lammert - 7:09 pm on Feb 4, 2010 (gmt 0)
I don't think so. The goal of this attack does not seem to be making direct damage. Instead it is about gaining knowledge and survive in stealth mode as long as possible. To do this they have to make sure that their visible footprint is as small as possible and the only safe harbors are in the secured company networks because that is where no-one expects these infections to hide. Widespread infection of public servers would make them to visible.
If you read the article, the main difference experts see with normal attacks is that with normal attacks front-end servers are compromised (mostly web-servers etc) while with these attacks social networking strategies were used to infect only targeted computer systems and key-users behind the fences in the center of knowledge.