Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations
New analysis confirms the Lua-based fast16 malware was a pre-Stuxnet cyber sabotage tool designed to corrupt uranium-compression simulations used in nuclear weapon design.

A new analysis of the Lua-based fast16 malware has confirmed that it was a state-sponsored cyber sabotage tool was designed to tamper with nuclear weapons testing simulations years before the Stuxnet attack. According to Broadcom-owned Symantec and Carbon Black teams, the pre-Stuxnet tool was engineered to corrupt uranium-compression simulations that are central to nuclear weapon design. The findings, published on May 18, 2026, reveal that fast16's hook engine selectively targeted specific simulation parameters to corrupt results, marking it as an early example of state-sponsored sabotage against nuclear weapons testing infrastructure.
The fast16 malware, first documented in 2013, was initially believed to be a relatively simple information-stealing tool. However, the new analysis reveals a far more sophisticated purpose. The malware's hook engine was designed to intercept and modify specific function calls within simulation software, altering the output of uranium-compression calculations. These calculations are critical for modeling the implosion process in nuclear warheads, where a sphere of plutonium or uranium is compressed to supercritical density. By corrupting these simulations, the malware could cause scientists to draw incorrect conclusions about weapon performance, potentially flawed weapon designs.
The technical mechanism behind fast16's sabotage capability is its selective hooking engine. Unlike generic malware that might corrupt random data, fast16 was programmed to target only specific parameters within the simulation software. This selective approach ensured that the corruption would not be immediately obvious to researchers, allowing the sabotage to persist undetected for extended periods. The malware achieved this by hooking into the simulation's function calls and modifying the return values for targeted parameters while leaving other calculations intact.
The impact of fast16's operations could have been severe. By corrupting uranium-compression simulations, the malware could have led researchers to believe that a flawed weapon design was viable, potentially resulting in a nuclear warhead that would fail to detonate properly. Alternatively, the malware could have caused researchers to discard a perfectly good design, wasting years of development effort. The exact targets of fast16 remain unclear, but the sophistication of the tool suggests it was deployed against a nation with advanced nuclear weapons development capabilities.
Symantec and Carbon Black's analysis indicates that fast16 predates the Stuxnet worm, which was discovered in 2010 and is widely believed to have been a joint US-Israeli operation targeting Iran's nuclear enrichment program. While Stuxnet targeted industrial control systems used in uranium enrichment centrifuges, fast16 targeted, fast16 appears to have been designed to sabotage the computational modeling phase of nuclear weapon development. This suggests that state-sponsored cyber operations against nuclear programs may have begun earlier than previously thought, with fast16 representing an earlier generation of sabotage tools.
The response to these findings has been limited, as fast16 is no longer active and the infrastructure it used has long ago dismantled. However, the analysis serves as a warning about the potential for cyber attacks to target scientific computing infrastructure. As nuclear weapons programs increasingly rely on complex simulations and modeling software, the risk of sabotage through computational attacks grows. The fast16 case demonstrates that such attacks are not merely theoretical but have been deployed in the past, with potentially serious consequences for global security.
The broader context of this discovery highlights the evolving nature of state-sponsored cyber operations. While Stuxnet targeted physical infrastructure, fast16 targeted the intellectual infrastructure of nuclear weapons development. This shift from sabotaging physical processes to corrupting computational models represents a significant evolution in cyber warfare tactics. As nations continue to develop their cyber capabilities, the protection of scientific computing infrastructure will become increasingly important for maintaining strategic stability.
SentinelOne's full technical report, published this week, reveals that the fast16 malware embeds a Lua 5.0 virtual machine and a kernel driver ('fast16.sys') to intercept and corrupt calculations in civil engineering and physics simulation software. The researchers also linked the artifact 'svcmgmt.exe' to a 2017 leak of NSA-associated Equation Group tools by The Shadow Brokers, providing the strongest evidence yet of the framework's origins. The driver, compiled in July 2005, is designed to target executables built with the Intel C/C++ Intel C/C++ compiler and will not run on Windows 7 or later systems.