Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Microsoft wants you to chat with its browser now – but can you trust this Copilot?

      July 28, 2025

      I tested the Dell XPS’ successor – here are the biggest upgrades (and what’s the same)

      July 28, 2025

      I’m a Linux pro – here are my top 5 command line backup tools for desktops and servers

      July 28, 2025

      Should you buy a refurbished iPad? I tried one from Back Market and here’s my verdict

      July 28, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      elegantweb/sanitizer

      July 28, 2025
      Recent

      elegantweb/sanitizer

      July 28, 2025

      Streamlined String Encryption with Laravel’s Fluent Methods

      July 28, 2025

      Resume PHP

      July 28, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Gamers bypass UK age verification with Death Stranding — no real face or VPN required

      July 28, 2025
      Recent

      Gamers bypass UK age verification with Death Stranding — no real face or VPN required

      July 28, 2025

      New Xbox games launching this week, from July 28 through August 3 — Grounded 2 arrives on Xbox Game Pass

      July 28, 2025

      TikTok’s owner forked Microsoft’s Visual Studio Code and concerns have been raised — reports suggest it’s resource heavy and never stops ‘phoning home’

      July 28, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    DOGE BIG BALLS Campaign Blurs Lines Between Exploitation, Recon, and Reputation Damage

    April 15, 2025

    DOGE BIG BALLS

    Cyble researchers have uncovered ransomware called DOGE BIG BALLS, a ransomware that not just stands out but also presents its technical prowess for audacious psychological manipulation. 

    This malware campaign intricately weaves together advanced exploitation techniques, social engineering, and a deliberate attempt to misattribute blame, notably linking itself to Edward Coristine, a 19-year-old software engineer associated with Elon Musk’s DOGE initiative.

    The Genesis of the DOGE BIG BALLS Attack: A Deceptive ZIP File 

    DOGE BIG BALLS
    DOGE BIG Infection Chain (Source: Cyble)

    The attack begins with a seemingly innocuous ZIP file titled “Pay Adjustment.zip,” typically disseminated through phishing emails. Inside, a shortcut file named “Pay Adjustment.pdf.lnk” awaits unsuspecting victims.

    Figure 2 - Contents of LNK file
    Contents of LNK file (Source: Cyble)

    Upon activation, this shortcut silently executes a series of PowerShell commands that initiate a multi-stage infection process. 

    The first script, stage1.ps1, checks for administrative privileges. If detected, it proceeds to download and execute a modified version of Fog ransomware, masquerading as “Adobe Acrobat.exe” within a hidden folder in the system’s startup directory.

    Doge Big Balls Ransomware Prompt
    Doge Big Balls Ransomware Prompt (Source: Cyble)

    This stealthy placement ensures that the ransomware runs with elevated privileges, bypassing standard security measures. 

    Exploiting Kernel Vulnerabilities: The CVE-2015-2291 Flaw 

    A pivotal aspect of this attack is the exploitation of CVE-2015-2291, a vulnerability in Intel’s Ethernet diagnostics driver (iqvw64e.sys). This flaw allows attackers to execute arbitrary code with kernel-level privileges through specially crafted IOCTL calls. By leveraging this vulnerability, the attackers can escalate their privileges, disable security logging, and maintain persistence within the compromised system.

    The malicious tool ktool.exe is responsible for this exploitation. It installs the vulnerable driver as a kernel-mode service, granting the ransomware process direct access to kernel memory. This access facilitates the injection of the SYSTEM process token into the ransomware, effectively elevating its privileges and enabling it to disable security mechanisms. 

    Psychological Manipulation: The “DOGE BIG BALLS” Branding 

    The ransomware’s name, “DOGE BIG BALLS,” is a deliberate attempt to associate the attack with Edward Coristine and the DOGE initiative. Coristine is a prominent figure in the tech community, known for his involvement with Elon Musk’s Department of Government Efficiency (DOGE). By incorporating his name and the DOGE reference, the attackers aim to create confusion and misdirect any investigations. 

