Since you made no specific references to what you were talking about, nobody can be criticized for not knowing what your post was supposed to be about. In any case, this is more irrelevant whataboutism--a standard "poisoning the well" technique designed to distract from a topic. So let's get back to the actual topic.
In the latest news on the Russiagate scandal in the US, Microsoft claims to have shut down a brewing Russian cyberattack that was designed to spoof some of their servers. What they do in such cases is set up fake Microsoft servers, e.g. for downloading Office 365 software, and then use phishing attacks through email to get unwary targets to visit the sites, which load malware into the visitor's systems. In this case, the main targets were apparently conservative sites that were considered anti-Trump (or at least anti-Russian). This is not likely to have much impact on Russian attempts to subvert the 2018 election, but it is nice to think that someone is doing something to punch back. The Trump administration certainly isn't.
Here is Microsoft's official statement on the matter:
We are taking new steps against broadening threats to democracy
It’s clear that democracies around the world are under attack. Foreign entities are launching cyber strikes to disrupt elections and sow discord. Unfortunately, the internet has become an avenue for some governments to steal and leak information, spread disinformation, and probe and potentially attempt to tamper with voting systems. We saw this during the United States general election in 2016, last May during the French presidential election, and now in a broadening way as Americans are preparing for the November midterm elections.
Broadening cyberthreats to both U.S. political parties make clear that the tech sector will need to do more to help protect the democratic process. Last week, Microsoft’s Digital Crimes Unit (DCU) successfully executed a court order to disrupt and transfer control of six internet domains created by a group widely associated with the Russian government and known as Strontium, or alternatively Fancy Bear or APT28. We have now used this approach 12 times in two years to shut down 84 fake websites associated with this group. Attackers want their attacks to look as realistic as possible and they therefore create websites and URLs that look like sites their targeted victims would expect to receive email from or visit. The sites involved in last week’s order fit this description.
We’re concerned that these and other attempts pose security threats to a broadening array of groups connected with both American political parties in the run-up to the 2018 elections. That’s why today we are expanding Microsoft’s Defending Democracy Program with a new initiative called Microsoft AccountGuard. This initiative will provide state-of-the-art cybersecurity protection at no extra cost to all candidates and campaign offices at the federal, state and local level, as well as think tanks and political organizations we now believe are under attack. The technology is free of charge to candidates, campaigns and related political institutions using Office 365.
As a special master appointed by a federal judge concluded in the recent court order obtained by DCU, there is “good cause” to believe that Strontium is “likely to continue” its conduct. In the face of this continuing activity, we must work on the assumption that these attacks will broaden further. An effective response will require even more work to bring people and expertise together from across governments, political parties, campaigns and the tech sector.
See also BBC News story:
Microsoft claims win over 'Russian political hackers'
The Wikipedia page
Fancy Bear has more background information on the GRU's cyberwarfare activities.