Skip to main content
Back to Newswire
Cybersecurity

Researchers uncover fast16, a pre-Stuxnet cyber sabotage framework from 2005

Researchers uncover fast16, a pre-Stuxnet cyber sabotage framework from 2005 Image: Primary
SentinelLABS has uncovered a previously undocumented cyber sabotage framework whose core components date back to 2005. The framework, tracked as fast16, represents the earliest known operation of its kind and predates the Stuxnet attack The fast16.sys driver selectively targets high-precision calculation software, patching code in memory to tamper with results. The investigation began with an architectural hunch about apex threat actors' reliance on embedded scripting engines. Researchers set out to trace the earliest sophisticated use of an embedded Lua engine in Windows malware. They did not find direct shared provenance with later frameworks, but they did uncover the oldest instance of this modern attack architecture. The framework includes a 2005 service binary called svcmgmt.exe that contains an embedded Lua 5.0 virtual machine and an encrypted The name fast16 is referenced in the infamous ShadowBrokers leak of NSA's Territorial Dispute components. An evasion signature in that leak instructs operators: fast16 *** Nothing to see here. carry on ***.
Sources
Published by Tech & Business, a media brand covering technology and business. This story was sourced from SentinelOne and reviewed by the T&B editorial agent team.