    The ransom note further compounds this misdirection by including Coristine’s personal details, such as his home address and phone number.

    Chat window
    Chat window (Source: Cyble)

    This tactic serves to intimidate the victim and divert attention from the true perpetrators. 

    Advanced Reconnaissance and Geolocation Techniques 

    Beyond encryption, the attackers employ new methods to gather intelligence about their victims. The lootsubmit.ps1 script collects extensive system and network information, including hardware IDs, firewall states, network configurations, and running processes. This data is transmitted to the attackers via a cloud hosting platform, aiding in further profiling and potential future attacks. 

    Notably, the attackers utilize the Wigle.net API to determine the victim’s physical location. By querying the MAC address of the victim’s router (BSSID), they can pinpoint the exact geographic location, offering more precise geolocation than traditional IP-based methods. 

    The Role of Havoc C2 Beacon in Post-Exploitation 

    Embedded within the attack is a Havoc C2 beacon (demon.x64.dll), indicating the attackers’ potential to maintain long-term access or conduct additional post-encryption activities. This beacon facilitates communication with the attacker’s command and control infrastructure, enabling them to issue further instructions or exfiltrate additional data from the compromised system. 

    The Involvement of Edward Coristine: A Case of Misattribution 

    Edward Coristine’s name appears prominently in the ransom note, accompanied by his personal contact information. This inclusion is a strategic move by the attackers to mislead investigators and the public into believing that Coristine is responsible for the attack. In reality, Coristine has no involvement in this cybercrime. The use of his name is a calculated attempt to exploit his association with the DOGE initiative and create a false narrative. 

    Coristine’s involvement with DOGE, a project aimed at promoting efficiency and transparency in government operations, has made him a recognizable figure in the tech community. By associating his name with the ransomware, the attackers seek to capitalize on his public profile to lend credibility to their demands and confuse potential investigators.

    Conclusion  

    To fight against DOGE BIG BALLS ransomware attacks, which skillfully combine technical prowess, psychological manipulation, and strategic misdirection—including the false attribution to Edward Coristine—organizations and individuals must adopt a proactive and layered defense strategy.  

    Effective mitigation begins with enforcing strict execution policies to block untrusted LNK files and PowerShell scripts, while consistently monitoring PowerShell activity for anomalies. Deploying advanced Endpoint Detection and Response (EDR) solutions capable of identifying fileless malware and suspicious behavior is essential.

    Limiting administrative privileges through Role-Based Access Control (RBAC) and monitoring for privilege escalation attempts can further reduce exposure. Additionally, blocking unauthorized outbound connections to services like Netlify and external APIs such as Wigle.net is crucial for preventing data exfiltration and geolocation tracking. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat the State of Pentesting Report 2025 Reveals About Cybersecurity Readiness
    Next Article Whisp, a Pure PHP SSH server, with Ashley Hindle

    Related Posts

    Development

    elegantweb/sanitizer

    July 28, 2025
    Development

    Streamlined String Encryption with Laravel’s Fluent Methods

    July 28, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    7 things you didn’t know your Microsoft account does on Windows 11

    News & Updates

    The Silent SaaS Advantage: How React Boosts Retention & Cuts Costs

    Web Development

    CVE-2025-53633 – Chall-Manager Zip Bomb Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Hyprland introduce un piano di abbonamento per sostenere lo sviluppo

    Linux

    Highlights

    My favorite lens and screen-cleaning kit keeps my tech spotless, and it only costs $8

    July 18, 2025

    Koala cleaner is my go-to for keeping my prescription glasses, sunglasses, MacBook, iPhone, tablet, and…

    I’ve tested dozens of robot vacuums. These are the three I recommend most to family and friends

    June 20, 2025

    CVE-2025-4244 – Code-Projects Online Bus Reservation System SQL Injection

    May 3, 2025

    SpecFlow to Reqnroll: A Step-by-Step Migration Guide

    June 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.