Just to show how international this is, re: http://blog.scansafe.com/journal/2009/5/18/japans-geno-gumblar.html
What I also found when delving into this how hard it could be for the web admins to find the attack code hidden sometimes inside manipulated images or inside manipulated and randowmnly obscured PHP-code. The attackers know every trick in the book. Allthough websites with attackable content is around that much, the code on a particular website can stem from various domains (that is why I propagated RequestPolicy add-on for the Fx browser from day one the extension came around), if something that you redirect to changes its act through manipulative insertion of malcode ,and if not alterted otherwise by scanning for attack code, cleansing can take as long as 50-60 days (sometimes a question of cost, where to slowly overwrite data is the most cost effective method, but least secure option. Well, days of crises are boom-times for cybercrime).
The cybercrimninals from gumblar & co are seeking a somewhat lower profile now, because of the media attention, maybe they need some cool-off time, but others will try to jump the botnet controlled hole, there are enough older and newer flash, adobe, and other vulnerabilties around to abuse, and also enough website owners and webmasters that missed their security bootcamp training, if not they loose from their adclick income through these attacks,