And VMWare added:"We won't enable this kind of functionality until Apple gives their blessing for a few reasons," Rudolph told Ars. "First, we're concerned about our users — we are never going to encourage illegal activity that could open our users up to compromised machines or any sort of legal action. This is the same reason why we always insist on using a fully-licensed, genuine copy of Windows in a virtual machine — it's safer, more stable, fully supported, and completely legal."
"We're very interested in running Mac OS X in a virtual machine because it opens up a ton of interesting use cases, but until Apple changes its licensing policy, we prefer to not speculate about running Mac OS X in a virtualized environment," Krishnamurti added.
Hi, I'm the author of the Ars article and the submitter of this story, Alex from sunbelt got back to me with a bit more information:
Basically, it went like this:
Patrick Jordan, our CoolWebSearch expert, was doing research on a CWS exploit. During the course of the research, he disovered that a) the machine he was testing became a spam zombie and b) it send a call back to a remote server. He traced back the remote server and found what you have heard about.
The scale is unimaginable. There are thousands of machines pinging back in a day. There is a keylogger file that grows and grows, and then is zipped off and then the cycle continues again.
It is sophisticated. There are nifty little PHP scripts that help the criminals get reports. There is a special upload area.
It's really quite sucktastic.
As of next week, passwords will be entered in Morse code.