Saturday, April 26, 2025
HomeCyber AttackDOGE 'Big Balls' Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for...

DOGE ‘Big Balls’ Ransomware Utilizes ZIP-Based LNK Shortcuts and BYOVD Techniques for Stealthy Attacks

Published on

SIEM as a Service

Follow Us on Google News

A new and highly sophisticated ransomware campaign, dubbed “DOGE BIG BALLS Ransomware,” has recently come to light, demonstrating a blend of technical innovation and psychological manipulation.

This operation stands out for its multi-stage infection chain, which begins with a seemingly innocuous ZIP file and culminates in the deployment of a customized ransomware payload, all while leveraging advanced evasion techniques.

Infection Chain: ZIP Files and LNK Shortcuts

The attack typically starts with a ZIP file, often themed around financial matters such as “Pay Adjustment.zip.” Inside, a deceptive LNK (shortcut) file masquerades as a PDF or other legitimate document.

- Advertisement - Google News

When the victim opens this shortcut, it silently executes a series of PowerShell commands.

These commands download and run a script that checks for administrative privileges and, depending on the user’s access level, downloads additional malicious files.

If administrative rights are detected, the script creates a hidden folder in the system’s startup directory and downloads a modified version of the Fog ransomware disguised as “Adobe Acrobat.exe.”

It also retrieves a kernel exploit tool, “ktool.exe,” which is crucial for the next phase of the attack.

For non-admin users, the ransomware is placed in a user-specific startup folder, likely to be triggered later.

The PowerShell scripts used in this campaign are notable for their anti-analysis features and psychological tactics.

They include provocative statements and references to real individuals, likely intended to confuse or intimidate victims and analysts.

BYOVD: Exploiting Vulnerable Drivers

A standout feature of this campaign is its use of the Bring Your Own Vulnerable Driver (BYOVD) technique.

The attackers exploit a known vulnerability in an Intel driver (CVE-2015-2291) to gain kernel-level access.

This allows them to escalate privileges, disable security logging, and ensure the ransomware can operate undetected.

The kernel exploit tool is executed with a process ID and a hardcoded key, acting as an execution guardrail to prevent unauthorized use.

Before encrypting files, the ransomware collects extensive system and network information, including hardware IDs, network configurations, and running processes.

Uniquely, it queries the Wigle.net API using the MAC address of the victim’s router (BSSID) to determine the physical location of the device.

This method provides far more accurate geolocation than traditional IP-based techniques, indicating a highly targeted approach.

Ransomware Execution and Psychological Manipulation

Once executed, the ransomware displays a confirmation prompt, opens a ransom note, and logs its activities.

The ransom note references a real individual, Edward Coristine, and demands payment in Monero cryptocurrency.

The branding and references appear designed to mislead, intimidate, or malign specific individuals or organizations.

After encrypting files with the “.flocked” extension, the ransomware drops ransom notes in every affected folder and deletes shadow volume copies to prevent recovery.

The attack also embeds a Havoc C2 beacon, suggesting the potential for long-term access or further post-encryption activities.

Anti-analysis techniques, such as environment variable checks, are used to evade detection in sandboxed or monitored environments.

To defend against such advanced threats, organizations should:

  • Block execution of untrusted LNK files and PowerShell scripts.
  • Monitor PowerShell activity and process chains for anomalies.
  • Deploy Endpoint Detection and Response (EDR) solutions.
  • Limit administrative privileges and monitor for privilege escalation.
  • Restrict outbound traffic to unauthorized cloud services and monitor for suspicious API calls.

The DOGE BIG BALLS ransomware campaign exemplifies the evolving sophistication of cyber threats, combining technical innovation with psychological tactics to maximize impact and evade detection.

Robust, layered security measures are essential to defend against such multi-faceted attacks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Russian Hackers Attempt to Sabotage Digital Control Systems of Dutch Public Service

The Dutch Defense Ministry has revealed that critical infrastructure, democratic processes, and North Sea...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...