Skip to content
Tech News
← Back to articles

20-Year-Old Malware Rewrites History of Cyber Sabotage

read original get Cybersecurity Incident Response Kit → more articles
Why This Matters

The discovery of the 20-year-old malware fast16 challenges previous assumptions about the timeline and sophistication of state-sponsored cyber sabotage, highlighting that cyber weapons capable of undermining high-precision scientific and cryptographic systems have existed longer than believed. This revelation underscores the evolving threat landscape and the importance of securing critical infrastructure against covert, long-standing cyber threats.

Key Takeaways

Researchers have long considered the Stuxnet attacks on Iran's nuclear centrifuges in Natanz to be the opening chapter of state-sponsored cyber sabotage.

As it turns out, at least five years before Stuxnet became public in 2010, somebody had developed an equally potent cyber weapon, one capable of injecting near-imperceptible errors into high-precision mathematical computations to gradually undermine and sabotage systems and applications that rely on their results.

Researchers at SentinelOne who discovered the previously undocumented malware framework, which they are tracking as fast16, say it represents the earliest example yet of a cyber tool designed explicitly for sabotaging "ultra expensive high-precision computing workloads of national importance like advanced physics, cryptographic, and nuclear research workloads."

"The discovery of fast16 rewrites our understanding of what a cyber weapon can do, as well as when nation-state cyber sabotage operations matured to the level of becoming a serious threat to critical infrastructure," says SentinelOne researcher Vitaly Kamluk in comments to Dark Reading.

Related:Parsing Agentic Offensive Security's Existential Threat

Rewriting Notions of a Cyberweapon

Fast16's function was to quietly corrupt mathematical outputs of engineering and scientific software by introducing tiny systematic errors that would be nearly impossible to detect without running independent calculations on a completely separate, uninfected system.

SentinelOne likened fast16's delivery mechanism to a "cluster munition" that could drop multiple "wormlets" which would then distribute the main payload to as many machines as possible in a target environment by looking for and exploiting vulnerabilities in them.

Fast16 marks a major turning point in the history of cyber weapons, Kamluk says. "Despite its twenty-year vintage, we have yet to discover another malware specifically designed to compromise high-precision mathematical calculations in this way."

A Fortunate Find

... continue reading