Skip to content

Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations

  • by

​A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations.
According to Broadcom-owned Symantec and Carbon Black teams, the pre-Stuxnet tool was engineered to corrupt uranium-compression simulations that are central to nuclear weapon design.
“Fast16’s hook engine is selectively interested in A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations.
According to Broadcom-owned Symantec and Carbon Black teams, the pre-Stuxnet tool was engineered to corrupt uranium-compression simulations that are central to nuclear weapon design.
“Fast16’s hook engine is selectively interested in  The Hacker News

Leave a Reply

Your email address will not be published. Required fields are marked *