Pre-Stuxnet Fast16 Malware Tampered with Nuclear Weapons Simulations

Asset Info
CreatorN/A
Registration TimeLoading...
RegistrarThe Hacker News
Capture TimeLoading...
GeolocationN/A
File TypeJPEG
Source TypedigitalUpload
Details
Abstract
A new analysis of the Lua-based fast16 malware has confirmed that it was a cyber sabotage tool designed to tamper with nuclear weapons testing simulations.
According to Broadcom-owned Symantec and Carbon Black teams, the pre-Stuxnet tool was engineered to corrupt uranium-compression simulations that are central to nuclear weapon design.
"Fast16's hook engine is selectively interested in
LicenseN/A
Used Bythehackernews.com...
Mining PreferenceN/A
Integrity Proof