ANAVEM
Languagefr
Dark server room with cryptocurrency mining equipment under dramatic lighting

DOJ Charges Second DigitalMint Employee in BlackCat Scheme

The Department of Justice charged another former DigitalMint employee for secretly partnering with BlackCat ransomware negotiators in an insider extortion operation.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
12 March 2026, 12:31 5 min read 0

Last updated 17 March 2026, 19:00

SEVERITYHigh
EXPLOITUnknown
PATCH STATUSUnavailable
VENDORDigitalMint
AFFECTEDDigitalMint cryptocurrency exc...
CATEGORYCyber Attacks

Key Takeaways

DOJ Expands BlackCat Insider Trading Investigation with Second DigitalMint Arrest

The U.S. Department of Justice filed criminal charges on March 12, 2026, against a second former DigitalMint employee for participating in a sophisticated insider scheme involving the BlackCat ransomware operation, also known as ALPHV. This marks the expansion of a federal investigation that first surfaced earlier this year when authorities uncovered evidence of cryptocurrency exchange employees secretly collaborating with ransomware negotiators.

The charging documents reveal that former DigitalMint personnel worked directly with BlackCat operators to facilitate ransom payments while simultaneously providing insider information about the cryptocurrency exchange's security protocols and transaction monitoring systems. This dual role allowed the ransomware group to optimize their payment collection methods while avoiding detection mechanisms typically employed by financial institutions to identify suspicious cryptocurrency transactions.

BlackCat, which emerged as one of the most prolific ransomware-as-a-service operations in recent years, has been responsible for attacks against hundreds of organizations worldwide. The group's sophisticated approach includes recruiting insiders at financial institutions and cryptocurrency exchanges to streamline their payment collection processes. Federal investigators discovered that the DigitalMint employees provided critical intelligence about transaction limits, reporting thresholds, and internal compliance procedures that helped BlackCat operators structure ransom demands to avoid triggering automated fraud detection systems.

The investigation began when cybersecurity researchers noticed unusual patterns in BlackCat ransom payment flows, with an unusually high percentage of transactions flowing through DigitalMint compared to other cryptocurrency exchanges. This anomaly prompted federal authorities to examine the exchange's internal operations, ultimately uncovering communications between employees and known ransomware operators. The CISA Known Exploited Vulnerabilities catalog has tracked multiple BlackCat campaigns that leveraged these insider connections to maximize their operational effectiveness.

Related: PayPal Amazon Phishing Campaign Targets Customer Support

Related: Security Executive Hit by Multi-Vector Phishing Campaign

Related: Storm-2561 Deploys Fake VPN Apps to Steal Credentials

Related: Storm-2561 Distributes Fake VPN Clients to Steal Credentials

Cryptocurrency Exchange Industry Faces Insider Threat Scrutiny

The charges against DigitalMint employees highlight a growing concern within the cryptocurrency exchange industry about insider threats facilitating ransomware operations. DigitalMint, which operates as a Bitcoin ATM network and cryptocurrency exchange service across multiple U.S. states, processes millions of dollars in cryptocurrency transactions monthly. The company's customers, who rely on the platform for legitimate cryptocurrency purchases and exchanges, were unknowingly exposed to a compromised service where their transaction data and exchange patterns were being shared with criminal organizations.

The broader cryptocurrency exchange ecosystem now faces increased regulatory scrutiny as federal authorities examine whether similar insider arrangements exist at other platforms. Industry analysts estimate that ransomware groups collected over $1.1 billion in payments during 2025, with a significant portion flowing through compromised or complicit cryptocurrency exchanges. The DigitalMint case demonstrates how ransomware operators have evolved beyond purely technical attacks to include human intelligence gathering and insider recruitment as core components of their business model.

Financial institutions and cryptocurrency exchanges across the United States are now implementing enhanced employee background checks and monitoring systems to detect potential insider threats. The case has prompted the Financial Crimes Enforcement Network to issue new guidance requiring cryptocurrency exchanges to report suspicious employee activities and implement stricter controls on employee access to customer transaction data and compliance systems.

Federal Response and Industry Security Measures

The Department of Justice's prosecution strategy focuses on dismantling the financial infrastructure that enables ransomware operations to collect and launder payments. Federal prosecutors are pursuing charges under the Computer Fraud and Abuse Act, money laundering statutes, and conspiracy laws that carry potential sentences of up to 20 years in federal prison. The investigation involves multiple federal agencies, including the FBI's Cyber Division, the Secret Service, and the Treasury Department's Office of Foreign Assets Control.

Cryptocurrency exchanges are now required to implement comprehensive insider threat detection programs that monitor employee access to sensitive systems and customer data. These programs must include regular polygraph examinations for employees with access to transaction monitoring systems, mandatory reporting of any contact with known cryptocurrency addresses associated with ransomware operations, and real-time monitoring of employee communications for indicators of collaboration with criminal organizations. The CyberScoop investigation revealed additional details about the sophisticated methods used by BlackCat operators to recruit and maintain relationships with exchange insiders.

Industry security experts recommend that organizations implement zero-trust architectures for cryptocurrency transaction processing, requiring multiple approvals for high-value transactions and maintaining detailed audit logs of all employee activities. Companies should also establish anonymous reporting mechanisms for employees to report suspicious activities by colleagues and implement regular security awareness training focused on social engineering tactics used by ransomware groups to recruit insiders. The federal investigation continues with authorities examining transaction records from multiple cryptocurrency exchanges to identify additional potential insider collaborations with ransomware operations.

Frequently Asked Questions

What is the BlackCat ransomware operation?+
BlackCat, also known as ALPHV, is a ransomware-as-a-service operation that has attacked hundreds of organizations worldwide. The group recruits insiders at financial institutions and cryptocurrency exchanges to help facilitate ransom payments and avoid detection systems.
How did DigitalMint employees help BlackCat operators?+
Former DigitalMint employees provided insider information about the cryptocurrency exchange's security protocols, transaction monitoring systems, and compliance procedures. This intelligence helped BlackCat structure ransom demands to avoid triggering automated fraud detection systems.
What charges do the DigitalMint employees face?+
The Department of Justice is pursuing charges under the Computer Fraud and Abuse Act, money laundering statutes, and conspiracy laws. These charges carry potential sentences of up to 20 years in federal prison for each defendant.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...