The federal prosecution of Angelo John Martino III has sent shockwaves through the cybersecurity industry, uncovering a sophisticated double-agent operation that redefined corporate betrayal by targeting the very victims he was paid to protect. As a former professional ransomware negotiator at DigitalMint, Martino is accused of exploiting his position of trust to orchestrate the very cyberattacks he was hired to resolve, turning a role intended for crisis mitigation into a lucrative criminal enterprise. According to federal court records unsealed in early 2025, his dual-sided scheme involved at least ten distinct ransomware incidents, netting a staggering $75.25 million in total extortion payments. The most chilling aspect of the allegations involves five specific U.S. victims who hired DigitalMint to handle their crises, only to have Martino assigned as their lead advocate while he secretly collaborated with the attackers to maximize his own personal profit through the manipulation of sensitive information.
The Mechanics of the Ransomware Partnership
Martino did not act alone in this complex digital heist; he allegedly served as a key affiliate for ALPHV, also known as BlackCat, which is a notorious ransomware-as-a-service group responsible for major infrastructure breaches. This partnership gave him direct access to advanced encryption tools and the specialized infrastructure necessary to launch large-scale attacks against vulnerable corporate targets. He also collaborated with other former cybersecurity professionals, including Kevin Tyler Martin and Ryan Clifford Goldberg, who utilized their technical expertise in incident response to infiltrate corporate networks and exfiltrate sensitive data before deploying ransomware. This combination of insider knowledge and technical skill allowed the group to bypass traditional security measures that would typically stop external threats. By operating within the industry they were attacking, the conspirators could predict defensive maneuvers and counter them in real-time, effectively staying one step ahead.
The synergy between these conspirators was particularly effective because of their deep, first-hand knowledge of corporate vulnerabilities and the standard response protocols used by major firms. While Goldberg and Martin assisted with the technical breaches and initial system infiltrations, Martino focused on the strategic manipulation of the victims during the high-stakes negotiation phase. By providing his co-conspirators with real-time updates on the victims’ negotiation strategies and internal financial discussions, he ensured the criminal group maintained the upper hand throughout the entire ordeal. This insider access allowed the attackers to demand the maximum possible ransom while appearing to engage in a genuine negotiation process. Such tactical coordination maximized the financial damage to the targeted organizations while lining the pockets of the conspirators, creating a feedback loop where the victims unknowingly funded their own ongoing destruction at every step of the criminal process.
Financial Gains and the Pursuit of Luxury
The financial impact of these crimes was vast and devastating, striking critical sectors such as healthcare, finance, and nonprofit organizations that were already struggling with digital security. One unnamed nonprofit was forced to pay nearly $26.8 million to recover its data, while a financial services firm paid approximately $25.7 million to regain access to its essential systems. These massive payouts funded a lavish lifestyle for Martino, which federal authorities began systematically dismantling following his arrest in late 2024. Investigators successfully seized approximately $12 million in assets, including over $9 million in various cryptocurrencies spread across 21 different digital wallets. This recovery effort highlights the difficulty of tracking illicit gains in the age of decentralized finance, yet it also proves that even the most sophisticated cybercriminals leave a trail of breadcrumbs for federal agents to follow when the scale of the theft reaches such historic levels.
The seizure of physical property further illustrated the immense scale of the alleged extortion and the personal greed driving the operation. Authorities took control of Martino’s $1.68 million bayfront home in Florida, a secondary residence, and an extensive collection of luxury items that included a high-end boat and a rare Nissan Skyline. These assets underscore the immense profitability of the scheme and the cynical nature of profiting from organizations that were already struggling to survive catastrophic digital breaches. For the victims, seeing their extortion payments converted into waterfront real estate and high-performance vehicles added a layer of personal insult to their financial injuries. The recovery of these physical goods provides some measure of restitution, but the long-term damage to the reputations of the targeted firms and the integrity of the cybersecurity industry remains a significant concern for policymakers and corporate leaders who must now account for this type of extreme insider threat.
Industry Fallout and Legal Consequences
In the wake of this unprecedented scandal, DigitalMint has worked to distance itself from Martino’s actions, claiming no prior knowledge of his illicit activities and implementing stricter internal controls to prevent future insider threats. However, the case has ignited a broader debate about the persistent lack of oversight and transparency in the ransomware negotiation industry. Because these negotiations often happen in unregulated, back-channel environments, experts warn that the field is uniquely ripe for corruption, especially when firms lack rigorous vetting processes for the individuals handling sensitive client data. The incident has forced a total re-evaluation of trust in the world of incident response, leading many organizations to demand third-party audits of their security partners. This shift suggests that the era of blind trust in cybersecurity consultants is coming to an end, as the risks of a compromised insider now outweigh the benefits of hiring outside help without undergoing deep background checks.
As the legal process unfolded, Martino faced up to 20 years in federal prison for conspiracy to interfere with commerce by extortion, a charge that reflected the gravity of his betrayal. While he remained out on bond, the court strictly prohibited him from working in the cybersecurity industry to prevent any potential for recidivism during the trial phase. Moving forward, organizations prioritized the implementation of multi-signature authorization for ransom payments and the use of independent oversight committees during active breaches. These measures ensured that no single individual possessed the power to manipulate a negotiation for personal gain. Additionally, the industry began developing a centralized registry for incident responders to track professional history and ethical violations across different firms. By adopting these transparent practices, the cybersecurity community worked to rebuild the trust that was so severely compromised by this double-agent scheme, ultimately creating a more resilient defense.






