Federal prosecutors in the United States have escalated their campaign against cybercrime facilitators, formally charging a third individual in a sophisticated insider scheme where professionals ostensibly hired to mitigate ransomware attacks allegedly collaborated directly with the notorious BlackCat (ALPHV) ransomware group. The indictment of Angelo Martino underscores a troubling intersection of trust and betrayal within the cybersecurity incident response sector, revealing how those entrusted with protecting victims instead allegedly aided their digital adversaries. This development broadens the scope of a previously unveiled conspiracy, highlighting the intricate and often shadowy networks that enable high-stakes cyber extortion.
Angelo Martino, a former employee of DigitalMint, a firm specializing in ransomware incident response, voluntarily surrendered to U.S. Marshals on March 10. He now faces a single charge of conspiracy to interfere with interstate commerce by extortion, a serious felony reflecting the gravity of the alleged offenses. Unsealed court documents delineate Martino’s pivotal role in the illicit operation, asserting that he systematically shared sensitive, confidential information pertaining to ongoing ransom negotiations directly with BlackCat operators. This clandestine exchange of intelligence compromised the integrity of the negotiation process, effectively giving the cybercriminals an unparalleled advantage over their desperate victims.
The timeline of Martino’s alleged involvement spans a significant period, from April 2023 to April 2025. During this time, he was not merely a passive conduit of information but reportedly an active participant in the ransomware attacks themselves. His alleged co-conspirators include Kevin Tyler Martin, also a former DigitalMint employee, and Ryan Goldberg, who previously served as an incident response manager at Sygnia. This trio, collectively identified as orchestrators of the scheme, allegedly operated as affiliates of the BlackCat ransomware-as-a-service (RaaS) enterprise. Martino had been previously referred to only as "Co-Conspirator 1" in an October 2025 indictment that brought charges against Martin and Goldberg. Both individuals have since pleaded guilty to their roles in the conspiracy and are awaiting sentencing, which is scheduled for April.
The operational methodology of the alleged conspirators mirrored that of typical ransomware affiliates. They are accused of deploying the BlackCat ransomware against targeted organizations, subsequently demanding substantial ransom payments, often accompanied by threats to publicly release sensitive data exfiltrated from the victims’ compromised networks. A critical aspect of their alleged arrangement with the BlackCat administrators involved a revenue-sharing model. Prosecutors contend that the defendants remitted a 20% share of all collected ransoms to the BlackCat core group in exchange for access to the ransomware toolkit and the associated extortion portal, thereby cementing their position within the cybercriminal ecosystem.
The scale of the conspiracy’s impact was considerable, with at least five U.S.-based organizations falling victim to their alleged machinations. Among the identified targets was a medical device manufacturer located in Tampa, Florida, which reportedly succumbed to the extortion demands, paying a staggering $1.27 million ransom. The list of affected entities extended across a diverse spectrum of industries, encompassing critical sectors such as medical facilities, esteemed law firms, educational institutions in the form of school districts, and companies operating within the financial services industry. This broad targeting underscores the indiscriminate nature of ransomware attacks and the wide-ranging damage they inflict.
The incident has sent ripples through the cybersecurity incident response community, prompting a strong condemnation from DigitalMint. Jonathan Solomon, the CEO of DigitalMint, issued a statement to BleepingComputer, expressing profound disapproval of the alleged criminal conduct. Solomon confirmed that both Martin and Martino were immediately terminated from their positions upon the company’s discovery of their actions. Furthermore, he emphasized DigitalMint’s unwavering cooperation with law enforcement agencies since the inception of the investigation, signaling the company’s commitment to transparency and accountability. While acknowledging the inherent challenges in completely eradicating insider risk, Solomon stated that the company has proactively reinforced its safeguards and internal controls to mitigate the likelihood of similar breaches of trust in the future.
