OK, here's a clarification regarding the clipboard reading. I think the Macrumors article worded this wrong. Here's the original paragraph from Palo Alto Networks (highlighting by me):
A little background: In iOS there can be not just one clipboard (or pasteboard in Apple terminology), but many. There is one system-provided pasteboard that is used for regular copy/paste operations between apps (with the name "UIPasteboardNameGeneral"). But apps can create additional named pasteboards for their own purposes. According to Palo Alto Networks, this is what the Xcodeghost code does (probably to share some data between mulitple infected apps on the device).
So, while Palo Alto Networks point out the theoretical possibility of grabbing sensitive data from the system clipboard, the Xcodeghost code in its current form does not appear to actually do that.