Irongate uses a Man-in-the-Middle (MitM) technique to inject itself between the PLC (Programmable Logic Controller) and the legitimate software monitoring process, checks for defenses before detonating, as well as masking its tracks. The malware only works in a simulated environment and is probably just a proof-of-concept that is likely not used in wild; therefore is not yet advanced enough to impact real-world systems. The Stuxnet sabotage malware was allegedly developed by the United States and Israel to disrupt Iran’s nuclear facility and destroyed a several country’s uranium enrichment centrifuges.
Source: https://thehackernews.com/2016/06/irongate-stuxnet-malware.html