#Rust #UA
| Github | https://github.com/marshray |
| Bluesky | @marshray.bsky.social |
| Discord | marshray |
| marshray & live ! c0m | |
| Twitch | https://www.twitch.tv/marsh_ray |
| Type | Static, strict |
| Github | https://github.com/marshray |
| Bluesky | @marshray.bsky.social |
| Discord | marshray |
| marshray & live ! c0m | |
| Twitch | https://www.twitch.tv/marsh_ray |
| Type | Static, strict |
Exclusive: Fast16 malware has raised questions about what it was designed to do. Researchers at Symantec finally confirm it was subverting software used to simulate nuclear weapons explosions. Nuclear experts also tell me Iran was the likely target and explain how it impacted nuclear weapons tests. Fast16 wasn't aimed at sabotaging nuclear weapons themselves, but was only designed to alter data being fed to engineers from software used to simulate nuclear explosions tests. The goal was to trick engineers into believing their tests were failing to create confusion and slow down weapons program. Fast16 and Stuxnet were similar in that they both fed false data to engineers. But Stuxnet also physically altered centrifuges while tricking engineers into believing the devices were fine. New analysis from me also shows the two codes were contemporaneous, not separated by years.
Here's my story, which contains a link to a timeline showing how they were being developed around the same time, likely as part of a multi-pronged operation to slow down Iran's nuclear program.

Fast16 didn't predate Stuxnet but was contemporaneous with it. It also wasn't aimed at altering nuclear weapons but was simply feeding false data to engineers about the nuclear detonation tests they were conducting, in order to trick them into believing the tests were failing.