To be clear, the apps are disabled as soon as they are discovered. Extensions that were impacted have already been contacted.
What happened here is that developers were tricked into granting oauth permission to the chrome web store api. As a domain admin, you can take some steps to limit the impact from something like this through the Google Admin console. I am by no means an gapps expert, but some things you can do to lock this down
1. Make sure your team is aware of the ongoing attack, and to not grant oauth usage to apps unless absolutely certain they are needed (the Chrome Web Store team will not be asking someone to grant us access to their account by our own API)
5. If it makes sense for your team, configure your domain to use trusted apps only - In App Access Control, enable Trust Internal or Domain-Listed Apps Only.
patrick