Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Apr 22, 2026

Key Takeaways

  • A former ransomware negotiator has admitted to collaborating with the BlackCat (ALPHV) ransomware gang

  • Insider access was abused to leak sensitive negotiation data to attackers

  • Two additional cybersecurity professionals were also involved and have pleaded guilty

  • The case highlights a dangerous insider threat within incident response workflows

Overview

In a striking case of insider betrayal, a former ransomware negotiator has pleaded guilty to participating in ransomware attacks he was supposed to help mitigate.

The individual, Angelo Martino, previously worked at DigitalMint, a company specializing in ransomware negotiation and incident response. Instead of protecting victims, Martino secretly collaborated with the BlackCat (ALPHV) ransomware group, using privileged access to aid cybercriminal operations.

This incident underscores a growing risk in cybersecurity: trusted insiders turning into threat actors.

How the Attack Scheme Worked

Martino exploited his role as a negotiator — a position designed to help organizations recover from ransomware — to actively assist attackers.

According to prosecutors:

  • He shared confidential negotiation strategies with BlackCat operators

  • He disclosed insurance coverage details and ransom limits

  • This intelligence helped attackers optimize ransom demands and pressure tactics

In some cases, Martino was directly involved in facilitating ransomware attacks while simultaneously acting as a negotiator for victims — effectively playing both sides.

Others Involved in the Conspiracy

Martino was not acting alone. Two other cybersecurity professionals were also implicated:

  • Ryan Clifford Goldberg – Incident response manager

  • Kevin Tyler Martin – Ransomware negotiator

Both individuals have already pleaded guilty and face up to 20 years in prison.

The trio leveraged their deep understanding of incident response workflows to maximize the effectiveness of attacks.

About BlackCat (ALPHV)

BlackCat (also known as ALPHV) is one of the most notorious ransomware-as-a-service (RaaS) operations in recent years.

Key characteristics:

  • Written in Rust for speed and evasion

  • Operates via an affiliate model, taking a share of ransom payments

  • Known for double extortion tactics (encrypting + leaking data)

  • Has targeted hundreds of organizations globally

Its success largely depends on insider knowledge and initial access, making cases like this especially dangerous.

Legal Charges and Penalties

Martino has pleaded guilty to charges including:

  • Conspiracy to commit extortion

  • Interfering with interstate commerce

  • Damaging protected computer systems

He now faces:

  • Up to 20 years in prison

  • Sentencing scheduled for mid-2026

Why This Matters

This case represents a critical shift in ransomware risk dynamics:

1. Insider Threats Are Escalating

Security professionals with privileged access can become high-impact threat actors.

2. Negotiation Processes Are Vulnerable

Attackers gaining visibility into negotiation strategies can:

  • Increase ransom demands

  • Prolong attacks

  • Reduce chances of successful mitigation

3. Trust in Incident Response Is at Risk

Organizations rely heavily on third-party negotiators. Incidents like this may:

  • Force stricter vetting processes

  • Increase demand for transparency and monitoring

Technical & Strategic Implications

Category

Details

Threat Type

Insider-assisted ransomware

Ransomware Family

BlackCat (ALPHV)

Attack Vector

Abuse of negotiation access

Data Exposed

Negotiation strategies, insurance data

Impact

Higher ransom success rates, prolonged attacks

Actors Involved

3 cybersecurity professionals

Legal Outcome

Guilty pleas, up to 20 years imprisonment

ClearPhish Insight

This isn’t just a ransomware story — it’s a trust failure within the cybersecurity ecosystem.

When defenders become attackers:

  • Traditional security models break down

  • Detection becomes harder due to legitimate access

  • Damage becomes significantly more severe

For organizations, the takeaway is clear:

Zero trust must extend beyond systems — to people, processes, and partners.

Final Thoughts

The BlackCat case highlights a dangerous evolution in cybercrime — where insiders weaponize trust to amplify attacks.

As ransomware operations grow more sophisticated, defending against them will require:

  • Stronger internal controls

  • Behavioral monitoring

  • Continuous validation of trusted roles

Because sometimes, the biggest threat isn’t outside your network —
it’s already inside.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Former Ransomware Negotiator Pleads Guilty to BlackCat Attacks

Apr 22, 2026

New Lotus Data Wiper Targets Venezuelan Energy Sector

New Lotus Data Wiper Targets Venezuelan Energy Sector

New Lotus Data Wiper Targets Venezuelan Energy Sector

New Lotus Data Wiper Targets Venezuelan Energy Sector

New Lotus Data Wiper Targets Venezuelan Energy Sector

Apr 22, 2026

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

McGraw Hill Data Breach Exposes 13.5 Million Accounts via Salesforce Misconfiguration

Apr 17, 2026

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Rockstar Games Data Breach: ShinyHunters Leak Stolen Analytics Data in Extortion Attack

Apr 14, 2026

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Hackers Use Pixel-Sized SVG Trick to Hide Credit Card Stealers

Apr 10, 2026

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

VENOM Phishing Attacks Steal Microsoft Logins of Executives, Bypass MFA

Apr 10, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.