Mogilevich is a recently emerged ransomware group that first appeared in February 2024, operating with apparent financial motivations based on their targeting patterns and operational behavior. Due to the group's recent emergence and relatively limited public documentation, specific details about their country of origin, affiliations, or operational model remain unclear to major threat intelligence firms and law enforcement agencies. The group has demonstrated a preference for targeting technology, government, business services, and transportation/logistics sectors, suggesting they may employ initial access vectors commonly effective against these industries, though their specific attack methodologies, encryption techniques, and data exfiltration practices have not been extensively documented by major security researchers. With only nine known victims identified to date, Mogilevich has maintained a relatively low profile compared to established ransomware operations, with no widely reported major campaigns or high-profile incidents documented by CISA, FBI, or prominent security firms like Mandiant. The group appears to remain active as of current reporting, though their limited operational footprint and recent emergence make comprehensive threat profiling challenging based on available public intelligence. The group has been linked to 9 public disclosures across our corpus. First observed on a leak site on February 20, 2024; most recent post March 3, 2024. The operation is currently inactive.
Sector and geography
This disclosure adds to ransomware activity in the Technology sector, which has 2,524 disclosures indexed across all operators we track. Geographically, DJI Company is reported in China, a country with 29 ransomware disclosures in our corpus.
How we know this. Darkfield monitors public ransomware leak sites continuously, archiving every new disclosure and the data later released against the victim. Each entry on this page is sourced from the operator's own publication and cross-checked against complementary OSINT feeds (RansomLook, ransomware.live, RansomWatch). We do not collect or host stolen data — only the metadata, timestamps and screenshots needed to make the public disclosure searchable and accountable. Records here are corrected when the original post is edited, retracted, or merged with another disclosure.