2005-era fast16 was built to corrupt LS-DYNA and AUTODYN runs, with SentinelOne saying its oldest components predate Stuxnet by about two years.
30 g/cm³ is the key trigger: the malware only tampers with full-scale high-explosive simulations once uranium-like density thresholds are reached, then cuts pressure or stress outputs to as little as 1% of true values.
101 hook rules across up to 10 software builds show a long-running operation that tracked target organizations' LS-DYNA and AUTODYN updates over years rather than a one-off intrusion.
The framework spread only inside victim networks, using share enumeration, user impersonation, a kernel file-system driver and IFEO persistence while avoiding propagation beyond local ranges.
SentinelOne said the code's physics and software-specific precision points to strategic sabotage aimed at delaying or disrupting nuclear weapons research, though the affected organizations and real-world impact remain unknown.
Beyond nuclear programs, what global infrastructure was secretly sabotaged by this decades-old malware?
This cyberweapon hid for 21 years. What undetectable threats are lurking in our critical systems right now?
If simulations can be silently corrupted, how can we trust the digital models our modern world is built on?
Fast16 and the Rise of "Soft-Kill" Cyber Sabotage: Lessons from a Hidden Decade-Long Attack on Critical Simulations
Overview
The discovery of Fast16, a sophisticated cyber weapon, began in 2017 when researchers found a crucial clue in leaked data. SentinelOne, led by Juan Andres Guerrero-Saade, identified the svcmgmt.exe artifact, which at first looked like a simple service wrapper from 2005. However, deeper analysis revealed it contained an embedded Lua virtual machine and encrypted modules, showing advanced capabilities. This breakthrough provided rare insight into state-sponsored cyber operations, highlighting how Fast16’s hidden complexity rewrote the history of cyber warfare and exposed the long-term development of powerful digital sabotage tools.