Updated
Updated · zetter-zeroday.com · May 18
Symantec Confirms 2005 Fast16 Sabotaged Iran Nuclear Simulations, Altering Data Near 30 g/cm³
Updated
Updated · zetter-zeroday.com · May 18

Symantec Confirms 2005 Fast16 Sabotaged Iran Nuclear Simulations, Altering Data Near 30 g/cm³

4 articles · Updated · zetter-zeroday.com · May 18
  • Symantec said Fast16 was built to corrupt Iran’s nuclear-weapons simulations in 2005, manipulating LS-DYNA and AUTODYN runs so engineers saw failed implosion tests instead of successful ones.
  • At 30 g/cm³ core density—just before supercriticality—the malware swapped real pressure data for false readings, apparently lowering values by 1% to 5% to suggest the uranium core never reached the needed state.
  • Fast16 spread across internal networks, checked for 18 security products, and supported 8 to 10 LS-DYNA versions, suggesting sustained access and updates as Iranian engineers changed software.
  • Symantec and outside nuclear experts say the code’s uranium focus, timing and required access point strongly to Iran as the target, with tactics resembling Stuxnet’s deception of operators through falsified data.
  • The findings deepen evidence that cyber sabotage of Iran’s nuclear program was already a multi-pronged campaign in 2005, aimed less at immediate destruction than at delaying progress and pushing Tehran toward negotiations.
Why is a secret cyberweapon from 2005 being revealed now, and what message is it sending to Iran today?
If malware can fake nuclear test results, what other critical scientific or financial data can we no longer trust?
With AI finding vulnerabilities faster than humans can patch, is the era of secure digital infrastructure already over?

The Fast16 Revelation: Inside the Decade-Long, Undetected Cyber Sabotage Preceding Stuxnet

Overview

Fast16, recently uncovered by the cybersecurity community, is a sophisticated cyber sabotage tool that operated undetected for years and is now recognized as a precursor to Stuxnet. Its discovery sheds new light on the early history of state-sponsored cyber operations, especially those targeting nuclear programs like Iran's. Fast16 was engineered for subtle sabotage, spreading automatically across networks and silently manipulating high-precision scientific software. By altering critical calculations, it could cause flawed research or even catastrophic equipment failures. This revelation highlights the advanced capabilities and long-term strategies behind early cyberwarfare efforts.

...