Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations

Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations — Ravie LakshmananMay 18, 2026Industrial Sabotage / Malware [https://blogger.googleuser

pre-stuxnet-fast16-malware-tampered-with-nuclear-weapons-simulations

What’s new: Analysis by Symantec and Carbon Black has confirmed that the fast16 malware, developed before Stuxnet, was designed to tamper with nuclear weapons testing simulations. It specifically targets high-explosive simulations in LS-DYNA and AUTODYN, corrupting calculations related to uranium compression. Fast16 features a set of 101 rules to manipulate simulation outputs and was likely used for industrial sabotage as early as 2005.

Who’s affected

Organizations using LS-DYNA and AUTODYN for nuclear weapons simulations or similar high-explosive modeling may be at risk, particularly those in defense and research sectors.

What to do

  • Review and update security measures on systems running LS-DYNA and AUTODYN.
  • Implement network segmentation to prevent malware spread across endpoints.
  • Monitor for unusual outputs in simulation results that may indicate tampering.
  • Ensure that security products are installed to mitigate the risk of infection.

Sources