SOCRadar® Cyber Intelligence Inc. | Dark Web Profile: Overthinker1877
Home

Resources

Blog
Sep 29, 2022
4 Mins Read

Dark Web Profile: Overthinker1877

Overthinker1877 or 1877 Team have recently drawn attention for their random attacks worldwide. Although the first remarkable attack was ransomware against a Romanian news agency in May 2021, they are now on the headlines with global attacks against government websites of various countries. The 1877 Team claims to be of Kurdish origin and allegedly affiliated with the PKK, a terrorist organization. 

Who is Overthinker1877? 

The Overthinker1877 threat actor specifically targets countries such as Turkey, Iran, Iraq, Israel, and in rare cases, Saudi Arabia.

Overthinker1877 mentioned they will attack the Turkish Governmental website
Overthinker1877 mentioned they will attack the Turkish governmental website

Overthinker1877 has also launched random attacks against various countries worldwide, and they claim the goal of these attacks is “introducing Kurdish hackers to governments and nations. “ The following countries are the victims of these attacks:

Albania Australia Belarus Belgium Bolivia Brazil
China Colombia Dominic Ecuador Egypt Honduras
India Indonesia Italy Kenya Liberia Libya
Mongolia Morocco Netherlands Pakistan Philippines Romania
Russia São Tomé and Príncipe Sri Lanka Thailand Venezuela Vietnam
Zimbabwe

Overthinker 1877 targets government websites, academic institutions, banks, and media organizations. These attacks also affect commercial organizations, political parties, and personal digital assets

Which Groups does Overthinker1877 Collaborate With? 

Overthinker1877 attacked American and Israeli websites with the Iraqi group Altahrae. They also helped the Yemeni group YCA (Yemen Cyber Army) actions on Iranian websites.

Attacks with Yemeni group
Attacks with Yemeni group 

Communication Channels

In addition to these,

Through these platforms they; 

  • Announce their activities,
  • Promote accounts like @Owner1877@oldboy1877CodeBoy1877, Utchiha505,
  • Create polls and invite subscribers/followers to vote on the next target country,
  • Organize competitions among her subscribers, 
  • Sell hacked data such as cards, WHM/C panels, mailers, methods, shells, scam pages, SMTP, leads, documents, accounts,
  • Offer sales opportunities to their members who want to sell.
Overthinker1877 selling zero-day exploits 
Overthinker1877 selling zero-day exploits 
Group advertising a shopping platform
Group advertising a shopping platform

TTPs

TA 0005 Defense Evasion:

T1112 Modify Registry
T1497 Virtualization/Sandbox Evasion
T1027.002 Software Packing

TA 0006 Credential Access

T1056.004 Credential API Hooking

TA 0007 Discovery

T1518.001 Security Software Discovery
T1120 Peripheral Device Discovery
T1497 Virtualization/Sandbox Evasion

TA 0009 Collection

T1056.004 Credential API Hooking

According to MITRE ATT&CK, 4 malicious, 17 suspicious, and 14 informative indicators point to these tactics and techniques. 

Overthinker1877 comes to the forefront with scattered attacks that do not have a specific criterion. Many countries have been subjected to such random attacks. The group previously stated they would operate ransomware attacks against government websites and systems. But on 3 September 2022, the group unexpectedly announced that they had stopped all operations. Time will tell whether the group will keep its promise of inaction.