Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Organ-on-a-chip project investigates the relationship between diabetes and dementia

Stuxnet Fast16 and earlier malware tampers with nuclear weapon simulation

How space and AI can outshine wildfires

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Stuxnet Fast16 and earlier malware tampers with nuclear weapon simulation
Identity

Stuxnet Fast16 and earlier malware tampers with nuclear weapon simulation

By May 18, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 18, 2026Industrial sabotage/malware

New analysis of the Lua-based fast16 malware confirms that it is a cyber-jamming tool designed to tamper with nuclear weapons test simulations.

The Broadcom-owned Symantec and Carbon Black teams say tools before Stuxnet were designed to subvert uranium compression simulations, which are central to nuclear weapons design.

“Fast16’s hook engine is selectively interested in explosives simulation within LS-DYNA and AUTODYN,” said the Threat Hunter team. “The malware checks the density of the material being simulated and operates only if its value exceeds 30 g/cm3. Uranium reaches the threshold only under impact compression in an implosion device.

This development comes weeks after SentinelOne published an analysis of fast16, which describes fast16 as an original jamming framework whose components may have been developed as early as 2005, two years before the earliest known version of Stuxnet (also known as Stuxnet 0.5).

Evidence unearthed by the cybersecurity firm included a reference to the string “fast16” in a text file leaked in 2017 by an anonymous hacker group called The Shadow Brokers. The file was part of a vast array of hacking tools and exploits allegedly used by Equation Group, a state-sponsored threat actor with suspected ties to the US National Security Agency (NSA).

At its core, this industry-disrupting malware contained a set of 101 rules for tampering with the mathematical calculations performed by certain engineering and simulation programs that were popular at the time. Although the exact binaries patched by this malware are unknown, SentinelOne has identified three possible candidates: LS-DYNA version 970, Practical Structural Design and Construction Software (PKPM), and Modelo Hidrodinâmico (MOHID).

Symantec’s latest analysis confirms that LS-DYNA and AUTODYN are two of the applications targeted by fast16, adding that the applications are apparently designed to interfere with the simulation of high-explosive grenade explosions, and are almost certainly designed to facilitate sabotage against nuclear weapons research.

“Both are software applications used to simulate real-world problems such as vehicle crash safety, materials modeling, and explosion simulation,” Symantec and Carbon Black said in a statement. “The high-speed 16 hooks in the simulation program consist of three attack strategies: Tampering is only effective during full-scale temporary explosions and detonation runs.”

The 101 hook rules can be further divided into 9-10 hook groups, each targeting a different build of LS-DYNA or AUTODYN, suggesting that the malware developers were tracking software updates and adding support for different versions over time. This shows systematic and continuous operation.

“If hook rule groups were added sequentially as needed, then hook groups would have been added to the previous version of the software after the new version,” the researchers explained.

“As you might imagine, simulation users would revert to an older version when faced with an anomaly before that version was also targeted. Second, hook groups represent up to 10 different versions of the simulation software, meaning simulation users update versions semi-frequently.

Fast16 is designed to not infect computers that have certain security products installed. It also automatically spreads to other endpoints on the same network, so the machines used to run the simulation produce the same tampered output.

The findings show that strategic industrial sabotage using malware was carried out by nation-state actors two decades ago, long before Stuxnet was used to damage uranium enrichment centrifuges at Iran’s Natanz nuclear power plant by injecting malicious code into Siemens programmable logic controllers.

In an interview with cybersecurity journalist Kim Zetter, Symantec technical director Vikram Thakur said in 2005 that the level of expertise required to design such malware was “astounding.” However, it is unclear whether a modern version of fast16 actually exists.

“This level of domain knowledge, such as understanding which EOS formats are important, which calling conventions are generated by which compilers, and which classes of simulations will or will not pass through gates, is rare in any era, and was extremely rare in 2005,” Symantec and Carbon Black said.

“This framework belongs to the same conceptual family as Stuxnet, and the malware is tailored not only to a vendor’s product, but also to the specific physical processes that are simulated or controlled by that product.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow space and AI can outshine wildfires
Next Article Organ-on-a-chip project investigates the relationship between diabetes and dementia

Related Posts

MiniPlasma Windows 0-Day enables SYSTEM privilege escalation on fully patched systems

May 18, 2026

NGINX CVE-2026-42945 can be exploited in the wild to cause worker crash and possible RCE

May 17, 2026

Grafana GitHub token compromise led to codebase downloads and extortion attempts

May 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Organ-on-a-chip project investigates the relationship between diabetes and dementia

Stuxnet Fast16 and earlier malware tampers with nuclear weapon simulation

How space and AI can outshine wildfires

MiniPlasma Windows 0-Day enables SYSTEM privilege escalation on fully patched systems

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.