The latest propagation tactics include USB spreading, network shares spreading, and according to McAfee, the latest samples that they've analyzed are attempting to exploit only English language OS versions thanks to an OS fingerprinting feature within a Metasploit exploit used by the worm's authors.
Ever since the first release of the worm, the authors' criminal intentions became pretty evident. Infected hosts would be exposed to fake security software claiming that the host's security has been compromised -- appreciate the irony here -- with the worm's authors earning $30 for each and every successful sale of the bogus security software. This approach of monetizing malware infected hosts through an affiliate-based network is one of the main incentives for assembling a botnet these days.