Stuxnet is a Trojan, not a worm

Nov. 20, 2010
There's been a lot of buzz lately about malware (malicious software) called Stuxnet. It was first thought to mainly target WinCC (runs on Microsoft Windows), the supervisory control and data acquisition system by Siemens which controls valves, pipelines, ...

There's been a lot of buzz lately about malware (malicious software) called Stuxnet. It was first thought to mainly target WinCC (runs on Microsoft Windows), the supervisory control and data acquisition system by Siemens which controls valves, pipelines, and industrial equipment. The malware infects a computer via USB sticks and shared folders. Reports now say that Stuxnet's real aim is to sabotage the frequency converters in Iran's gas centrifuge plants, which turn uranium into atomic-bomb-grade fuel. The malware is thought to ramp-up the electrical current that supplies centrifuges until they spin so fast they fly apart.

That said, the mainstream news media keeps refering to Stuxnet as a worm. But Stuxnet is actually a Trojan, not a worm. While the words Trojan, worm, and virus are often used interchangeably, they are not exactly the same.

A computer virus is usually attached to an executable file, which doesn't actually affect a computer unless a human runs or opens the malicious program. People usually unknowingly spread a virus via emails with viruses as attachments.

A worm is usually considered a type of a virus, but it has the capability to travel without human action. It can self-replicate, meaning your computer might send out thousands of copies of itself, for example, to everyone in your email address book. Eventually, the worm uses so much system memory that individual computers, Web servers, and network servers crash.

And a Trojan is a harmful piece of software that looks legitimate, thus its name. Users are typically tricked into loading and executing a Trojan. Trojans can perform lots of dirty tricks: They can modify or delete files; let outsiders monitor your keystrokes; and let bad guys retrieve passwords or credit card information. Unlike viruses and worms, Trojans do not self-replicate.

Sponsored Recommendations

June 27, 2025
Ensure workplace safety and compliance with our comprehensive Lockout/Tagout (LOTO) Safety Training course. Learn critical procedures to prevent serious injuries.
June 27, 2025
Join our expert webinar to discover essential safety control measures and best practices for engineering a truly safe and compliant industrial environment.
June 25, 2025
An innovative aircraft with electric drives combines the best of both worlds. The cross between drone and helicopter could mean significantly faster and more efficient air emergency...
June 25, 2025
Effective when other materials fail, ceramics are particularly suitable for applications requiring wear and chemical resistance, sliding characteristics or biocompatibility. Discover...

Voice your opinion!

To join the conversation, and become an exclusive member of Machine Design, create an account today!