SOCRadar® Cyber Intelligence Inc. | Dark Web Profile: Overthinker1877
Home

Resources

Blog
Eyl 29, 2022
4 Mins Read

Dark Web Profile: Overthinker1877

Overthinker1877 or 1877 Team have recently drawn attention for their random attacks worldwide. Although the first remarkable attack was ransomware against a Romanian news agency in May 2021, they are now on the headlines with global attacks against government websites of various countries. The 1877 Team claims to be of Kurdish origin and allegedly affiliated with the PKK, a terrorist organization. 

Who is Overthinker1877? 

The Overthinker1877 threat actor specifically targets countries such as Turkey, Iran, Iraq, Israel, and in rare cases, Saudi Arabia.

Overthinker1877 mentioned they will attack the Turkish Governmental website
Overthinker1877 mentioned they will attack the Turkish governmental website

Overthinker1877 has also launched random attacks against various countries worldwide, and they claim the goal of these attacks is “introducing Kurdish hackers to governments and nations. “ The following countries are the victims of these attacks:

Albania

Australia

Belarus

Belgium

Bolivia

Brazil

China

Colombia

Dominic

Ecuador

Egypt

Honduras

India

Indonesia

Italy

Kenya

Liberia

Libya

Mongolia

Morocco

Netherlands

Pakistan

Philippines

Romania

Russia

São Tomé and Príncipe

Sri Lanka

Thailand

Venezuela

Vietnam

Zimbabwe

         

Overthinker 1877 targets government websites, academic institutions, banks, and media organizations. These attacks also affect commercial organizations, political parties, and personal digital assets

Which Groups does Overthinker1877 Collaborate With? 

Overthinker1877 attacked American and Israeli websites with the Iraqi group Altahrae. They also helped the Yemeni group YCA (Yemen Cyber Army) actions on Iranian websites.

Attacks with Yemeni group
Attacks with Yemeni group 

Communication Channels

In addition to these,

Through these platforms they; 

  • Announce their activities,
  • Promote accounts like @Owner1877@oldboy1877CodeBoy1877, Utchiha505,
  • Create polls and invite subscribers/followers to vote on the next target country,
  • Organize competitions among her subscribers, 
  • Sell hacked data such as cards, WHM/C panels, mailers, methods, shells, scam pages, SMTP, leads, documents, accounts,
  • Offer sales opportunities to their members who want to sell.
Overthinker1877 selling zero-day exploits 
Overthinker1877 selling zero-day exploits 
Group advertising a shopping platform
Group advertising a shopping platform

TTPs

TA 0005 Defense Evasion:

T1112

Modify Registry

T1497

Virtualization/Sandbox Evasion

T1027.002

Software Packing

TA 0006 Credential Access

T1056.004

Credential API Hooking

TA 0007 Discovery

T1518.001

Security Software Discovery

T1120

Peripheral Device Discovery

T1497

Virtualization/Sandbox Evasion

TA 0009 Collection

T1056.004

Credential API Hooking

According to MITRE ATT&CK, 4 malicious, 17 suspicious, and 14 informative indicators point to these tactics and techniques. 

Overthinker1877 comes to the forefront with scattered attacks that do not have a specific criterion. Many countries have been subjected to such random attacks. The group previously stated they would operate ransomware attacks against government websites and systems. But on 3 September 2022, the group unexpectedly announced that they had stopped all operations. Time will tell whether the group will keep its promise of inaction.