, ethical resolutions. Contracts should include clear codes of conduct, confidentiality clauses, and the right to audit communications. Furthermore, to create checks and balances, companies should consider using separate firms for technical forensics, legal counsel, and ransom negotiation, preventing any single entity from controlling all information in a high-stakes incident.
To defend against a compromised negotiator, victim organizations must practice strict information isolation. The ransomware negotiator does not need to know, and should never be told, the company's cyber insurance limit or the absolute maximum payment authorized by the board. This critical information should be confined to a small circle of executive leadership and the company's external legal counsel. The negotiator should be given a target payment amount and a smaller, incremental negotiation ceiling. By compartmentalizing this sensitive financial information, the company removes the key leverage that a malicious insider like Martino could provide to the threat actors, forcing the negotiation to proceed based on the attacker's perceived risk rather than their knowledge of the victim's ability to pay.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats