External Publication
Visit Post

Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations

The Hacker News | #1 Trusted Source for Cybersecurity News [Uno… May 18, 2026
Source
A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations. According to Broadcom-owned Symantec and Carbon Black teams, the pre-Stuxnet tool was engineered to corrupt uranium-compression simulations that are central to nuclear weapon design. "Fast16's hook engine is selectively interested in

Discussion in the ATmosphere

Loading comments...