They could also modify the kernal so that processes could be hidden even from unix commands like 'top'. Then your computer could be instructed to serve out whatever the malicious person wanted - say like child porn.
Once you've got root, you can make the box do whatever it _can_ do. that said, I'd bet that the fix for this comes out in about 2 days.