US charges another ransomware negotiator linked to BlackCat attacks
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要快速浏览一下文章内容。文章主要讲的是美国司法部起诉了DigitalMint的一名前员工Angelo Martino,他参与了一个内部计划,和BlackCat勒索软件团伙合作。Martino在DigitalMint工作时泄露了谈判信息,并参与了多次勒索攻击。受害者包括多家美国组织,比如医疗设备制造商、医疗机构、律师事务所等。DigitalMint的CEO谴责了这种行为,并表示已经终止了涉事员工的职务,并与执法部门合作。 接下来,我需要提取关键信息:起诉对象、涉及的公司、BlackCat勒索软件、受害者情况以及公司的回应。然后把这些信息浓缩到100字以内。 可能的结构是:美国司法部起诉DigitalMint前员工Angelo Martino,指控其与BlackCat团伙合作进行勒索攻击,涉及多家美国机构。DigitalMint已终止其职务并配合调查。 这样应该可以控制在100字以内,并且直接描述内容。 </think> 美国司法部起诉DigitalMint前员工Angelo Martino,指控其与BlackCat勒索软件团伙合谋,在任职期间泄露谈判信息并参与多起勒索攻击,受害者包括多家美国组织。DigitalMint已终止其职务并配合调查。 2026-3-12 11:45:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:6 收藏

Hacking

The U.S. Department of Justice charged another former DigitalMint employee for his involvement in an insider scheme in which ransomware negotiators secretly partnered with the BlackCat (ALPHV) ransomware operation.

Angelo Martino has been charged with one count of conspiracy to interfere with interstate commerce by extortion after surrendering to the U.S. Marshals on March 10.

According to unsealed court documents, Martino shared confidential information regarding ongoing negotiations with BlackCat operators while working as a ransomware negotiator for DigitalMint, a cybersecurity company specializing in ransomware incident responses.

Between April 2023 and April 2025, Martino was also directly involved in ransomware attacks alongside accomplices Kevin Tyler Martin (a former DigitalMint employee) and Ryan Goldberg (a former Sygnia incident response manager).

Martino was previously identified only as "Co-Conspirator 1" in an October 2025 indictment that charged Martin and Goldberg, who pleaded guilty and are scheduled to be sentenced in April.

The defendants allegedly operated as BlackCat affiliates, demanding ransom payments while threatening to leak data stolen from victims' networks. Prosecutors also claimed that the defendants were paying the BlackCat administrators a 20% share of collected ransoms in exchange for access to the ransomware and extortion portal.

The list of victims included at least five U.S. organizations, among them a Tampa-based medical device manufacturer that paid a $1.27 million ransom. Other targets include organizations and companies across a wide range of industries, such as medical facilities, law firms, school districts, and financial services companies.

In a statement to BleepingComputer, DigitalMint CEO Jonathan Solomon condemned the conduct, noting that the company had terminated both after learning of Martin and Martino's actions and had fully cooperated with law enforcement from the outset of the investigation.

"We strongly condemn these former employees' criminal behavior, which violated our values, ethical standards, and the law. When we learned about the conduct, we immediately terminated both individuals," Solomon said.

"DigitalMint has fully cooperated with law enforcement from the outset and does not expect further charges. While no organization can completely eliminate insider risk, we take incidents like this extremely seriously and have strengthened safeguards and internal controls to further reduce the likelihood of similar conduct."

BlackCat ransomware was previously linked by the FBI to more than 60 breaches between November 2021 and March 2022. In a separate advisory, the bureau also said the cybercrime gang raked in at least $300 million in payments from over 1,000 victims until September 2023.

Years earlier, in 2019, ProPublica reported that some U.S. data recovery firms secretly paid ransomware gangs that were pressuring their clients with ransom demands, while charging customers for restoration services without disclosing those payments.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/us-charges-another-ransomware-negotiator-linked-to-blackcat-attacks/
如有侵权请联系:admin#unsafe.sh