Skip to content
Threat Feed
high advisory

fast16 Cyber Sabotage Framework

The fast16 framework is a cyber sabotage tool dating back to 2005 that selectively targets high-precision calculation software, patching code in memory to tamper with results, using a Lua virtual machine and propagating across an entire facility to produce inaccurate calculations, with svcmgmt.exe as a carrier and fast16.sys modifying executable code.

The fast16 framework is a cyber sabotage tool discovered in 2026, with core components dating back to 2005. The framework selectively targets high-precision calculation software, patching code in memory to tamper with results. This attack predates Stuxnet and leverages an embedded customized Lua virtual machine, making it an early example of sophisticated malware architecture. The name ‘fast16’ is referenced in the ShadowBrokers’ leak of NSA’s ‘Territorial Dispute’ components, indicating its potential use by nation-state actors. The framework aims to produce inaccurate calculations across an entire facility by combining its payload with self-propagation mechanisms, making it a threat to organizations relying on precise computations.

Attack Chain

  1. The attacker deploys svcmgmt.exe onto the target system.
  2. svcmgmt.exe executes, acting as a service wrapper. It contains an embedded Lua 5.0 virtual machine and encrypted bytecode.
  3. Depending on command-line arguments, svcmgmt.exe installs itself as a service, executes Lua code, or spawns child processes in wrapper/proxy mode.
  4. The Lua bytecode is decrypted and executed. This code handles configuration, propagation, and coordination logic.
  5. The Lua code interacts with Windows NT APIs for filesystem, registry, service control, and network operations to facilitate lateral movement.
  6. fast16.sys kernel driver is installed. This driver intercepts and modifies executable code as it is read from disk.
  7. fast16.sys patches targeted high-precision calculation software in memory.
  8. The patched software performs calculations, but produces incorrect results due to the injected code modifications, leading to software sabotage.

Impact

The fast16 framework can cause significant damage to organizations relying on high-precision calculations. By silently corrupting results, the framework can undermine the integrity of research, engineering, or other critical processes. While the exact number of victims is unknown, the framework’s sophistication and potential links to nation-state actors suggest it could be used in targeted attacks against high-value facilities like advanced physics, cryptographic, and nuclear research facilities. Successful attacks could lead to flawed research outcomes, compromised cryptographic systems, and potentially catastrophic errors in nuclear facilities.

Recommendation

  • Monitor for the execution of svcmgmt.exe, especially with command-line arguments -p, -i, or -r. Deploy the Sigma rule detecting svcmgmt.exe execution.
  • Detect the presence of fast16.sys by its SHA256 hash (07c69fc33271cf5a2ce03ac1fed7a3b16357aec093c5bf9ef61fbfa4348d0529) or MD5 hash (0ff6abe0252d4f37a196a1231fae5f26) on disk.
  • Monitor for the creation of new services with an image path pointing to svcmgmt.exe to detect potential persistence attempts. Deploy the Sigma rule detecting service creation with svcmgmt.exe as the image path.
  • Implement robust file integrity monitoring to detect unauthorized modifications to executable files by fast16.sys.

Detection coverage 3

Detect svcmgmt.exe Execution

medium

Detects execution of svcmgmt.exe, a component of the fast16 framework.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detect fast16.sys File Creation

high

Detects the creation of fast16.sys, a component of the fast16 framework, using its hash.

sigma tactics: installation techniques: T1574.001 sources: file_event, windows

Detect svcmgmt.exe as a service

medium

Detects svcmgmt.exe being configured as a service.

sigma tactics: persistence techniques: T1543.003 sources: process_creation, windows

Detection queries are available on the platform. Get full rules →

Indicators of compromise

2

hash_md5

2

hash_sha256

TypeValue
hash_md5dbe51eabebf9d4ef9581ef99844a2944
hash_sha2569a10e1faa86a5d39417cae44da5adf38824dfb9a16432e34df766aa1dc9e3525
hash_md50ff6abe0252d4f37a196a1231fae5f26
hash_sha25607c69fc33271cf5a2ce03ac1fed7a3b16357aec093c5bf9ef61fbfa4348d0529