VYPR
trendPublished Apr 27, 2026· Updated May 18, 2026· 1 source

Weekly Roundup: Fast16 Malware, FIRESTARTER Backdoor, Lotus Wiper, and More

This week's cybersecurity news covers a Lua-based malware predating Stuxnet, a backdoor targeting U.S. federal agencies, a wiper aimed at Venezuelan energy systems, and multiple ransomware developments.

This week's cybersecurity landscape is marked by a diverse array of threats, from a newly discovered malware framework that predates Stuxnet to active attacks against federal agencies and critical infrastructure. The roundup highlights the persistent evolution of both state-sponsored and criminal cyber operations.

Security researchers have uncovered a Lua-based malware framework named 'fast16' that dates back to 2005, years before the infamous Stuxnet worm. According to analysis by Kaspersky, fast16 is designed to target high-precision calculation software, subtly altering results to cause equipment failures or flawed scientific conclusions. While it's unclear if the malware was ever deployed in the wild, its existence establishes a much earlier timeline for sophisticated cyber operations aimed at physical systems.

In a significant development for U.S. federal security, CISA disclosed that a civilian agency's Cisco Firepower device running ASA software was compromised with a new backdoor called FIRESTARTER. The malware, deployed as part of a widespread APT campaign, exploits now-patched vulnerabilities CVE-2025-20333 and CVE-2025-20362. FIRESTARTER is designed for persistent remote access, surviving patches and reboots, prompting Cisco to recommend reimaging affected devices.

Meanwhile, a previously undocumented data wiper named Lotus Wiper has been used in attacks against Venezuela's energy and utilities sector. Kaspersky reports that the wiper uses batch scripts to coordinate destructive operations across networks, erasing recovery mechanisms and overwriting physical drives. The attacks occurred between late 2025 and early 2026, leaving systems in an inoperable state.

The ransomware landscape continues to evolve, with The Gentlemen RaaS operation deploying SystemBC proxy malware and claiming over 320 victims since July 2025. NCC Group notes the group's rapid rise, ranking among the top three most active threat actors. In related news, the Kyber ransomware group has adopted the Kyber1024 post-quantum encryption algorithm, while Trigona-linked actors (Rhantus) have developed a custom data exfiltration tool for more controlled theft.

Google Mandiant has tracked a new threat group, UNC6692, which uses Teams help desk impersonation to deploy the Snow malware suite. This custom toolkit includes a browser extension, tunneler, and backdoor for credential theft and domain takeover. The operation highlights the continued effectiveness of social engineering in initial access.

These incidents underscore the breadth of current cyber threats, from legacy malware frameworks to cutting-edge ransomware tactics. Organizations are urged to patch known vulnerabilities, monitor for unusual network activity, and maintain robust backup and recovery procedures.

Synthesized by Vypr AI