Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    April 15, 2025

    DOGE BIG BALLS

    Cyble researchers have uncovered ransomware called DOGE BIG BALLS, a ransomware that not just stands out but also presents its technical prowess for audacious psychological manipulation. 

    This malware campaign intricately weaves together advanced exploitation techniques, social engineering, and a deliberate attempt to misattribute blame, notably linking itself to Edward Coristine, a 19-year-old software engineer associated with Elon Musk’s DOGE initiative.

    The Genesis of the DOGE BIG BALLS Attack: A Deceptive ZIP File 

    DOGE BIG BALLS
    DOGE BIG Infection Chain (Source: Cyble)

    The attack begins with a seemingly innocuous ZIP file titled “Pay Adjustment.zip,” typically disseminated through phishing emails. Inside, a shortcut file named “Pay Adjustment.pdf.lnk” awaits unsuspecting victims.

    Figure 2 - Contents of LNK file
    Contents of LNK file (Source: Cyble)

    Upon activation, this shortcut silently executes a series of PowerShell commands that initiate a multi-stage infection process. 

    The first script, stage1.ps1, checks for administrative privileges. If detected, it proceeds to download and execute a modified version of Fog ransomware, masquerading as “Adobe Acrobat.exe” within a hidden folder in the system’s startup directory.

    Doge Big Balls Ransomware Prompt
    Doge Big Balls Ransomware Prompt (Source: Cyble)

    This stealthy placement ensures that the ransomware runs with elevated privileges, bypassing standard security measures. 

    Exploiting Kernel Vulnerabilities: The CVE-2015-2291 Flaw 

    A pivotal aspect of this attack is the exploitation of CVE-2015-2291, a vulnerability in Intel’s Ethernet diagnostics driver (iqvw64e.sys). This flaw allows attackers to execute arbitrary code with kernel-level privileges through specially crafted IOCTL calls. By leveraging this vulnerability, the attackers can escalate their privileges, disable security logging, and maintain persistence within the compromised system.

    The malicious tool ktool.exe is responsible for this exploitation. It installs the vulnerable driver as a kernel-mode service, granting the ransomware process direct access to kernel memory. This access facilitates the injection of the SYSTEM process token into the ransomware, effectively elevating its privileges and enabling it to disable security mechanisms. 

    Psychological Manipulation: The “DOGE BIG BALLS” Branding 

    The ransomware’s name, “DOGE BIG BALLS,” is a deliberate attempt to associate the attack with Edward Coristine and the DOGE initiative. Coristine is a prominent figure in the tech community, known for his involvement with Elon Musk’s Department of Government Efficiency (DOGE). By incorporating his name and the DOGE reference, the attackers aim to create confusion and misdirect any investigations. 

    The ransom note further compounds this misdirection by including Coristine’s personal details, such as his home address and phone number.

    Chat window
    Chat window (Source: Cyble)

    This tactic serves to intimidate the victim and divert attention from the true perpetrators. 

    Advanced Reconnaissance and Geolocation Techniques 

    Beyond encryption, the attackers employ new methods to gather intelligence about their victims. The lootsubmit.ps1 script collects extensive system and network information, including hardware IDs, firewall states, network configurations, and running processes. This data is transmitted to the attackers via a cloud hosting platform, aiding in further profiling and potential future attacks. 

    Notably, the attackers utilize the Wigle.net API to determine the victim’s physical location. By querying the MAC address of the victim’s router (BSSID), they can pinpoint the exact geographic location, offering more precise geolocation than traditional IP-based methods. 

    The Role of Havoc C2 Beacon in Post-Exploitation 

    Embedded within the attack is a Havoc C2 beacon (demon.x64.dll), indicating the attackers’ potential to maintain long-term access or conduct additional post-encryption activities. This beacon facilitates communication with the attacker’s command and control infrastructure, enabling them to issue further instructions or exfiltrate additional data from the compromised system. 

    The Involvement of Edward Coristine: A Case of Misattribution 

    Edward Coristine’s name appears prominently in the ransom note, accompanied by his personal contact information. This inclusion is a strategic move by the attackers to mislead investigators and the public into believing that Coristine is responsible for the attack. In reality, Coristine has no involvement in this cybercrime. The use of his name is a calculated attempt to exploit his association with the DOGE initiative and create a false narrative. 

    Coristine’s involvement with DOGE, a project aimed at promoting efficiency and transparency in government operations, has made him a recognizable figure in the tech community. By associating his name with the ransomware, the attackers seek to capitalize on his public profile to lend credibility to their demands and confuse potential investigators.

    Conclusion  

    To fight against DOGE BIG BALLS ransomware attacks, which skillfully combine technical prowess, psychological manipulation, and strategic misdirection—including the false attribution to Edward Coristine—organizations and individuals must adopt a proactive and layered defense strategy.  

    Effective mitigation begins with enforcing strict execution policies to block untrusted LNK files and PowerShell scripts, while consistently monitoring PowerShell activity for anomalies. Deploying advanced Endpoint Detection and Response (EDR) solutions capable of identifying fileless malware and suspicious behavior is essential.

    Limiting administrative privileges through Role-Based Access Control (RBAC) and monitoring for privilege escalation attempts can further reduce exposure. Additionally, blocking unauthorized outbound connections to services like Netlify and external APIs such as Wigle.net is crucial for preventing data exfiltration and geolocation tracking. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat the State of Pentesting Report 2025 Reveals About Cybersecurity Readiness
    Next Article Whisp, a Pure PHP SSH server, with Ashley Hindle

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-37103 – HPE Networking Instant On Access Points Hard-Coded Login Credentials Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Leonardo AI

    Web Development

    CVE-2022-50213 – Linux Kernel Netfilter Use-After-Free Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Critical HIKVISION applyCT Flaw (CVE-2025-34067, CVSS 10.0): Unauthenticated RCE Via Fastjson

    Security

    Highlights

    CVE-2024-36347 – AMD CPU ROM Microcode Signature Verification Bypass (Validation Bypass)

    June 27, 2025

    CVE ID : CVE-2024-36347

    Published : June 27, 2025, 11:15 p.m. | 3 hours, 59 minutes ago

    Description : Improper signature verification in AMD CPU ROM microcode patch loader may allow an attacker with local administrator privilege to load malicious microcode, potentially resulting in loss of integrity of x86 instruction execution, loss of confidentiality and integrity of data in x86 CPU privileged context and compromise of SMM execution environment.

    Severity: 6.4 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-41413 – Fuji Electric Smart Editor Arbitrary Code Execution

    June 17, 2025

    Forza Motorsport’s future doesn’t look good following the grim week at Xbox — Turn 10 layoffs reportedly had a massive impact on any future for the franchise

    July 4, 2025

    CVE-2025-1727 – Amtrak FRED Protocol BCH Checksum Vulnerability

    July 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.