The Perilous Intersection of Trust and Treachery in Cybersecurity
This case illuminates a critical vulnerability within the cybersecurity incident response industry: the insider threat. Firms specializing in aiding victims of cyberattacks are granted extraordinary levels of trust, often accessing highly sensitive client information, including network architecture, vulnerabilities, and financial data related to ransom payments. When individuals within these organizations betray that trust, the consequences can be catastrophic, not only for the immediate victims but also for the reputation and integrity of the entire sector. The ethical dilemma is stark: those positioned to help are instead allegedly profiting from their clients’ distress, effectively turning saviors into saboteurs.

The BlackCat (ALPHV) ransomware operation itself represents a formidable and adaptable adversary in the cyber threat landscape. Recognized as a highly sophisticated RaaS variant, BlackCat emerged as a successor to other prominent ransomware groups, distinguishing itself through its use of the Rust programming language, which offers enhanced evasiveness and cross-platform compatibility. The Federal Bureau of Investigation (FBI) previously linked BlackCat to over 60 breaches globally between November 2021 and March 2022, underscoring its widespread reach. By September 2023, the bureau estimated that BlackCat had extorted at least $300 million in payments from more than 1,000 victims, solidifying its position as one of the most lucrative cybercrime syndicates. The group’s reliance on an affiliate model, where various actors are recruited to execute attacks in exchange for a percentage of the ransom, makes incidents like the DigitalMint scheme particularly attractive to them, as it provides direct access to victim networks and confidential negotiation intelligence.
Historical Context and Industry Implications
The concept of incident response firms secretly collaborating with or paying ransomware gangs is not entirely unprecedented. As far back as 2019, investigative reports by ProPublica highlighted instances where U.S. data recovery firms were found to be secretly paying ransomware groups that were pressuring their clients, all while charging customers for data restoration services without full disclosure of these underlying payments. This earlier reporting set a precedent for the ethical quandaries that plague this highly specialized and often opaque industry. The current charges against Martino, Martin, and Goldberg suggest a more direct and insidious form of collaboration, where the negotiators themselves become active participants in the attacks, rather than merely facilitators of secret payments.
The implications for the cybersecurity industry are profound. This incident will undoubtedly lead to increased scrutiny of the vetting processes, internal controls, and ethical guidelines within incident response firms. Clients, particularly those in sensitive sectors, will likely demand greater transparency and more robust assurances regarding the integrity of their chosen partners. Companies like DigitalMint, despite their swift action and cooperation, face the arduous task of rebuilding trust in an environment where such breaches can cause irreparable damage to client relationships. The necessity for stringent background checks, continuous employee monitoring, and the implementation of least privilege access for sensitive data becomes even more critical.
Future Outlook and Mitigation Strategies
The U.S. Department of Justice’s proactive stance in pursuing and prosecuting individuals who facilitate cybercrime, regardless of their professional affiliation, sends a clear message. This aggressive enforcement strategy aims to dismantle the entire ecosystem of ransomware, targeting not only the core developers but also the affiliates, negotiators, and enablers who contribute to its operational success. Such legal actions are crucial for deterring future illicit collaborations and reinforcing the rule of law in the digital realm.
For organizations seeking to protect themselves against ransomware, this case serves as a stark reminder of the multifaceted nature of threats. While external defenses remain paramount, the insider threat, particularly from trusted third-party vendors, cannot be overlooked. Organizations must implement robust internal security measures, including multi-factor authentication, regular security audits, and comprehensive employee training. Furthermore, when engaging incident response firms, thorough due diligence is essential. This includes scrutinizing their internal security protocols, ethical codes of conduct, and transparency around their negotiation practices. Establishing clear contractual agreements that outline responsibilities, data handling protocols, and non-disclosure clauses can also provide an additional layer of protection.
Ultimately, the ongoing legal proceedings against Angelo Martino and his co-conspirators highlight the continuous evolution of cyber threats and the sophisticated methods employed by criminal enterprises to exploit any vulnerability, including human trust. The pursuit of justice in these cases is not just about holding individuals accountable, but also about reinforcing the integrity of the cybersecurity defense ecosystem and fortifying collective resilience against the relentless tide of cyber extortion.






