Attackers are using Joomla servers with a vulnerable Google Maps plugin installed as a platform for launching DDoS attacks.
A known vulnerability in a Google Maps plugin for Joomla allows the plugin to act as a proxy. Attackers spoof (fake) the source of the requests, causing the results to be sent from the proxy to someone else - their denial of service target. The true source of the attack remains unknown, because the attack traffic appears to come from the Joomla servers.
With cooperation from PhishLabs' R.A.I.D, PLXsert matched DDoS signature traffic originating from multiple Joomla sites, which indicates vulnerable installations are being used en masse for reflected GET floods, a type of DDoS attack. Observed attack traffic and data suggest the attack is being offered on known DDoS-for-hire sites.
Continued : http://www.net-security.org/secworld.php?id=18002

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic