Ransomware Negotiator Admits to Conspiring with BlackCat Gang

Former Ransomware Negotiator Pleads Guilty to Aiding BlackCat, Betraying Clients

HIGH
April 22, 2026
5m read
Threat ActorRansomwarePolicy and Compliance

Related Entities

Threat Actors

Other

Angelo MartinoDigitalMintUnited States

Full Report

Executive Summary

In a stark example of a malicious insider threat, Angelo Martino, a 41-year-old former ransomware negotiator, has pleaded guilty to federal charges of conspiring with the BlackCat (ALPHV) ransomware gang. While employed at DigitalMint, a crypto broker that helps victims pay ransoms, Martino secretly fed the attackers sensitive information about his own clients. This included details about their insurance coverage and internal negotiation limits, allowing BlackCat to extort higher payments. Martino also admitted to actively conspiring in ransomware attacks, betraying the trust of the companies he was hired to help. Authorities have seized approximately $10 million in assets from Martino.

Threat Overview

This case highlights a dangerous evolution of the insider threat, where a trusted security professional actively colludes with a major ransomware group. Martino's role was twofold:

  1. Aiding Extortion: While negotiating on behalf of victims, he acted as an informant for BlackCat. By revealing a company's true ability to pay (e.g., their cyber insurance limit), he ensured the gang would not settle for a lower amount, thus maximizing the criminals' profit.
  2. Conspiring in Attacks: Beyond just passing information, Martino admitted to actively conspiring with others to deploy ransomware against U.S. victims, effectively becoming part of the criminal enterprise himself.

The scheme resulted in massive payouts from victims in hospitality, financial services, and non-profit sectors, with some ransoms reaching over $25 million.

Technical Analysis

While this is primarily a story of human betrayal, it intersects with the ransomware TTPs of the BlackCat group.

  • Insider Knowledge: Martino's contribution maps to the reconnaissance and resource development phases of an attack. His intel allowed BlackCat to bypass much of the uncertainty in the negotiation process.
  • Ransomware Deployment: As a conspirator, Martino was involved in attacks that used standard BlackCat methods, which typically involve gaining access via compromised credentials or vulnerabilities, lateral movement, data exfiltration (T1048 - Exfiltration Over Alternative Protocol), and finally, data encryption (T1486 - Data Encrypted for Impact).
  • Money Laundering: After a victim paid a $1.2 million ransom in Bitcoin, the group, including Martino, laundered the funds through a series of transactions (T1136 - Create Account), a common tactic to obscure the flow of illicit cryptocurrency.

This case demonstrates that the 'human element' in cybersecurity is not just about user error; it can also be about malicious intent from those in positions of trust. It fundamentally changes the threat model for incident response.

Impact Assessment

  • For Victims: The companies betrayed by Martino suffered greater financial losses than they might have otherwise. They were negotiating against an opponent who held all the cards.
  • For the IR Industry: The case damages the trust between victim organizations and third-party incident response and negotiation firms. Companies will now need to apply greater scrutiny to the partners they hire in a crisis.
  • Legal Precedent: The successful prosecution and significant asset seizure send a strong message to any other individuals considering colluding with cybercriminals.

IOCs — Directly from Articles

No technical Indicators of Compromise were provided in the source articles.

Cyber Observables — Hunting Hints

Detecting this type of insider threat is extremely difficult and relies more on behavioral and procedural controls than technical indicators. However, some patterns might be observable:

Type
Other
Value
Unusually short or efficient ransom negotiations.
Description
If a negotiator consistently settles at or near the top of a known insurance limit, it could be a red flag.
Type
Other
Value
Communication with known threat actor infrastructure.
Description
An IR team member communicating with non-sanctioned C2s or dark web forums would be a major indicator.
Type
Financial
Value
Unexplained wealth or financial transactions.
Description
Law enforcement likely used financial analysis to track Martino's illicit gains.

Detection & Response

  • Detection: Detection is less about logs and more about process. Organizations should use multiple, independent parties for different aspects of incident response (e.g., separate firms for forensics, negotiation, and legal counsel) to create checks and balances. Conduct thorough background checks on all third-party IR personnel.
  • Response: In a negotiation, never reveal your upper limit or insurance coverage to your negotiator. Treat it as privileged information shared only with legal counsel. If collusion is suspected, immediately engage law enforcement and a new, vetted IR partner.

Mitigation

  1. Due Diligence: Conduct extreme due diligence when selecting a third-party incident response or negotiation firm. Check references, a history of successful engagements, and their standing in the security community.
  2. Compartmentalize Information: During an incident, strictly compartmentalize information. The negotiation team does not need to know the full technical details from the forensics team, and vice versa. Your maximum payment authority should be known only to executive leadership and legal counsel.
  3. Involve Law Enforcement: Engage law enforcement (such as the FBI) early in a major ransomware incident. They have resources and intelligence that can help identify and pursue the actors, as demonstrated in this case.
  4. Internal Controls: For IR firms, implement strict internal controls, codes of conduct, and regular audits to prevent this type of malicious activity. This includes monitoring employee communications and financial activities where legally permissible.

Timeline of Events

1
April 22, 2026
This article was published

MITRE ATT&CK Mitigations

While Martino was a malicious actor, this case highlights the need for strong ethics and insider threat awareness programs within the cybersecurity industry.

Audit

M1047enterprise

Organizations engaging IR firms should have their own legal counsel audit the negotiation process and communications to ensure proper conduct.

D3FEND Defensive Countermeasures

The Angelo Martino case is a stark reminder that third-party risk extends to incident response partners. Organizations must implement a stringent due diligence process when selecting a ransomware negotiator or IR firm. This includes conducting background checks, verifying industry reputation through trusted channels (like InfraGard or local ISACs), and checking for a history of successful, ethical resolutions. Contracts should include clear codes of conduct, confidentiality clauses, and the right to audit communications. Furthermore, to create checks and balances, companies should consider using separate firms for technical forensics, legal counsel, and ransom negotiation, preventing any single entity from controlling all information in a high-stakes incident.

To defend against a compromised negotiator, victim organizations must practice strict information isolation. The ransomware negotiator does not need to know, and should never be told, the company's cyber insurance limit or the absolute maximum payment authorized by the board. This critical information should be confined to a small circle of executive leadership and the company's external legal counsel. The negotiator should be given a target payment amount and a smaller, incremental negotiation ceiling. By compartmentalizing this sensitive financial information, the company removes the key leverage that a malicious insider like Martino could provide to the threat actors, forcing the negotiation to proceed based on the attacker's perceived risk rather than their knowledge of the victim's ability to pay.

Sources & References

Former Ransomware Negotiator Pleads Guilty to Working For BlackCat Cyber Gang
Infosecurity Magazine (infosecurity-magazine.com) April 22, 2026
Ransomware negotiator admits role in attacks he was hired to resolve
Help Net Security (helpnetsecurity.com) April 21, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Insider ThreatBlackCatALPHVRansomwareCybercrimeDOJ

📢 Share This Article

Help others stay informed about cybersecurity threats