Particle.news
Download on the App Store

SentinelOne Uncovers 2005 ‘fast16’ Malware That Sabotaged Engineering Software

The research recasts the origin of cyber-physical attacks to an earlier, 2005-era toolset.

Overview

  • SentinelOne detailed the fast16 framework on Monday, describing a 2005 operation built to quietly corrupt scientific and engineering calculations rather than crash systems.
  • The toolkit embedded a Lua scripting engine, used encrypted and modular payloads, and employed a kernel driver named fast16.sys that patched programs in memory to alter floating‑point results.
  • The wormable carrier, svcmgmt.exe, spread over Windows file shares using default or weak passwords, checked for specific security tools before running, and could install the driver for deeper control on Windows 2000/XP.
  • Pattern matches point to targets such as LS‑DYNA 970 for physics simulations, China’s PKPM structural suite, and the MOHID hydrodynamic model, which means engineers may need to re‑check past results that looked plausible yet were nudged off course.
  • References in The Shadow Brokers leak link fast16 to tooling associated with the Equation Group, though researchers stop short of firm attribution, and the finding suggests precision sabotage evolved gradually rather than starting with Stuxnet.