edit: ah I see in the wiki it says initial infection by USB stick...
The initial vector was a USB key, taking advantage of Windows auto-run/auto-play feature. The reason for self-propagation was for infection of neighbor centrifuges. Each host infects 3, so the infection spreads like a nuclear chain reaction. Fitting, no?
you don't build something like this from a simulated system then hope it gets there, when NAT would stop this from getting on the couple laptops you want.
WTF you talkin' 'bout Willis?First, you don't use SOHO routers at a nuclear centrifuge site. Real routers don't use NAT for a firewall.Second, you MUST build something like this in a simulated system and test its ability to propagate from host to host and to infect the PLCs as designed.Third, WinCC is not on a laptop, it's on a workstation computer, a desktop or operator panel and Step7 (A Windows application) is resident on that workstation.Fourth, I have Step7 and I work with it almost daily in my job so I know WTF it's about and how to use it.Fifth, I know what a PLC is and what it is capable of doing.Sixth, the PLCs in question are Siemens design and they were running a specific drive and motor combination.Seventh, Iran was known to be using UNLICENSED and smuggled copies of WinCC and Step7.Eighth, you don't know what the fuck you are talking about.What part of "It was launched from a USB drive" do you not understand? Firewalls and routers are irrelevant.