Stuxnet is a Trojan, not a worm

Nov. 20, 2010
There's been a lot of buzz lately about malware (malicious software) called Stuxnet. It was first thought to mainly target WinCC (runs on Microsoft Windows), the supervisory control and data acquisition system by Siemens which controls valves, pipelines, ...

There's been a lot of buzz lately about malware (malicious software) called Stuxnet. It was first thought to mainly target WinCC (runs on Microsoft Windows), the supervisory control and data acquisition system by Siemens which controls valves, pipelines, and industrial equipment. The malware infects a computer via USB sticks and shared folders. Reports now say that Stuxnet's real aim is to sabotage the frequency converters in Iran's gas centrifuge plants, which turn uranium into atomic-bomb-grade fuel. The malware is thought to ramp-up the electrical current that supplies centrifuges until they spin so fast they fly apart.

That said, the mainstream news media keeps refering to Stuxnet as a worm. But Stuxnet is actually a Trojan, not a worm. While the words Trojan, worm, and virus are often used interchangeably, they are not exactly the same.

A computer virus is usually attached to an executable file, which doesn't actually affect a computer unless a human runs or opens the malicious program. People usually unknowingly spread a virus via emails with viruses as attachments.

A worm is usually considered a type of a virus, but it has the capability to travel without human action. It can self-replicate, meaning your computer might send out thousands of copies of itself, for example, to everyone in your email address book. Eventually, the worm uses so much system memory that individual computers, Web servers, and network servers crash.

And a Trojan is a harmful piece of software that looks legitimate, thus its name. Users are typically tricked into loading and executing a Trojan. Trojans can perform lots of dirty tricks: They can modify or delete files; let outsiders monitor your keystrokes; and let bad guys retrieve passwords or credit card information. Unlike viruses and worms, Trojans do not self-replicate.

Sponsored Recommendations

Sept. 16, 2025
From robotic arms to high-speed conveyors, accuracy matters. Discover how encoders transform motor control by turning motion into real-time datadelivering tighter speed control...
Sept. 16, 2025
Keep high-torque gearboxes running efficiently with external lubrication and cooling systems delivered fast. Flexible configurations, sensor-ready monitoring, and stocked options...
Sept. 16, 2025
Now assembled in the U.S., compact P2.e planetary gear units combine maximum torque, thermal efficiency, and flexible configurations for heavy-duty applicationsavailable faster...
Sept. 16, 2025
Safety in automation goes beyond fences and emergency stops. Learn how functional safety actively monitors and controls motiondelivering smarter protection, greater flexibility...

Voice your opinion!

To join the conversation, and become an exclusive member of Machine Design, create an account today!