Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      From Data To Decisions: UX Strategies For Real-Time Dashboards

      September 13, 2025

      Honeycomb launches AI observability suite for developers

      September 13, 2025

      Low-Code vs No-Code Platforms for Node.js: What CTOs Must Know Before Investing

      September 12, 2025

      ServiceNow unveils Zurich AI platform

      September 12, 2025

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      Building personal apps with open source and AI

      September 12, 2025

      What Can We Actually Do With corner-shape?

      September 12, 2025

      Craft, Clarity, and Care: The Story and Work of Mengchu Yao

      September 12, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Optimizely Mission Control – Part III

      September 14, 2025
      Recent

      Optimizely Mission Control – Part III

      September 14, 2025

      Learning from PHP Log to File Example

      September 13, 2025

      Online EMI Calculator using PHP – Calculate Loan EMI, Interest, and Amortization Schedule

      September 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      DistroWatch Weekly, Issue 1139

      September 14, 2025
      Recent

      DistroWatch Weekly, Issue 1139

      September 14, 2025

      sudo vs sudo-rs: What You Need to Know About the Rust Takeover of Classic Sudo Command

      September 14, 2025

      Dmitry — The Deep Magic

      September 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    April 15, 2025

    DOGE BIG BALLS

    Cyble researchers have uncovered ransomware called DOGE BIG BALLS, a ransomware that not just stands out but also presents its technical prowess for audacious psychological manipulation. 

    This malware campaign intricately weaves together advanced exploitation techniques, social engineering, and a deliberate attempt to misattribute blame, notably linking itself to Edward Coristine, a 19-year-old software engineer associated with Elon Musk’s DOGE initiative.

    The Genesis of the DOGE BIG BALLS Attack: A Deceptive ZIP File 

    DOGE BIG BALLS
    DOGE BIG Infection Chain (Source: Cyble)

    The attack begins with a seemingly innocuous ZIP file titled “Pay Adjustment.zip,” typically disseminated through phishing emails. Inside, a shortcut file named “Pay Adjustment.pdf.lnk” awaits unsuspecting victims.

    Figure 2 - Contents of LNK file
    Contents of LNK file (Source: Cyble)

    Upon activation, this shortcut silently executes a series of PowerShell commands that initiate a multi-stage infection process. 

    The first script, stage1.ps1, checks for administrative privileges. If detected, it proceeds to download and execute a modified version of Fog ransomware, masquerading as “Adobe Acrobat.exe” within a hidden folder in the system’s startup directory.

    Doge Big Balls Ransomware Prompt
    Doge Big Balls Ransomware Prompt (Source: Cyble)

    This stealthy placement ensures that the ransomware runs with elevated privileges, bypassing standard security measures. 

    Exploiting Kernel Vulnerabilities: The CVE-2015-2291 Flaw 

    A pivotal aspect of this attack is the exploitation of CVE-2015-2291, a vulnerability in Intel’s Ethernet diagnostics driver (iqvw64e.sys). This flaw allows attackers to execute arbitrary code with kernel-level privileges through specially crafted IOCTL calls. By leveraging this vulnerability, the attackers can escalate their privileges, disable security logging, and maintain persistence within the compromised system.

    The malicious tool ktool.exe is responsible for this exploitation. It installs the vulnerable driver as a kernel-mode service, granting the ransomware process direct access to kernel memory. This access facilitates the injection of the SYSTEM process token into the ransomware, effectively elevating its privileges and enabling it to disable security mechanisms. 

    Psychological Manipulation: The “DOGE BIG BALLS” Branding 

    The ransomware’s name, “DOGE BIG BALLS,” is a deliberate attempt to associate the attack with Edward Coristine and the DOGE initiative. Coristine is a prominent figure in the tech community, known for his involvement with Elon Musk’s Department of Government Efficiency (DOGE). By incorporating his name and the DOGE reference, the attackers aim to create confusion and misdirect any investigations. 

    The ransom note further compounds this misdirection by including Coristine’s personal details, such as his home address and phone number.

    Chat window
    Chat window (Source: Cyble)

    This tactic serves to intimidate the victim and divert attention from the true perpetrators. 

    Advanced Reconnaissance and Geolocation Techniques 

    Beyond encryption, the attackers employ new methods to gather intelligence about their victims. The lootsubmit.ps1 script collects extensive system and network information, including hardware IDs, firewall states, network configurations, and running processes. This data is transmitted to the attackers via a cloud hosting platform, aiding in further profiling and potential future attacks. 

    Notably, the attackers utilize the Wigle.net API to determine the victim’s physical location. By querying the MAC address of the victim’s router (BSSID), they can pinpoint the exact geographic location, offering more precise geolocation than traditional IP-based methods. 

    The Role of Havoc C2 Beacon in Post-Exploitation 

    Embedded within the attack is a Havoc C2 beacon (demon.x64.dll), indicating the attackers’ potential to maintain long-term access or conduct additional post-encryption activities. This beacon facilitates communication with the attacker’s command and control infrastructure, enabling them to issue further instructions or exfiltrate additional data from the compromised system. 

    The Involvement of Edward Coristine: A Case of Misattribution 

    Edward Coristine’s name appears prominently in the ransom note, accompanied by his personal contact information. This inclusion is a strategic move by the attackers to mislead investigators and the public into believing that Coristine is responsible for the attack. In reality, Coristine has no involvement in this cybercrime. The use of his name is a calculated attempt to exploit his association with the DOGE initiative and create a false narrative. 

    Coristine’s involvement with DOGE, a project aimed at promoting efficiency and transparency in government operations, has made him a recognizable figure in the tech community. By associating his name with the ransomware, the attackers seek to capitalize on his public profile to lend credibility to their demands and confuse potential investigators.

    Conclusion  

    To fight against DOGE BIG BALLS ransomware attacks, which skillfully combine technical prowess, psychological manipulation, and strategic misdirection—including the false attribution to Edward Coristine—organizations and individuals must adopt a proactive and layered defense strategy.  

    Effective mitigation begins with enforcing strict execution policies to block untrusted LNK files and PowerShell scripts, while consistently monitoring PowerShell activity for anomalies. Deploying advanced Endpoint Detection and Response (EDR) solutions capable of identifying fileless malware and suspicious behavior is essential.

    Limiting administrative privileges through Role-Based Access Control (RBAC) and monitoring for privilege escalation attempts can further reduce exposure. Additionally, blocking unauthorized outbound connections to services like Netlify and external APIs such as Wigle.net is crucial for preventing data exfiltration and geolocation tracking. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat the State of Pentesting Report 2025 Reveals About Cybersecurity Readiness
    Next Article Whisp, a Pure PHP SSH server, with Ashley Hindle

    Related Posts

    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    September 14, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    September 14, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Beginner’s Guide to Cloud Cybersecurity

    Development

    Distribution Release: Zephix 8

    News & Updates

    CVE-2025-25046 – IBM InfoSphere Information Server DataStage Flow Designer Information Disclosure

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-3521 – “WordPress Team Members Stored Cross-Site Scripting”

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    How to Hire Qualified Physician Assistants Quickly with MedSquirrels

    July 15, 2025

    Post Content Source: Read More 

    Disaster Recovery and Business Continuity Plan

    April 18, 2025

    CVE-2025-40579 – Siemens SCALANCE LPE9403 Stack-Based Buffer Overflow Vulnerability

    May 13, 2025

    How to Add Custom Style Variations to WordPress Blocks

    June 2, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.