So where does this certificiate they revoked come from?
Did they steal a valid MDM certificate from some corporation? That's kind of what it sounds like, but it isn't clear. Or did they use social engineering or other tactics to get someone to sign a falsified certificate for them? More information would be nice. Was the whole exploit hinging on this certificate so that revocation takes care of it, or is that just a finger in the dike until it can be permanently addressed with a patch to OS X and/or iOS?
Since this is an exploit depending on malicious software on a Mac, I can't help but wonder if malicious software on a Windows machine work equally well, or is there something special about using a Mac (i.e. the iPhone "trusts" it more?) It is pretty simple to deliver malware to a PC, and most iPhone owners will have a PC rather than a Mac, so it is interesting that the vector used a Mac. It seems there must be something different about the way an iPhone talks to or trusts a Mac that makes the malware possible there, otherwise they would have delivered the payload via Windows or made it dual platform.