Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Global Proxy Network Taken Down by Authorities

March 12, 2026

Zero Trust Unleashed: Zscaler & CimTrak’s Integrity-First Defense

March 12, 2026

Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules

March 12, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Feds Link DigitalMint Negotiator to $75M Ransomware Extortion
Cybercrime and Ransomware

Feds Link DigitalMint Negotiator to $75M Ransomware Extortion

Staff WriterBy Staff WriterMarch 12, 2026No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Summary Points

  1. A 41-year-old South Florida man, Angelo John Martino III, is accused of orchestrating at least 10 ransomware attacks, extorting approximately $75.25 million while serving as a ransomware negotiator for DigitalMint.
  2. Martino allegedly used his position to negotiate on behalf of victims while secretly collaborating with cybercriminals, notably gaining access to ALPHV/BlackCat, and providing confidential negotiation information to maximize ransom payments.
  3. He was charged with conspiracy to interfere with commerce by extortion, with authorities seizing over $12 million in cryptocurrency, luxury vehicles, and properties in Florida, and he faces up to 20 years in prison.
  4. DigitalMint stated they terminated Martino’s employment upon learning of the investigation and claim to have cooperated fully with law enforcement, emphasizing they were unaware of his criminal activities when hired.

Key Challenge

A 41-year-old man from South Florida, Angelo John Martino III, is accused of orchestrating at least ten ransomware attacks, extorting approximately $75.25 million from victims in 2023. Remarkably, Martino was employed as a ransomware negotiator for DigitalMint, a company that had hired him to assist clients in negotiating ransom payments. However, federal authorities allege that he exploited this position by secretly collaborating with a notorious hacking group called ALPHV, also known as BlackCat, to hack into networks, steal data, and encrypt information, thereby extorting victims for massive sums. The situation is complicated because Martino, while acting as a negotiator, was allegedly playing both sides—helping victims while secretly aiding the attackers—an unethical dual role that led to indictments and confiscation of assets, including millions in cryptocurrency and property. Prosecutors report that Martino’s actions not only breached ethical boundaries but also resulted in the victims, including a nonprofit and companies across various industries, paying exorbitant ransoms, with some reaching nearly $27 million. The case, reported by federal authorities and law enforcement, underscores the dark complexities of ransomware negotiations, revealing how insiders can manipulate both victim companies and law enforcement while facilitating cybercriminal operations.

Risks Involved

The recent federal warning about a DigitalMint negotiator involved in ransomware attacks and extorting $75 million highlights a real threat that can strike any business. If your company experiences a cyberattack, hackers can encrypt your data, causing massive operational disruptions and financial losses. Moreover, extortion demands can escalate costs and threaten your reputation, especially if negotiations go public. As cybercriminals become more sophisticated, businesses lacking strong cybersecurity measures are at increased risk. Ultimately, such incidents can destroy trust, lead to significant downtime, and impose unexpected financial burdens—making cybersecurity a critical priority for every organization.

Possible Action Plan

In today’s rapidly evolving cyber threat landscape, prompt remediation is essential to mitigate damage, restore trust, and prevent further malicious activities, especially when sensitive information and critical infrastructure are at risk. The urgency of addressing compromises like those involving DigitalMint negotiators underscores the importance of swift and effective action to contain threats and minimize financial and reputational harm.

Containment Measures

Immediately isolate affected systems to prevent ransomware spread, cutting off attacker access and stopping ongoing encryption or extortion activities.

Incident Response

Activate the organization’s incident response team to assess the scope of the breach quickly and gather pertinent evidence for forensic analysis.

Vulnerability Patch

Identify and remediate exploited vulnerabilities, ensuring patches and updates are applied to close security gaps exploited during the attack.

Access Control

Review and enhance access controls, implementing multi-factor authentication and least privilege principles to restrict attacker movement and reduce insider threat risks.

Communication

Inform all stakeholders, including law enforcement and relevant regulatory bodies, to coordinate response efforts and comply with legal obligations.

Credential Reset

Change compromised credentials and enforce password resets to prevent further unauthorized access.

Artifact Analysis

Conduct detailed forensic investigations to understand the attack vectors, tactics, and indicators of compromise, informing future defenses.

Backup Restoration

Verify the integrity of backups and restore affected systems from clean copies to eliminate malicious footholds and resume operations safely.

Monitoring

Enhance real-time monitoring and alerting systems to detect anomalous activity early, enabling quicker responses to potential threats.

User Training

Implement targeted security awareness training to help employees recognize and prevent social engineering and phishing attempts that could facilitate similar attacks.

Continue Your Cyber Journey

Discover cutting-edge developments in Emerging Tech and industry Insights.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1cyberattack-v1-multisource

ALPHV blackcat CISO Update cyber risk cybercrime Cybersecurity department of justice (doj) digitalmint Incident response Justice Department MX1 Ransomware ransomware negotiation ransomware payments risk management
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCritical Vulnerability: SolarWinds Web Help Desk Deserialization Enables Remote Command Execution
Next Article Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Global Proxy Network Taken Down by Authorities

March 12, 2026

Zero Trust Unleashed: Zscaler & CimTrak’s Integrity-First Defense

March 12, 2026

Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules

March 12, 2026

Comments are closed.

Latest Posts

Global Proxy Network Taken Down by Authorities

March 12, 2026

Zero Trust Unleashed: Zscaler & CimTrak’s Integrity-First Defense

March 12, 2026

Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules

March 12, 2026

Feds Link DigitalMint Negotiator to $75M Ransomware Extortion

March 12, 2026
Don't Miss

Global Proxy Network Taken Down by Authorities

By Staff WriterMarch 12, 2026

Essential Insights Authorities from multiple countries dismantled SocksEscort, a large residential proxy network used for…

Zero Trust Unleashed: Zscaler & CimTrak’s Integrity-First Defense

March 12, 2026

Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules

March 12, 2026

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • Global Proxy Network Taken Down by Authorities
  • Zero Trust Unleashed: Zscaler & CimTrak’s Integrity-First Defense
  • Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules
  • Feds Link DigitalMint Negotiator to $75M Ransomware Extortion
  • Critical Vulnerability: SolarWinds Web Help Desk Deserialization Enables Remote Command Execution
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Global Proxy Network Taken Down by Authorities

March 12, 2026

Zero Trust Unleashed: Zscaler & CimTrak’s Integrity-First Defense

March 12, 2026

Officials Fear Apathy Is Killing Momentum for Tougher Telecom Security Rules

March 12, 2026
Most Popular

The New Face of DDoS is Impacted by AI

August 4, 202523 Views

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202511 Views

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.