Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Mikhail Vasiliev
ID: 88ff27f2acb71cc2057d85d862e98cd8
Cybercrime
Cybercriminal
Threat types: Ransomware, RaaS
Progress: 69%
Completeness: 69%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| Digitalocean90 | Digitalwaters99 | Di************ | F*** |
| Gh******** | Ne******** | Va****** | — |
Showing 2 of 7 aliases in free preview.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium-high
Mikhail Vasiliev is publicly documented as a LockBit ransomware affiliate (executor) charged in 2022 and pleading guilty in 2024. Public case materials describe multi-year participation and multiple online aliases. As an affiliate, his activity aligns to an intrusion-to-encryption and double-extortion lifecycle, while initial access and tooling specifics remain campaign-dependent in curated public summaries.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1654 | Log Enumeration | TA0007 |
|
Executive brief
now
Saved successfully.
Hunting Playbook — Mikhail Vasiliev (LockBit affiliate behavior)
Scope: Affiliate-driven ransomware behaviors. Focus on mid-chain telemetry because initial access vectors vary across campaigns and are not consistently enumerated in public case summaries.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.