Back to Feed
MalwareApr 30, 2026

Fast16 Malware - Schneier on Security

Fast16 state-sponsored malware silently manipulates computational results in scientific and industrial software.

Summary

Researchers have reverse-engineered Fast16, a sophisticated malware attributed to US state sponsorship and deployed against Iran years before Stuxnet. The malware spreads across networks and subtly alters computation results in high-precision scientific and industrial software, enabling sabotage ranging from corrupted research to catastrophic equipment failures. This represents one of the most covert forms of in-the-wild malware-based sabotage ever documented.

Full text

Fast16 Malware Researchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to carry out the most subtle form of sabotage ever seen in an in-the-wild malware tool: By automatically spreading across networks and then silently manipulating computation processes in certain software applications that perform high-precision mathematical calculations and simulate physical phenomena, Fast16 can alter the results of those programs to cause failures that range from faulty research results to catastrophic damage to real-world equipment.” Another news article. Lots of interesting details at the links. Tags: cybersecurity, hacking, Iran, malware, reverse engineering Posted on April 30, 2026 at 6:22 AM • 8 Comments

Indicators of Compromise

  • malware — Fast16

Entities

Stuxnet (campaign)US state-sponsored actor (threat_actor)