Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
Ruslan Magomedovich Astamirov
ID: aad37479939009df854f98b43851ffae
Cybercrime
Cybercriminal
Threat types: Ransomware, RaaS
Progress: 69%
Completeness: 69%
Freshness: 70%
Operation zone: —
Aliases
Limited alias preview
| ASTAMIROV | BETTERPAY | Ea******** | Of****** |
| Ru************** | Ру************************** | — | — |
Showing 2 of 6 aliases in free preview.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: high
Ruslan Magomedovich Astamirov is publicly documented as a LockBit ransomware affiliate who deployed LockBit against at least 12 victims across multiple countries (2020–2023), operating under aliases BETTERPAY, offtitan, and Eastfarmer. Official reporting ties his activity to double extortion (steal + encrypt + publish) and to ransom-derived proceeds and forfeiture.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
| T1567.002 | Exfiltration to Cloud Storage | TA0010 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
| T1654 | Log Enumeration | TA0007 |
|
Executive brief
now
Saved successfully.
Hunting Playbook — Ruslan Magomedovich Astamirov (LockBit affiliate behavior)
Scope: Affiliate-driven LockBit intrusion behaviors. Focus on mid-chain telemetry (lateral movement, exfil staging, encryption onset) because initial access vectors vary across campaigns.
Tip: Hover the section title to learn what’s included in Analyst / Premium plans.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.