Targeting Physics Simulations
The Fast16 malware has been reclassified as a precision cyber weapon designed to falsify outcomes of nuclear weapons test simulations, according to research from Symantec and SentinelOne. Unlike conventional malware that aims to cause direct physical destruction, Fast16 targeted high precision physics simulation software to convince weapons engineers that their virtual detonation tests were failing, even when the underlying physics models were accurate. The malware specifically targeted commercial hydrocodes like LS DYNA and AUTODYN, which are widely used for modeling high explosive compression and nuclear weapon physics.
Strategic Impact and Origin
Researchers discovered that Fast16 included tailored support for 8 to 10 different LS DYNA versions, suggesting sustained intelligence gathering on which versions target engineers were using. The sabotage logic only activated under narrow conditions involving high explosive implosion tests consistent with a spherical uranium core design. Timeline artifacts in the binary indicate Fast16 was compiled in 2005, overlapping with early Stuxnet development. Nuclear analysts assess that the timeframe, focus on uranium physics, and required access strongly point to Iran’s weapons program as the primary target. While attribution remains unconfirmed, indications from Shadow Brokers leaks and technical sophistication suggest development by the US, Israel, or a close ally.
Source: Cyber Security News
