Essentially, when it detects an intruding piece of malware, the program follows the virtual trail left behind back to the attack's source -- disabling every machine it encounters along the way.
ENGADGET: Japan working on powerful cyber weapon, knows best defense is a good offense