Close Menu
Technophile NewsTechnophile News
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
What's On
US Special Forces Soldier Arrested for Polymarket Bets on Maduro Raid

US Special Forces Soldier Arrested for Polymarket Bets on Maduro Raid

23 April 2026
Leak reveals new Xbox Game Pass ‘Starter Edition’ that’s part of Discord Nitro

Leak reveals new Xbox Game Pass ‘Starter Edition’ that’s part of Discord Nitro

23 April 2026
Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet

Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet

23 April 2026
Anthropic’s Mythos breach was humiliating

Anthropic’s Mythos breach was humiliating

23 April 2026
Microsoft’s new Xbox chief is ‘reevaluating’ exclusive games

Microsoft’s new Xbox chief is ‘reevaluating’ exclusive games

23 April 2026
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact Us
Thursday, April 23
Facebook X (Twitter) Instagram YouTube
Technophile NewsTechnophile News
Demo
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
Technophile NewsTechnophile News
Home » Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet
News

Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet

By News Room23 April 20263 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Reddit WhatsApp Email
Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet
Share
Facebook Twitter LinkedIn Pinterest Email

Instead, Kamluk saw that it was a self-spreading piece of code with very different intentions. Using what was referred to within the code as “wormlet” functionality, Fast16 is designed to copy itself to other computers on the network via Windows’ network share feature. It checks for a list of security applications, and if none are present, installs the Fast16.sys kernel driver on the target machine.

That kernel driver then reads the code of applications as they’re loaded into the computer’s memory, monitoring for a long list of specific patterns—“rules” that allow it to identify when a target application is running. When it detects the target software, it carries out its apparent goal: silently altering the calculations the software is running to imperceptibly corrupt its results.

“This actually had a very significant payload inside, and pretty much everybody who looked at it before had missed it,” says Costin Raiu, a researcher at security consultancy TLP:Black who previously led the team that included Kamluk and Guerrero-Saade at Russian security firm Kaspersky, which did early work analyzing Stuxnet and related malware. “This is designed to be a long-term, very subtle sabotage which probably would be very, very difficult to notice.”

Searching for software that met the criteria of Fast16’s “rules” for an intended sabotage target, Kamluk and Guerrero-Saade found their three candidates: the MOHID, PKPM, and LS-DYNA software. As for the “wormlet” feature, they believe that the spreading mechanism was designed so that when a victim double-checks their calculation or simulation results with a different computer in the same lab, that machine, too, will confirm the erroneous result, making the deception all the more difficult to discover or understand.

In terms of other cybersabotage operations, only Stuxnet is remotely in the same class as Fast16, Guerrero-Saade argues. The complexity and sophistication of the malware, too, place it in Stuxnet’s realm of high-priority, high-resource state-sponsored hacking. “There are few scenarios where you go through this kind of development effort for a covert operation,” Guerrero-Saade says. “Somebody bent a paradigm in order to slow down or damage or throw off a process that they considered to be of critical importance.”

The Iran Hypothesis

All of that fits the hypothesis that Fast16 might, like Stuxnet, have been aimed at disrupting Iran’s ambitions of building a nuclear weapon. TLP:Black’s Raiu argues that, beyond a mere possibility, targeting Iran represents the most likely explanation—a “medium-high confidence” theory that Fast16 was “designed as a cyber strike package” that targeted Iran’s AMAD nuclear project, a plan by the regime of Ayatollah Khameini to obtain nuclear weapons in the early 2000s.

“This is another dimension of cyberattacks, another way to to wage this cyberwar against Iran’s nuclear program,” Raiu says.

In fact, Guerrero-Saade and Kamluk point to a paper published by the Institute for Science and International Security, which collected public evidence of Iranian scientists carrying out research that could contribute to the development of a nuclear weapon. In several of those documented cases, the scientists’ research used the LS-DYNA software that Guerrero-Saade and Kamluk found to have been a potential Fast16 target.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

US Special Forces Soldier Arrested for Polymarket Bets on Maduro Raid

US Special Forces Soldier Arrested for Polymarket Bets on Maduro Raid

23 April 2026
Leak reveals new Xbox Game Pass ‘Starter Edition’ that’s part of Discord Nitro

Leak reveals new Xbox Game Pass ‘Starter Edition’ that’s part of Discord Nitro

23 April 2026
Anthropic’s Mythos breach was humiliating

Anthropic’s Mythos breach was humiliating

23 April 2026
Microsoft’s new Xbox chief is ‘reevaluating’ exclusive games

Microsoft’s new Xbox chief is ‘reevaluating’ exclusive games

23 April 2026
Rednote Draws a Line Between China and the World

Rednote Draws a Line Between China and the World

23 April 2026
Meta is laying off 10 percent of its staff

Meta is laying off 10 percent of its staff

23 April 2026
Top Articles
Mobile Phone Display Market – Know Faster Growing Trends

Mobile Phone Display Market – Know Faster Growing Trends

14 January 202024 Views
Which iPhone Should You Buy (or Avoid) Right Now?

Which iPhone Should You Buy (or Avoid) Right Now?

10 March 202622 Views
Pico’s Project Swan XR Headset Wants to Go Where the Apple Vision Pro Failed

Pico’s Project Swan XR Headset Wants to Go Where the Apple Vision Pro Failed

2 March 202616 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Rednote Draws a Line Between China and the World

Rednote Draws a Line Between China and the World

23 April 2026

Some Rednote users have reported that their accounts were automatically converted from the Chinese to…

Meta is laying off 10 percent of its staff

Meta is laying off 10 percent of its staff

23 April 2026
A Startup Says It Grew Human Sperm in a Lab—and Used It to Make Embryos

A Startup Says It Grew Human Sperm in a Lab—and Used It to Make Embryos

23 April 2026
‘We Are Xbox’: read the memo defining Microsoft’s gaming future

‘We Are Xbox’: read the memo defining Microsoft’s gaming future

23 April 2026
Technophile News
Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Technophile News. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.