Executive Summary
In April 2026, Angelo Martino, a former ransomware negotiator at DigitalMint, pleaded guilty to collaborating with the BlackCat (ALPHV) ransomware group in 2023. Martino, along with accomplices Ryan Goldberg and Kevin Martin, exploited their insider positions to share confidential negotiation details with BlackCat operators, facilitating the extortion of higher ransom payments from U.S. organizations. Their victims included financial services firms, nonprofits, law firms, school districts, and medical facilities, with ransom payments exceeding $50 million. The trio operated as BlackCat affiliates, paying the ransomware administrators a 20% share of the proceeds. (bleepingcomputer.com)
This case underscores the critical need for stringent internal controls and trust verification within cybersecurity firms. The involvement of trusted insiders in cybercriminal activities highlights the evolving tactics of ransomware groups and the importance of comprehensive security measures to protect sensitive information and maintain organizational integrity.
Why This Matters Now
The incident highlights the urgent need for organizations to implement robust internal security protocols and employee vetting processes to prevent insider threats, especially as ransomware groups increasingly exploit trusted positions to maximize their extortion efforts.
Attack Path Analysis
The attackers gained initial access through compromised credentials, escalated privileges to obtain domain administrator rights, moved laterally using RDP, established command and control channels, exfiltrated sensitive data, and finally encrypted systems to demand ransom.
Kill Chain Progression
Initial Compromise
Description
Attackers gained access using compromised credentials, possibly obtained through phishing or credential stuffing.
MITRE ATT&CK® Techniques
Phishing
Valid Accounts
Data Encrypted for Impact
Inhibit System Recovery
Impair Defenses: Disable or Modify Tools
Remote Services: SMB/Windows Admin Shares
Network Service Discovery
Network Share Discovery
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure that security policies and operational procedures for detecting and responding to failures of critical security control systems are documented, in use, and known to all affected parties.
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 5
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
BlackCat ransomware specifically targeted financial firms, with one paying $25.66M ransom. Insider threat from negotiators compromised confidential insurance limits and negotiation positions.
Health Care / Life Sciences
Medical facilities were explicitly targeted by BlackCat affiliates who leveraged insider knowledge of HIPAA compliance requirements and insurance policies to maximize extortion.
Legal Services
Law firms suffered BlackCat attacks where ransomware negotiators betrayed client confidentiality, sharing privileged information about insurance coverage and negotiation strategies with criminals.
Primary/Secondary Education
School districts faced BlackCat ransomware attacks with compromised incident response, as trusted cybersecurity negotiators secretly aided attackers in maximizing ransom demands.
Sources
- Former ransomware negotiator pleads guilty to BlackCat attackshttps://www.bleepingcomputer.com/news/security/former-ransomware-negotiator-pleads-guilty-to-blackcat-attacks/Verified
- Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Varianthttps://www.justice.gov/usao-sdfl/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variantVerified
- US cybersecurity professionals plead guilty to Blackcat ransomware attackshttps://www.techradar.com/pro/security/us-cybersecurity-professionals-plead-guilty-to-blackcat-ransomware-attacksVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust Cloud Native Security Fabric (CNSF) is pertinent to this incident as it could likely limit the attacker's ability to escalate privileges, move laterally, establish command and control channels, and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: While Aviatrix CNSF may not prevent initial credential compromise, it could likely limit the attacker's ability to exploit these credentials to access sensitive workloads.
Control: Zero Trust Segmentation
Mitigation: Aviatrix Zero Trust Segmentation could likely limit the attacker's ability to escalate privileges by enforcing strict access controls and minimizing the attack surface.
Control: East-West Traffic Security
Mitigation: Aviatrix East-West Traffic Security could likely limit the attacker's ability to move laterally by monitoring and controlling internal traffic flows.
Control: Multicloud Visibility & Control
Mitigation: Aviatrix Multicloud Visibility & Control could likely limit the attacker's ability to establish command and control channels by providing comprehensive monitoring and management across cloud environments.
Control: Egress Security & Policy Enforcement
Mitigation: Aviatrix Egress Security & Policy Enforcement could likely limit the attacker's ability to exfiltrate data by controlling and monitoring outbound traffic.
While Aviatrix CNSF may not prevent the initial encryption of systems, it could likely limit the overall impact by containing the attacker's reach and reducing the blast radius.
Impact at a Glance
Affected Business Functions
- Financial Services
- Nonprofit Operations
- Legal Services
- Educational Administration
- Healthcare Services
Estimated downtime: 21 days
Estimated loss: $52,353,000
Confidential client information, financial records, personal identifiable information (PII), and sensitive medical data.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement and limit access to critical systems.
- • Deploy East-West Traffic Security to monitor and control internal network communications, detecting unauthorized movements.
- • Utilize Egress Security & Policy Enforcement to prevent unauthorized data exfiltration and block communication with malicious external servers.
- • Enhance Threat Detection & Anomaly Response capabilities to identify and respond to suspicious activities promptly.
- • Regularly update and patch systems to mitigate vulnerabilities exploited during initial compromise.



