Key findings
- Fast16’s hook engine is selectively thinking about high-explosive simulations inside LS-DYNA and AUTODYN.
- All proof means that attackers have been particularly focusing on simulations of nuclear detonations.
- The malware checks for the density of the fabric being simulated and solely acts when that worth passes 30 g/cm³, the edge uranium can solely attain underneath the shock compression of an implosion system.
- As much as ten distinct software program builds carry tailor-made hooks, suggesting a sustained operation that tracked goal organisations’ software program updates over years.
- The tampering solely prompts throughout full-scale transient blast and detonation runs.
- Fast16 propagates inside a goal community utilizing share enumeration and impersonation however is constructed to not depart that community.
Overview
In April 2026, our friends in SentinelOne published the first public analysis of fast16, a beforehand undiscovered sabotage framework whose oldest elements seem to this point from round 2005, roughly two years earlier than Stuxnet first grew to become lively. The framework consists of a service binary that embeds an early Lua 5.0 digital machine, a boot-start filesystem driver that intercepts and patches executable code as it’s learn from disk, and a rule-driven hook engine that rewrites very particular instruction sequences inside a single, narrowly outlined goal utility.
Symantec’s Risk Hunter Crew has reviewed fast16’s hook engine and might verify LS-DYNA and AUTODYN as focused functions. Each are software program functions used to simulate real-world issues corresponding to car crashworthiness, materials modelling, and explosive simulation. Along with this, we’ve got found that fast16 was constructed to tamper with simulations of high-explosive detonations, nearly definitely in assist of strategic sabotage in opposition to nuclear weapons analysis.
Confirming the focused utility
As soon as the motive force is put in, it creates a kernel file system filter to watch all accessed information. It first waits till EXPLORER.EXE is launched after which targets any information with the extension .EXE which can be compiled with the Intel compiler by matching the string ‘Intel’ within the PE header. Each time such a file is learn into reminiscence, the hook engine performs on-the-fly patching if it incorporates matching opcode sequences. The hook engine inside fast16 has a desk of 101 byte-pattern guidelines. Every rule fires when a selected instruction sequence is learn from disk and both captures an absolute tackle or locations a hook to malicious code in an injected .xdata part.
Under for example are guidelines 46 and 47, which seize and overwrite a really particular x87 floating-point sequence:
fstp dword [ebp+0] ; retailer end result to caller's REAL*4 out-arg fld dword [abs] ; reload from array fld dword [imm32] ; static international REAL*4 fixed — captured fmul dword [imm32] ; multiply by second international REAL*4 fixed ; adopted by far-call to injected handler
The patterns the principles match in opposition to don’t match in opposition to each Intel-Fortran-compiled, single-precision, explicit-dynamics solver of that period, however are present in variations of LS-DYNA and AUTODYN. These patterns are particular to totally different variations of the software program and a few may belong to different simulation applications as effectively.
Fast16’s finish purpose
Probably the most fascinating query is what fast16 is doing inside LS-DYNA or AUTODYN as soon as it has put in itself. The hooks fast16 locations within the simulation program include three assault methods. We’ll refer to those as Mechanism A, B, and C. All seem to focus on simulations of high-pressure shock conduct.
Mechanism A
The primary and sixteenth occasions Mechanism A’s hook level is reached, fast16 merely returns management. In any other case, if the simulation enter worth is between 30 and 65, fast16 scales the output values all the way down to 10% of their regular worth and continues to maintain it at 10% of their regular values thereafter. One can think about a hypothetical graph corresponding to this:
Mechanism B
The hook factors for mechanism B, designed for LS-DYNA, first test if the Equation of State (EOS) choice is 2 (Jones-Wilkins-Lee), 3 (Sack Tuesday), or 7 (Ignition and Development of Response in Excessive Explosives). An EOS is a mathematical mannequin that determines how a fabric’s strain modifications when its quantity or density is compressed or expanded. These explicit fashions are for modelling excessive explosives. If the EOS choice is met, the code will solely start its tampering routine if sure attributes of the simulation attain 5 occasions its preliminary worth. Then, the Cauchy stress tensor output values (sig_xx, sig_yy, sig_zz) of any mannequin run after are modified all the way down to 1% of their true values if the density of the fabric reaches 30g/cm3. The code doesn’t instantly scale back these output values to 1%. As an alternative, the code ‘naturally’ scales the discount to 1% by calculating the slope required to succeed in 1% by the point the density is 60g/cm3. Notice the simulation doesn’t want to succeed in 60g/cm3. Based mostly on the values utilized, the fabric being focused is uranium and the Cauchy stress tensor values will symbolize the thermodynamic strain of the fabric, which decide compressibility of the fabric. In testing, this resulted in elevated compression of the fabric than actuality when modeling compression to 33g/cm3
Mechanism C
The hook factors for mechanism C are designed for AUTODYN and first test for the worth of three, 5, 11. In AUTODYN, these are EOS Perfect Fuel (3), JWL (5), and Lee-Tarver (11).
The mechanism for C may even not act until a sure attribute of the simulation reaches 5 occasions its preliminary worth (the edge worth) and the string “$Loading co” is present in reminiscence, which is present in AUTODYN. Relying on the model of the simulation software program, Mechanism C will scale an output worth (corresponding to Stress) at totally different charges. The lower in output values begin when the present uranium density within the profitable simulation reaches a compression of 30g/cm3 and scales the output values to variable finish densities as detailed within the beneath desk. The simulation doesn’t want to succeed in the top density, which is simply used to calculate the slope at which to carry out the discount.
