They are not the first others have already done impressive work on the reverse engineering the protocol.
If i read the article correct there is already a remedy for this kind of attacks implemented in the PLC and that is to enable access protection in the PLC and set a strong password.