[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$flhZI-BOanlNNxUmyU0ZgCGwDTh9JQPGhQTGkDjAGf88":3},{"article":4,"iocs":44},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":24,"category":25,"article_tags":28},"c4890a63-8870-491b-8ee2-43672ecdf36e","Fast16 Malware - Schneier on Security","fast16-malware-schneier-on-security-99fec9","Researchers have reverse-engineered a piece of malware named Fast16. It&#8217;s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: &#8220;&#8230;the Fast16 malware was designed to carry out the most subtle form of sabotage ever seen in an in-the-wild malware tool: By automatically spreading across networks and then silently manipulating computation processes in certain software applications that perform high-precision mathematical calculations and simulate physical phenomena, Fast16 can alter the results of those programs to cause failures that range from faulty research results to catastrophic damage to real-world equipment.&#8221;...","Researchers have reverse-engineered Fast16, a sophisticated malware attributed to US state sponsorship and deployed against Iran years before Stuxnet. The malware spreads across networks and subtly alters computation results in high-precision scientific and industrial software, enabling sabotage ranging from corrupted research to catastrophic equipment failures. This represents one of the most covert forms of in-the-wild malware-based sabotage ever documented.","Fast16 state-sponsored malware silently manipulates computational results in scientific and industrial software.","Fast16 Malware Researchers have reverse-engineered a piece of malware named Fast16. It’s almost certainly state-sponsored, probably US in origin, and was deployed against Iran years before Stuxnet: “…the Fast16 malware was designed to carry out the most subtle form of sabotage ever seen in an in-the-wild malware tool: By automatically spreading across networks and then silently manipulating computation processes in certain software applications that perform high-precision mathematical calculations and simulate physical phenomena, Fast16 can alter the results of those programs to cause failures that range from faulty research results to catastrophic damage to real-world equipment.” Another news article. Lots of interesting details at the links. Tags: cybersecurity, hacking, Iran, malware, reverse engineering Posted on April 30, 2026 at 6:22 AM • 8 Comments","https:\u002F\u002Fwww.schneier.com\u002Fblog\u002Farchives\u002F2026\u002F04\u002Ffast16-malware.html",null,"2026-04-30T10:22:03+00:00","2026-04-30T11:00:09.603+00:00",8,[18,21],{"name":19,"type":20},"Stuxnet","campaign",{"name":22,"type":23},"US state-sponsored actor","threat_actor","89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5",{"id":24,"icon":13,"name":26,"slug":27},"Malware","malware",[29,34,39],{"category":30},{"id":31,"icon":13,"name":32,"slug":33},"574f766a-fb3f-487c-8d2c-0720ae75471b","Zero-day","zero-day",{"category":35},{"id":36,"icon":13,"name":37,"slug":38},"6cbdd207-aaa1-4176-9534-e156b125e917","Nation-state","nation-state",{"category":40},{"id":41,"icon":13,"name":42,"slug":43},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[45],{"type":27,"value":46,"context":47},"Fast16","State-sponsored malware targeting Iran, deployed pre-Stuxnet; manipulates computation processes in scientific\u002Findustrial software"]