One might think about at totally different levels of design, the targets have been utilizing the present model of the simulation software program at the moment, to which the attackers devised totally different tampering strategies relative to the simulations being performed at the moment. In reality, the 101 hook guidelines will be separated additional into 9-10 hook teams, every for a special construct of LS-DYNA or AUTODYN.
Focusing on of nuclear detonation simulations
Usually, neutrons leak out of the uranium with out hitting something, however when the uranium is compressed, these neutrons are more likely to strike another uranium nucleus. This causes the nucleus to separate (fission) and in addition leak extra neutrons, which then strike additional uranium nuclei, inflicting an explosive chain response. For nuclear weapons, excessive explosives are positioned across the uranium core. The excessive explosives trigger a strain wave that compresses the uranium, initiating a nuclear explosion.
When simulating the efficiency of uranium inside a nuclear weapon, one simulates the strain and the fabric results to find out if the uranium will turn out to be compressed sufficient to succeed in supercriticality, when neutrons are launched that trigger a nuclear explosion. The particular EOS fashions, materials fashions, and scaling elements chosen align with simulation of efficiency of uranium inside a nuclear weapon. Mechanism B and C initially requires a excessive explosive simulation after which tampers with the strain simulation of uranium. All of the tampering mechanisms successfully scale back the output values such because the Cauchy stress tensor to disrupt the simulation.
How the simulation customers reacted to the simulation modifications stays unclear. Whereas output values and graphs could seem cheap to a layman, inconsistencies in outcomes should be obvious to an professional. With solely single output values being modified, they’ll result in sudden suggestions and inconsistencies within the mannequin and inconsistencies in dependent values.
Two items of anecdotal proof might assist the impact was merely to impair the operation of the software program, typically noticeably. If hook rule teams have been added sequentially as wanted, we see a hook group added for a earlier model of the software program after a more moderen model. One might think about, the simulation person reverted to an older model when confronted with the anomaly, earlier than that model was additionally focused. Secondly, the hook teams symbolize as much as 10 totally different variations of simulation software program, which means the simulation person up to date variations semi-frequently.
Nonetheless, whether or not the outcomes confirmed supercriticality when it was not really reached or failure when supercriticality was really reached or easy statistical anomalies, fast16 would possible have delayed and disrupted the profitable building of a nuclear weapon.
Fast16 installer
Fast16 was designed to be put in and unfold inside a goal community, however not exterior that community. The preliminary executable, svcmgmt.exe, exposes 5 modes by way of command-line arguments:
- No arguments runs it as a Home windows service
- p – handles distant set up and execution
- i – installs and runs Lua code,
- r – runs the Lua code
- when args >=2 – to be used when hijacking a legit Home windows program (IFEO Persistence)
The Lua code supplies fast16’s principal execution conduct by 13 libraries masking host operations, distant service management, registry manipulation, and an embedded useful resource container.
Earlier than putting in, the script checks the NtfsMetaDataMutex to make sure a single occasion and scans for 18 endpoint safety registry keys, refusing to propagate if any are current. Underneath the set up flags, fast16 copies itself to %windirpercentsystem32svcmgmt.exe, timestamps the file by cloning creation dates and ACL permissions from providers.exe, and registers itself because the SvcMgmt service. It then drops the fast16.sys kernel driver into the system drivers folder, matches its timestamps to beep.sys, and configures the registry to load it as a SCSI-class filter driver on the subsequent boot.
For persistence, fast16 abuses Picture File Execution Choices by writing its personal path into the Debugger worth underneath HKLMSoftwareMicrosoftWindows NTCurrentVersionImage File Execution Choices
To unfold, fast16 extracts svcmgmt.dll and registers it as a A number of Supplier Router (MPR) community supplier notifyee, inflicting Home windows to load the DLL into any course of that calls WNetAddConnection and report new share connections again by way of the named pipe .pipep577. In parallel, fast16 enumerates all domains, servers, and shares to find additional distant hosts. Every candidate hostname is resolved to an IP and checked in opposition to the native community ranges (10.x.x.x, 172.16.x.x, 192.168.x.x) and the same-subnet rule. For machines that qualify, fast16 impersonates the regionally logged-on person’s credentials, copies itself to
Significance
Fast16 targets, with rule-level precision, the important thing fashions for detonation of nuclear weapons. That diploma of area information, corresponding to understanding which EOS varieties matter, which calling conventions are produced by which compilers, and which courses of simulation will or is not going to journey the gate, is uncommon in any period and was very uncommon in 2005. The framework belongs to the identical conceptual lineage as Stuxnet, through which malware was tailor-made not simply to a vendor’s product however to a selected bodily course of being simulated or managed by that product.
Defenses
We have no idea if a modern-day model of fast16 exists. Organizations involved about related threats able to sabotage ought to iterate usually throughout their endpoints to stock loaded drivers, flagging any which can be unsigned or unfamiliar. Utility management needs to be deployed and tightly tuned to dam unapproved executables and DLLs from working, denying attackers the prospect to drop and side-load customized tooling within the first place. Symantec Endpoint Safety and Carbon Black EDR ought to each be in use throughout the property, with Symantec Endpoint Safety’s Adaptive Safety characteristic enabled to harden the system, for instance by denying the usage of dual-use device not usually used within the setting, with out breaking legit administration.
We’d wish to thank the Institute for Science and Worldwide Safety for his or her experience and invaluable insights that knowledgeable this piece.








