:

ANCIENT MALWARE PREDATES STUXNET IN IRAN NUCLEAR PLOT

SECURITY DESK1 MIN READ
THU, APR 23, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

Researchers have deciphered Fast16, a sophisticated sabotage malware created in 2005 that likely targeted Iran's nuclear program years before the infamous Stuxnet attack. The discovery suggests a coordinated cyber campaign against Tehran's atomic facilities.

Security researchers cracked Fast16, mysterious code designed to silently corrupt calculations and simulations in industrial software. The malware predates Stuxnet—the 2010 worm widely attributed to US and Israeli intelligence—by five years. Fast16 was engineered to tamper with computational processes without triggering detection, making it ideal for sabotaging nuclear research. Experts believe US intelligence or an allied nation deployed the code, though no official confirmation exists. The discovery reveals a longer history of cyber operations targeting Iran's nuclear infrastructure than previously known. It suggests multiple coordinated attacks spanning years, not a single strike. Researchers indicate Fast16 could have impacted simulations used in nuclear weapons development or reactor operations. The finding underscores how early-stage cyber warfare was deployed against strategic targets long before such tactics became commonplace.

■ SOURCES

Wired

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Zscaler's CEO Jay Chaudhry reports unprecedented demand for the company's services as enterprises grapple with escalating cybersecurity threats. The remarks come as large organizations face mounting challenges protecting themselves against emerging AI-related vulnerabilities.

1H AGOIndustry Desk

Sean Plankey has requested to withdraw his nomination to lead the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The withdrawal comes after the agency endured a period of unstable temporary leadership.

1H AGOSecurity Desk

Context AI, an AI agent training startup, disclosed a security incident last week. TechCrunch confirmed that Delve, a compliance company, had certified Context AI's security.

1H AGOSecurity Desk

Trigona ransomware operators are leveraging a custom command-line exfiltration tool to accelerate data theft from compromised networks. The tool enables faster, more efficient extraction of sensitive information.

1H AGOSecurity Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.