Nothing advanced about it. There are far more complex coded malware out there.
Years to construct. doubt it unless the person who wrote it had to learn programming to. The code uses bits of Siemens own code, so I suspect one of their developers leaked the information.
Grow ? It runs off an internal script, no ai here. Adapt ? Using a stolen signed driver isn't adapting to security, it just installs like a driver would.
It is known without a doubt to be a flash drive because the version of stuxnet used had no method for installing any other way.
Considering it used code from the actual application and you use the same software to control the equipment, nothing remarkable about sending the equipment one value and telling the user it is another. It patched the software changing some values so that every time it ran it used the wrong formula. Once the program is patched no need to keep malware running.
The addresses used are easy to get, they are in the code and nothing became inoperative because the minute it was found Siemens told its customers.
All traces were not eliminated, copies of it are everywhere and using proxies is about as old as the internet.
Revoking the security cert for that driver or disabling access to rundll32.exe which the malware relies on to begin running never occurred ? How about requiring all applications to be signed which when patched the Siemens software signature was broken.
I guess precautions were , don't click on it till we have a chance to get some coffee.
Article is way over the top. I have malware that is far more invasive and clever than stuxnet. stuxnet got attention because of the target.