Tag: stuxnet
-
From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber
As part of its 20th anniversary celebration, Dark Reading looks back on 20 of the biggest newmaking events from the past two decades that influenced the risk landscape for today’s cybersecurity teams. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/stuxnet-chatgpt-20-news-events-cyber
-
Researchers unearth industrial sabotage malware that predated Stuxnet by 5 years
fast16.sys, is briefly mentioned in the 2017 Shadow Brokers leak of documents covering exploits and tools used by US National Security Agency cyber teams.”This 2005 attack is a harbinger for sabotage operations targeting ultra expensive high-precision computing workloads of national importance like advanced physics, cryptographic, and nuclear research workloads,” the SentinelOne researchers said in their…
-
20-Year-Old Malware Rewrites History of Cyber Sabotage
Researchers have uncovered a malware framework dubbed fast16 that predates Stuxnet by 5 years. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/20-year-old-malware-rewrites-history-of-cyber-sabotage
-
Fast16: Pre-Stuxnet malware that targeted precision engineering software
Fast16 is a pre-Stuxnet malware that tampered with precision software and spread itself. Evidence suggests links to U.S. operations during early cyber tensions. SentinelOne uncovered Fast16, a sabotage malware used in 2005, years before Stuxnet. The malicious code is written in Lua and targeted high-precision calculation software, altering results and spreading across systems. The malware…
-
Researchers Identify Fast16 Sabotage Malware That Pre-Dates Stuxnet
The “fast16” malware may have been used to target Iran’s nuclear program prior to Stuxnet First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/fast16-sabotage-malware-winds/
-
Fast16 Malware Targets High-Value Systems With Sabotage Capabilities
A previously unknown cyber sabotage framework called fast16, whose core components date back to 2005. This makes it the earliest known sabotage malware of its kind, predating the infamous Stuxnet worm by at least five years. The fast16 framework consists of two primary components: a Lua-powered service binary called svcmgmt.exe and a kernel driver named…
-
Pre-Stuxnet Sabotage Malware ‘Fast16’ Linked to US-Iran Cyber Tensions
What happened SentinelOne has uncovered Fast16, a Lua-based sabotage malware developed and deployed years before Stuxnet that was designed to tamper with high-precision calculation software used in civil engineering, physics, and physical process simulations. The malware was used in an attack in 2005 and was referenced in the ShadowBrokers’ 2016 leak of NSA offensive tools….The…
-
Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software
Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran’s nuclear program by destroying uranium enrichment centrifuges.According to a new report published by SentinelOne, the previously undocumented cyber sabotage framework dates back to 2005, primarily targeting high-precision calculation software to tamper First seen on thehackernews.com…
-
Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program”, and Predates Stuxnet
Researchers have finally cracked Fast16, mysterious code capable of silently tampering with calculation and simulation software. It was created in 2005″, and likely deployed by the US or an ally. First seen on wired.com Jump to article: www.wired.com/story/fast16-malware-stuxnet-precursor-iran-nuclear-attack/
-
The thin gray line: Handala, CyberAv3ngers and Iran’s proxy ops
A state of perpetual interference: To understand how proxy insurgent groups such as Handala fit within Iran’s modern-day intelligence ecosystem, we first need to look at the historical development of the country’s intelligence operations.In 1953, the United States and Britain (via conduit operations of the CIA and MI6, respectively) instigated a coup in Iran that…
-
Internet-Exposed ICS Devices Raise Alarm for Critical Sectors
Exposed ICS devices and insecure protocols like Modbus increase risks to critical infrastructure, enabling disruption, data access, and potential sabotage. Malware targeting industrial control systems (ICS) poses a serious risk to critical infrastructure, with threats like Stuxnet, Industroyer, Triton, Havex, and BlackEnergy already demonstrating the ability to disrupt operations, cause outages, and even inflict physical…
-
The OT security time bomb: Why legacy industrial systems are the biggest cyber risk nobody wants to fix
Tags: access, attack, authentication, awareness, business, ciso, compliance, control, cyber, cybersecurity, data, detection, exploit, firewall, incident, incident response, infrastructure, insurance, ISO-27001, metric, mfa, monitoring, network, office, phishing, ransomware, regulation, resilience, risk, risk-management, service, siem, soc, stuxnet, supply-chain, tool, vpn, vulnerability, zero-dayWhy everyone knows it’s burning, but nobody pulls the fire alarm: When I talk to OT managers, production leads or plant engineers, I rarely hear, “We didn’t know we had a problem.” Far more often, it’s, “We know it’s critical, but we can’t just shut it down.” This gap between awareness and action is the…
-
14 old software bugs that took way too long to squash
Tags: access, api, attack, authentication, automation, bug-bounty, communications, computer, control, credentials, cve, cvss, cyber, data, data-breach, dns, dos, encryption, exploit, flaw, hacker, Hardware, infosec, infrastructure, Internet, kaspersky, linux, malicious, malware, microsoft, mitigation, network, nist, open-source, password, programming, remote-code-execution, risk, service, software, stuxnet, supply-chain, technology, theft, threat, tool, update, usa, vulnerability, windows, zero-dayAge: 30 yearsDate introduced: 1995Date fixed: February 2026Researchers unearthed a legacy flaw in the widely used libpng open-source library that had existed since the technology was first released more than 30 years ago.The heap buffer overflow vulnerability (CVE-2026-25646) meant that applications using the flawed software would crash when presented with a maliciously constructed PNG raster…
