Influence operations targeting the elections in France and the US centered on leaked emails. Some are reckoned to have been damaging (those affecting the US Democratic National Committee) others to have have had negligible effect (emails taken from En Marche in France). But in these cases there was little suggestion that the stolen emails had been altered to render them more damaging.
That may not hold true in future operations. A study by the University of Toronto's Citizen Lab finds leaked emails belonging to a Russian journalist and critic of the government were doctored to discredit the opposition. Their investigation also led them to a large phishing campaign against more than two-hundred high-profile targets in thirty-nine countries. Citizen Lab is reticent about attribution, but says there's "clear overlap" between what they're seeing and evidence others have presented concerning "Russian-affiliated threat actors."
Reuters reports that hackers acting apparently on behalf of the government of Vietnam are attacking Philippine targets. The larger issue is the dispute over sovereign rights in the South China Sea.
A worm that exploited EternalRocks vulnerabilities, and that seemed to be quietly staging future attacks, may have been pulled by its creators, according to researchers at Croatia's CERT. Good news, maybe, but crying victory would be premature.
Flashpoint linguists think the authors of WannaCry spoke Chinese and English. They point out that this doesn't constitute attribution, and isn't inconsistent with Symantec's linkage of the ransomware campaign to North Korea.
Bogus WannaCry remedies are in the PlayStore. Don't bite.