Fast16: High-precision software sabotage 5 years before Stuxnet

(sentinelone.com)

194 points | by dd23 8 hours ago

14 comments

  • codezero 7 hours ago
    My favorite part of this was:

    That kind of notation, called SCCS/RCS, is the equivalent of finding a rotary phone in a modern office. Nobody uses it in 2005 Windows kernel code unless their programming background goes back decades, to government and military computing environments

    The astrophysics lab I worked at in 2006 was still using svn and had a bunch of Fortran with references to systems from the 70s and 80s. The code ran perfectly well thanks to modern optimizing compilers and having moved from Vax to Linux in the 90s, it was a surprisingly seamless transition.

    It reminds me of a conference talk I’ve referenced before “do over or make due” basically implying rewriting large amounts of mostly functioning code was not worth the effort if it could be taped together with modern tools.

    • kimixa 1 hour ago
      Ha, I worked for a company that until ~2012 still used RCS-backed SCM, absolute hack job on a shared file share that wrapped RCS with a "project file" to allow a tree of specific revisions for a "project". "MKS" it was called. And by the sound of it the "old" '90s version, not the java EE rewrite.

      That meant the files has the entire "$Revision: 1.3 $" nonsense and "file changelog" at the top too - though many newer files never bothered to include the tags to actually get RCS to replace them. Inconsistent as hell.

      And while the "family" of devices the software was for traces it's origin to the mid '90s, functionally none of the code was older than ~5 years at that time.

      Naturally even with only a few tens of engineers it regularly messed up, commits stepped on each other's toes and the entire tree got corrupted regularly. For fun I wrote a script that read it all and imported the entire history into git - you only had to go back a few years before the entire thing was absolute nonsense.

      I have no idea why that was still being used then, but I assume it had been in use from the very start of that entire hardware family. Perhaps as it was fundamentally a "hardware" company - which until surprisingly recently seemed to consider "source control" to be "shared folders on remote machines" - "software" source control wasn't considered a priority.

    • beejiu 3 hours ago
      If you're using R in 2026, you're probably invoking code compiled from Fortran from the 70s/80s somewhere along the line. It's a foundation for a lot of numerical computing.
    • hnthrowaway0315 4 hours ago
      Does that mean that three-letter agencies were/are able to recruit from the fields for each type of malware? For example, fast16 might actually be written by someone who used to write scientific calculation software, while Stunex was written by someone who used to work for Siemens?
      • mike_d 1 hour ago
        Don't think of it as a materials simulation engineer being recruited and trained on how to write complex malware.

        Rather this was developed by a team of 6-8 people. Maybe two or three of them working on the implant, another engineer handling the exploits and propagation, and yet another building the LP and communications channels. They are supported by a scientist with deep knowledge of the process they are messing around with (say developing nuclear weapons), and a mathematician that knows how to introduce subtle and undetectable errors.

      • eth0up 3 hours ago
        Try to remember how hypothetical everything tended to be before Snowden. And 'twas a meager pittance that was revealed. They have toys that'd blow minds and people yee'd swear weren't people. It's all fun and games to poke fun, but holy shit those guys are NTBF'dW.

        Every academic institution, every school, all under the radar of recruitment and more. It's difficult to believe, but the network is real.

        There are certainly people here on HN who've been solicited, most who'll never mention it.

        It's fun to imagine, though, what tight groups of highly motivated, stupidly intelligent people can do when they collectively commit to doing so - and with a hefty budget to assist.

    • tptacek 6 hours ago
      Yeah, I used to be skeptical of the government provenance of things like Stuxnet (I am not any more, I'm fully sold, like everyone else), and notes like this were why. People used RCS well into the 2000s! RCS as a tool had virtues over SVN and CVS.
      • ajju 4 hours ago
        My favorite part of the paper is that the “attack” isn’t just exploiting a bug — it’s exploiting how different components interpret the same input. Modifying an executable as it’s loaded into memory is one example, but the deeper pattern is the mismatch.

        What’s interesting about the malware in this post is that it goes one step further: instead of exploiting mismatches, it corrupts the computation itself — so every infected system agrees on the same wrong answer!

        More broadly: any interpretive mismatch between components creates a failure surface. Sometimes it shows up as a bug, sometimes as an exploit primitive, sometimes as a testing blind spot. You see it everywhere — this paper, IDS vs OS, proxies vs backends, test vs prod, and now LLMs vs “guardrails.”

        Fun HN moment for me: as I was about to post this, I noticed a reply from @tptacek himself. His 1998 paper with Newsham (IDS vs OS mismatches) was my first exposure to this idea — and in hindsight it nudged me toward infosec, the Atlanta scene, spam filtering (PG's bayesian stuff) and eventually YC.

        https://users.ece.cmu.edu/~adrian/731-sp04/readings/Ptacek-N...

        The paper starts with this Einstein quote "Not everything that is counted counts and not everything that counts can be counted", which seems quite apt for the malware analyzed here :)

      • codezero 6 hours ago
        I do wonder if these breadcrumbs were also left intentionally. “Oh look, we are using old stuff, don’t be afraid!” Or for some other reason. It is a little surprising to pull off such a sophisticated attack and miss details you could find running ‘strings’ unless I’m missing something and this part was encrypted.
        • tptacek 6 hours ago
          I think that in the time period we're talking about, RCS wasn't really even all that old. Like, RCS is old, sure, but it was also in common use especially by Unix systems people; it's what you might have reached for by default to version your dotfiles, for instance.
          • codezero 6 hours ago
            Yes, but even back then I was aware of the sections in executables (wasn’t this where it was found?) and any neckbeard from the 70s and 80s might be even more so aware. That said, yeah, sure, it’s a very possible and understandable oversight, but I’m weary because of all the text in viruses and such as indicators. Seems like a pass over ‘strings’ would be obvious. Though. TIL, strings doesn’t necessarily scan the entire executable.
      • gucci-on-fleek 3 hours ago
        > People used RCS well into the 2000s!