-
14 old software bugs that took way too long to squash
Tags: access, api, attack, authentication, automation, bug-bounty, communications, computer, control, credentials, cve, cvss, cyber, data, data-breach, dns, dos, encryption, exploit, flaw, hacker, Hardware, infosec, infrastructure, Internet, kaspersky, linux, malicious, malware, microsoft, mitigation, network, nist, open-source, password, programming, remote-code-execution, risk, service, software, stuxnet, supply-chain, technology, theft, threat, tool, update, usa, vulnerability, windows, zero-dayAge: 30 yearsDate introduced: 1995Date fixed: February 2026Researchers unearthed a legacy flaw in the widely used libpng open-source library that had existed since the technology was first released more than 30 years ago.The heap buffer overflow vulnerability (CVE-2026-25646) meant that applications using the flawed software would crash when presented with a maliciously constructed PNG raster…
-
Aufrüttelndes Jubiläum: 15 Jahre Stuxnet und die Lehren für die OT-Cybersicherheit
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/jubilaeum-15-jahre-stuxnet-lehren-ot-cybersicherheit
-
They know where you are: Cybersecurity and the shadow world of geolocation
Geolocation is the invisible attack vector. From Stuxnet to today’s APTs, malware now lies dormant until it hits the right place”, turning location data into a weapon. Acronis’ TRU explains why defenses must evolve beyond VPNs and perimeter controls. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/they-know-where-you-are-cybersecurity-and-the-shadow-world-of-geolocation/
-
ISMG Editors: China-Linked SharePoint Exploits Raise Alarm
ISMG Editors: China-Linked SharePoint Exploits Raise Alarm. In this week’s update, four ISMG editors discussed the latest SharePoint exploits linked to China, why the security of operational technology is still lagging 15 years after Stuxnet and a look at the widening divide in the ways enterprises are approaching AI adoption. First seen on govinfosecurity.com Jump…
-
Funding for program to stop next Stuxnet from hitting US expired Sunday
Tags: stuxnetCyberSentry work grinds to a halt First seen on theregister.com Jump to article: www.theregister.com/2025/07/22/lapsed_cisa_funding_cybersentry/
-
House hearing will use Stuxnet to search for novel ways to confront OT cyberthreats
The House Homeland Committee will revisit the malware to use the knowledge from the spy effort to explore the domestic threats facing the U.S. in 2025. First seen on cyberscoop.com Jump to article: cyberscoop.com/house-homeland-stuxnet-hearing-garbarino-critical-infrastructure-ot/
-
Wie gefährlich sind Bedrohungen wie Regin tatsächlich?
Seit der Entdeckung von Stuxnet vor einigen Jahren gab es eine Reihe an zielgerichteten Schadcodes (wie Flame, Duqu, Gauss und nun Regin), die im Verdacht stehen, von Staaten konzipiert oder gesponsert worden zu sein. Muss man sich als normaler Nutzer oder Unternehmen Sorgen darüber machen? First seen on welivesecurity.com Jump to article: www.welivesecurity.com/deutsch/2014/11/27/wie-gefahrlich-sind-bedrohungen-wie-regin-tatsachlich/
-
Defending against USB drive attacks with Wazuh
USB drive attacks constitute a significant cybersecurity risk, taking advantage of the everyday use of USB devices to deliver malware and circumvent traditional network security measures. These attacks lead to data breaches, financial losses, and operational disruptions, with lasting impacts on an organization’s reputation. An example is the Stuxnet worm discovered in 2010, a malware…
-
Stuxnet, The Malware That Propagates To Air-Gapped Networks
Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA) systems used in industrial facilities. By exploi… First seen on gbhackers.com Jump to article: gbhackers.com/stuxnet-malware-air-gapped-networks/
-
Improved, Stuxnet-Like PLC Malware Aims to Disrupt Critical Infrastructure
A newly developed PLC malware does not require physical access to target an ICS environment, is mostly platform neutral, and is more resilient than tr… First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/improved-stuxnet-like-plc-malware-disrupt-critical-infrastructure
-
Remote Stuxnet Style Attack Possible With Web Based PLC Malware
First seen on packetstormsecurity.com Jump to article: packetstormsecurity.com/news/view/35609/Remote-Stuxnet-Style-Attack-Possible-With-Web-Based-PLC-Malware.html
-
US, Israel Used Dutch Spy to Launch Stuxnet Malware Against Iran
First seen on darkreading.com Jump to article: www.darkreading.com/ics-ot-security/us-israel-dutch-spy-stuxnet-malware-against-iran
-
Symantec entdeckt erneut gegen den Iran gerichtete Malware
Der Wurm Narilam kompromittiert SQL-Datenbanken. Dafür sucht er nach bestimmten persischen Wörtern. Ähnlich wie Stuxnet verbreitet sich die Malwar… First seen on http: Jump to article: www.zdnet.de/88133174/symantec-entdeckt-erneut-auf-den-iran-ausgerichtete-malware/
-
lost+found: Kosmische Strahlung, TED und 15 Menthe-Middle
Heute mit: Strahlung aus dem All, einer Online-Schulbank für Pentester, TED-Talks über Computer und Fisch, der Familie Stuxnet, einem VM-Kniff, Men-in… First seen on http: Jump to article: www.heise.de/meldung/lost-found-Kosmische-Strahlung-TED-und-15-Men-in-the-Middle-1750601.html
-
[News] More Flame Modules Could Be Lurking
BROOKLYN, NY–After years of research and investigation into the cyber-espionage attacks that began with the discovery of Stuxnet and continued with F… First seen on http: Jump to article: feedproxy.google.com/~r/SecurityTube/~3/TV-OeXMKZjk/1022

