Excerpt from a sales PDF from symantec.
https://www.symantec.com/content/dam/symantec/docs/reports/gistr22-government-report.pdf
Acts of influence
The 2016 U.S. presidential election was impacted by significant
cyber threat activity, most notably the public release of emails
stolen from the U.S. Democratic Party. A subsequent U.S.
Government investigation concluded that it was an attempt by
Russia to influence the outcome of the election. This was a wake-
up call for governments around the world both in terms of what
the leaks intended to achieve and the brazen nature by which
they were executed. Since the U.S. election, a number of other
governments around the world have reported similar attempts,
including during the recent French Presidential election.
Cyber espionage is of course not new, but the very public and
successful operations in 2016 mark a shift in tactics. Active
hacking in combination with fake news pushed by both state-
sponsored and issue-motivated groups will continue to be a very
difficult challenge for governments globally. Countering these
types of attempts to influence political outcomes will require
close collaboration between governments, the security sector,
news outlets, and organizations that hold politically sensitive
information.
Living off the land
In 2016, a wide range of attackers changed their tactics to make
more use of operating system features, off-the-shelf tools, and
cloud services to compromise their victims. The highest profile
case of a “living off the land” attack took place during the U.S.
elections. A simple spear-phishing email provided access to
Hillary Clinton’s campaign chairman John Podesta’s Gmail
account without malware or the need to exploit vulnerabilities.
there doesn't seem to be anything here