Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations
Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations — Ravie LakshmananMay 18, 2026Industrial Sabotage / Malware [https://blogger.googleuser
What’s new: Analysis by Symantec and Carbon Black has confirmed that the fast16 malware, developed before Stuxnet, was designed to tamper with nuclear weapons testing simulations. It specifically targets high-explosive simulations in LS-DYNA and AUTODYN, corrupting calculations related to uranium compression. Fast16 features a set of 101 rules to manipulate simulation outputs and was likely used for industrial sabotage as early as 2005.
Who’s affected
Organizations using LS-DYNA and AUTODYN for nuclear weapons simulations or similar high-explosive modeling may be at risk, particularly those in defense and research sectors.
What to do
- Review and update security measures on systems running LS-DYNA and AUTODYN.
- Implement network segmentation to prevent malware spread across endpoints.
- Monitor for unusual outputs in simulation results that may indicate tampering.
- Ensure that security products are installed to mitigate the risk of infection.



