Internal betrayal in the Ransomware era: former employee of DigitalMint accused of collaborating with BlackCat / ALPHV

Published 4 min de lectura 88 reading

The U.S. prosecution has accused a new former employee of DigitalMint for his alleged participation in a scheme in which rescue negotiators secretly collaborated with the Ransomware operation known as BlackCat, also called ALPHV. According to published judicial documents the accused, identified as Angelo Martino, surrendered to the U.S. Marshals and was accused of conspiracy to interfere with the interstate trade by extortion.

The tax records describe a disturbing pattern: while working as a mediator in Ransomware incidents for DigitalMint, Martino would have shared confidential information about active negotiations with BlackCat operators. In addition, the investigations point out that between April 2023 and April 2025 he was directly involved in attacks with other accomplices linked to the same group, persons who had already appeared in a previous indictment where Martino was mentioned as "Co-Conspirator 1."

Internal betrayal in the Ransomware era: former employee of DigitalMint accused of collaborating with BlackCat / ALPHV
Image generated with IA.

The prosecution claims that those involved acted as BlackCat affiliates, extorting victims by encryption and threatening to publish the stolen data. Part of the scheme was to pay BlackCat administrators a fraction of the bailouts collected - according to prosecutors about 20% - in exchange for access to the group's infrastructure and its extortion portal.

The victims identified include at least five United States organizations, with sectors as diverse as manufacturers of medical devices, law firms, school districts and financial institutions. One of the documented cases involves a Tampa-based medical device manufacturer who, according to the prosecution, paid $1.27 million to recover access to their systems.

DigitalMint, the company Martino worked for, has publicly declared its conviction of the facts, indicating that those involved were fired as soon as the conduct was known and that the company has collaborated with the authorities since the start of the investigation. In its response, the management team stressed that, although no system is infallible against internal risk, controls and safeguards have been strengthened to reduce the likelihood of similar events.

This case highlights a structural problem in responding to incidents: the trust that organizations place in intermediaries and specialists to negotiate with digital criminals can become a back door if these mediators are corrupted or have double links. These are not just technical errors or perimetral safety failures, but the threat posed by a internal threat with privileged access to sensitive conversations and the victim's strategic information.

BlackCat / ALPHV is not a minor actor: independent agencies and reports have linked this group to dozens of gaps and extensive extortion in recent years. To contextualize, public security organizations and journalists have documented the growing sophistication of these networks and the enormous economic volume involved in the rescue business; an example of the analysis of opaque practices in the data recovery industry can be read in the research of ProPublica of 2019, which explored how some companies paid criminal groups without transparency with their clients.

The episode opens a number of practical and ethical questions for companies that hire incident response services: how to audit the integrity of negotiators? What controls should exist on the management of sensitive information during a negotiation? To what extent should they rely on intermediaries that manage payments and retransmit communications? The responses go through stricter policies of separation of duties, continuous forensic supervision, enhanced access controls and contractual clauses that require transparency with clients and authorities where there is evidence of irregular conduct.

Internal betrayal in the Ransomware era: former employee of DigitalMint accused of collaborating with BlackCat / ALPHV
Image generated with IA.

At the preventive and response level, security agencies recommend not only technical measures but also clear procedures for crisis management and the relationship with external suppliers. Institutional resources such as those offered by the CISA and FBI are useful benchmarks for organizations that want to update their plans against ransomware and know best practices recognized by the public sector.

The case against Martino and his alleged collaborators also underlines the importance of companies reporting incidents and cooperating with the authorities. Beyond the criminal responsibility that the individuals involved can face, research helps to understand the criminal economies that feed the Ransomware industry and to develop collective defenses. Cybersecurity institutions and professionals should interpret these types of cases as a call for attention: the fight against the Ransomware is not only won with patches and backups, but also with well-designed governance, transparency and human controls.

For those who want to deepen the documents of the process and the previous journalistic research, the statement cited in the judicial documents and the background research published by ProPublica. These sources help to understand how the rescue economy has intertwined with actors who, in some cases, should be part of the defense of the victims and not facilitators of extortion.

Coverage

Related

More news on the same subject.