Ransomware victims got played by their own negotiators

UnitedHealth Group CEO Andrew Witty Testifies Before Senate Finance Committee
Andrew Witty, CEO of UnitedHealth Group, during a Senate committee hearing in 2024 after a cyberattack by Alphv paralyzed much of the U.S. health care system.
Al Drago/Bloomberg
  • Key insight: The case of two convicted cybersecurity professionals brought to light the actions of a third co-conspirator who gave sensitive breach details — including cyber-insurance policy limits — to a ransomware group he secretly worked for.
  • What's at stake: Prosecutors said the cybersecurity professionals' conduct erodes victims' willingness to retain the very experts they rely on to defend against ransomware attacks.
  • Supporting data: Five DigitalMint clients of Angelo Martino paid $75.25 million in ransoms while he allegedly leaked their negotiating positions to Alphv, including $25.66 million from a U.S. financial services firm.

Overview bullets generated by AI with editorial review.

Processing Content

On Thursday, a federal judge sentenced two former cybersecurity professionals to four years each in prison for using ransomware to attack U.S. companies.

Ryan Goldberg, 40, formerly of incident response firm Sygnia, and Kevin Martin, 36, formerly of ransomware negotiation firm DigitalMint, pleaded guilty in December to a federal extortion conspiracy, according to a Thursday press release from the Justice Department.

A third co-conspirator, Angelo Martino, 41, also formerly of DigitalMint, pleaded guilty on April 20.

Sygnia has publicly confirmed Goldberg as a former employee, and DigitalMint has publicly confirmed Martin and Martino as former employees. Both employers have said that they terminated the men upon learning about the federal investigations into wrongdoing.

The case raises a pointed question for any bank that retains an incident-response or ransomware-negotiation firm: What stops the vendors brought in to handle a breach from feeding the attackers the firm's insurance limits?

A U.S. financial services company, whose name does not appear in court records, paid roughly $25.66 million in ransom to a ransomware group while Martino was negotiating on the firm's behalf as a DigitalMint employee.

During that period, Martino secretly fed the attackers the firm's confidential negotiating information, according to Martino's factual proffer (a court filing in which a defendant and prosecutors agree on the facts the government would prove at trial), filed April 14.

That ransomware group Martino assisted under the table was Alphv (often stylized ALPHV), also known as BlackCat. The ransomware strain first appeared in late 2021 and went on to compromise more than 1,000 victims worldwide, including government facilities, defense industrial base companies and health care facilities, according to a December 2023 Justice Department disruption announcement.

Alphv ran on a "ransomware-as-a-service" model: a small set of administrators built and maintained the malware while recruiting outside affiliates to break into victim networks and deploy it, splitting any ransoms paid.

Starting in 2023, Goldberg, Martin and Martino operated as Alphv affiliates, agreeing to give the ransomware's administrator 20% of any ransoms in exchange for access to the malware and the extortion platform, according to Martin's factual proffer.

The three worked together: Goldberg gained initial access to victim networks. Martin stole data and encrypted networks. Martino handled negotiations and laundered the proceeds.

The negotiator who played both sides

While drawing a paycheck from DigitalMint as a negotiator hired by ransomware victims, Martino secretly fed the attackers his clients' insurance limits and internal negotiating positions through a private chat channel inside the Alphv platform, according to the Martino proffer. The Alphv actors paid him for the information.

According to the same filing, in one September 2023 negotiation against a U.S. hospitality company, Martino told an Alphv actor in the private channel that "the [insurance] carrier is only approving small amounts — keep denying our offers and i will let you know once i find out the max the[y] want to pay." The hospitality firm paid roughly $16.48 million.

Martino used the same tactic against four other DigitalMint clients, according to the filing. His five victims paid ransoms totaling about $75.25 million: a nonprofit ($26.79 million), the financial services firm ($25.66 million), the hospitality firm ($16.48 million), a retail company ($6.1 million), and a medical company ($213,000).

Authorities have seized roughly $10 million from Martino, including cryptocurrency, two Florida properties, vehicles, a food truck and a 29-foot fishing boat.

Prosecutors did not allege that DigitalMint had knowledge of Martino's scheme, according to the government's sentencing memo.

DigitalMint's chief executive, Jonathan Solomon, and his team "strongly condemn" the conduct and fired Martino the day after the Justice Department informed the company about the investigation, according to a written statement Solomon gave to multiple news outlets.

What this means for banks that buy incident response

Banks routinely retain incident-response and ransomware-negotiation firms (the same kind of vendors all three men worked at) and share the most sensitive details of a breach with them, including cyber-insurance policy limits.

Prosecutors documented the systemic risk in the sentencing memo. Incident responders are "members of a small community of specialists whom victims, employers, and the broader public trust to stand between them and precisely the kind of attacks they chose to commit," prosecutors wrote.

The trio's conduct "erodes that willingness" to retain experts at all, prosecutors said in the memo.

The financial services industry paid roughly $365.6 million in ransoms from 2022 to 2024, according to a December 2025 analysis by the Financial Crimes Enforcement Network, an agency within the Department of the Treasury. This was the largest sum of any sector.

Alphv received the highest cumulative ransom payments of any variant identified in the report at about $395.3 million.

The threat actor shut down in early 2024 after a December 2023 disruption operation by the FBI and an exit scam in which the group's operators took the Change Healthcare ransom and disappeared.

The affiliate model that helped attackers extract $75.25 million from Martino's clients persists today across other ransomware variants.

Martino is set for sentencing July 9.


For reprint and licensing requests for this article, click here.
Cyber security Ransomware Fraud Vendor management Litigation Technology
MORE FROM AMERICAN BANKER
Load More