        I still use RCS today. It's certainly not my preferred option, but my collaborator likes it, and it's not too annoying for me to use.

    • drysine 5 hours ago
      >in 2006 was still using svn

      Perhaps you meant cvs? Subversion was released in 2004 and git appeared in 2005.

      • mjg59 4 hours ago
        Subversion 1.0 was released in 2004, but it was already widely used before then.
      • codezero 4 hours ago
        We used cvs, but did switch to svn before/around 2006, but I could be mixing that up. We did not switch to git even by 2012 when I left.

        The reference to the 70s and 80s code didn’t imply it was version controlled before svn/cvs though if that’s what you meant, but by that time it was and still had old timestamps commented in the text files.

  • hnthrowaway0315 4 hours ago
    Download link for anyone who is curious enough:

    https://bazaar.abuse.ch/sample/9a10e1faa86a5d39417cae44da5ad...

    I'll probably build a Windows XP VM first.

    • int0x29 1 hour ago
      Has anyone posted the windows service file yet? That looks just to be the loader.
  • tiagod 6 hours ago
    This is an amazing find. I'm very curious regarding the specific targets of these rules, and in the exact changes to the results. Wonder if they will only make a difference in simulated conditions super specific to nuclear reactors?
  • trebligdivad 7 hours ago
    Haha it's a fun finding though; The source control comment feels a little off; I'm sure there were SCCS (hmm or did cvs use similar?) still around at that time.
    • tiagod 6 hours ago
      I believe that comment was specific to it being unusual in Windows software, suggesting the developers were also working in UNIX stuff (where usage SCCS/RCS was common).
  • Lihh27 5 hours ago
    heh the key move is the worm. you can't catch it by checking on a second box because there is no clean box.
  • kittikitti 5 hours ago
    Thank you for sharing this. I was recently pushing the limits of precision computing and this illuminated a part of my research. It built on top of largely government funded research, where I found a surprising dearth of available precision frameworks with verification. Perhaps national security interests, as elucidated by the original poster, discourages transparency of methods for arbitrary precision calculations.
  • slim 7 hours ago
    sabotaging science must be the most morally corrupt thing you can do as a civilisation
    • throwaway25151 6 hours ago
      How about killing scientists and engineers? [1]

      [1] https://en.wikipedia.org/wiki/Assassinations_of_Iranian_nucl...

      • flyinglizard 4 hours ago
        Scientists and engineers also invented Zyklon-B gas and built the crematoriums in the concentration camps. Don’t underestimate what scientists and engineers can do to Jews.
    • jabedude 6 hours ago
      Spying on and sabotaging weapons development of foreign adversaries is a completely normal government function
    • _joel 6 hours ago
      I wonder how many results got nerfed via https://en.wikipedia.org/wiki/Pentium_FDIV_bug before it was known about.
      • codezero 6 hours ago
        I’d be surprised if it were a lot. At that time (open to corrections) not a lot of scientific research was done on consumer intel platforms.

        Obviously it was found by a mathematician, but I still suspect it wasn’t obvious in published research or that it ended up not causing significant enough deviations to cause research to revisit the calculations.

        My team ran into some interesting but very small deviations when we moved our iterative solar wind model from 32 bit to 64 bit, but the changes weren’t significant enough to revisit or re-do prior research wholesale.

        Like my team in the 2000s I suspect anyone who had data crunched by this bug also revisited it and either concluded it wasn’t significant enough or redid the work and it didn’t change the conclusions.

        I am curious now if this bug was cited in any papers at the time to give a rough idea how aware or affected academics were.

        • kjs3 2 hours ago
          At that time (open to corrections) not a lot of scientific research was done on consumer intel platforms.

          We had researchers doing what I suppose might be called HPC on Sequent Symmetrys, which were i386s in the mid-80s and Pentiums by the mid-90s. There were other high-performance x86 SMP boxes that were roughly equivalent (e.g. NCR 3550). That plus some pretty good x86 FORTRAN compilers (e.g. Lehey (sp?)) made this reasonable. I also know a lot of folks who had desktop/side SMP PPros + FORTRAN to save grant money on the big iron and got useful work out of them.

          Basically, x86 was way cheap and had useful amounts of FP. There's a reason x86 displaced risc; this is one. I'm sure they would have rather used something like an X/MP-48, but one plays the hand one is delt.

    • codezero 6 hours ago
      None of the science being sabotaged was being published in peer reviewed journals was it? (besides the Portuguese hydrodynamic modeling stuff, but it could have been accidental or had other uses)

      And yes, to be clear, I don’t consider it contributing to “science” if it’s not published, reviewed, and reproducible.

    • qingcharles 5 hours ago
      The first thing I thought of was The 3-Body Problem series. If you've read the books (or watched the shows you'll know what I mean).
    • Cthulhu_ 6 hours ago
      Nah; it's to prevent a country from developing a superweapon and possibly triggering WW3 / worldwide nuclear annihilation.

      This comment is very exaggerated, I can think of a few more "morally corrupt" things to do.

  • Retr0id 7 hours ago
    The submitted article appears to be an LLM summary of https://www.sentinelone.com/labs/fast16-mystery-shadowbroker...
  • _alphageek 2 hours ago
    [dead]
  • jeremie_strand 6 hours ago
    [dead]
  • TranspectiveDev 1 hour ago
    [dead]
  • aaron695 1 hour ago
    [dead]
  • vasco 6 hours ago
    So that's why China still can't make ballpoint pens? /s