Although the virus already had a self-destruct routine the Virus creators did not use it. Instead a separate application was deployed on the infected machines and the virus files were removed while random invisible data was rewritten on the disk so that no one could ever retrace the activity back to the virus creators.
It is suspected that the Virus was used to steal a lot of private information and the most likely point of Origin is US or Israel. This can not be confirmed though. One thing is certain: Computer Virus experts declared that the virus degree of sophistication indicates that the virus authors have both advanced technical and advanced mathematical knowledge.