#1 out of 1
technology3h ago
Decades-old pre-Stuxnet cyber sabotage tool breaks cover, NSA listed it as 'nothing to see here' — fast16 targeted nuclear reactors, dam design, and other high-precision civil engineering software years before Stuxnet broke cover
- Fast16, a decades-old cyber-sabotage tool, predates Stuxnet by at least five years and targets high-precision software.
- The tool targeted software used for nuclear reactors, dam design, and physics simulations, introducing subtle errors.
- The operation used a Lua-powered carrier, svcmgmt.exe, to deliver fast16 across vulnerable Windows machines.
- The malware spread via Windows service-control and file-sharing APIs, focusing on default or weak admin passwords.
- Experts say fast16 could cause accelerated damage by degrading calculations in critical engineering software.
- Sentinel Labs linked fast16 to an NSA-related leak file, underscoring its state-level origins.
- Researchers traced fast16 to Lua VM-based threats and fossilized revision traces from earlier decades.
- The study highlights potential risks if fast16-like tools remain undetected in critical infrastructure software.
- The source article notes the tool’s potential impact on civil engineering calculations and infrastructure.
Vote 0
