US Charges Another Ransomware Negotiator Linked to BlackCat Attacks

US Charges Another Ransomware Negotiator Linked to BlackCat Attacks

BleepingComputer
BleepingComputerMar 12, 2026

Companies Mentioned

Why It Matters

The case exposes insider risk inside incident‑response firms, threatening client trust and highlighting the need for stricter controls in ransomware negotiations.

Key Takeaways

  • DOJ indicts former DigitalMint negotiator for BlackCat collusion.
  • Martino shared negotiation intel, earned 20% ransom cut.
  • Victims include medical device maker paying $1.27M ransom.
  • DigitalMint terminated employees, pledged cooperation with law enforcement.
  • Case highlights insider threats within incident‑response firms.

Pulse Analysis

The BlackCat, also known as ALPHV, has become one of the most lucrative ransomware families since its emergence in 2021. Law‑enforcement estimates place its earnings above $300 million from more than a thousand victims worldwide, and the group’s modular code has been repurposed by dozens of affiliates. The latest development in the investigation reveals that the criminal ecosystem is not limited to external hackers; it also co‑opts insiders from incident‑response firms. Angelo Martino, a former negotiator at DigitalMint, allegedly passed confidential negotiation details to BlackCat operators and received a 20 percent share of the ransom proceeds, effectively turning a trusted intermediary into a conduit for extortion.

This breach of trust underscores a growing vulnerability within the very companies hired to mitigate ransomware damage. Incident‑response providers handle sensitive decryption keys, victim communications, and payment logistics, giving them privileged access to both attackers and victims. When employees exploit that access, the line between defender and perpetrator blurs, eroding client confidence and complicating law‑enforcement cooperation. DigitalMint’s swift termination of the implicated staff and its public cooperation signal an effort to restore credibility, but the episode forces the industry to reevaluate vetting procedures, monitoring of insider activity, and the segregation of negotiation duties from technical response teams.

Regulators and policymakers are likely to respond with tighter guidance on conflict‑of‑interest disclosures and mandatory reporting of insider‑related ransomware incidents. The Department of Justice’s aggressive prosecution sends a clear message that collusion between security firms and ransomware gangs will be pursued vigorously. For organizations, the lesson is two‑fold: diversify incident‑response partners to avoid single points of failure, and implement robust controls such as dual‑approval workflows for ransom negotiations. As ransomware groups continue to professionalize, the ability to detect and prevent insider collaboration will become a critical component of any comprehensive cyber‑risk strategy.

US charges another ransomware negotiator linked to BlackCat attacks

Comments

Want to join the conversation?

Loading comments...