Skimming through the report (
JAR_16-20296 | Computer Security), it appears that the attacks were based primarily on phishing, which (as I understand it) requires participation by targeted users.
The U.S. Government confirms that two different RIS actors participated in the intrusion into a U.S. political party. The first actor group, known as Advanced Persistent Threat (APT) 29, entered into the party’s systems in summer 2015, while the second, known as APT28, entered in spring 2016.
Both groups have historically targeted government organizations, think tanks, universities, and corporations around the world. APT29 has been observed crafting targeted spearphishing campaigns leveraging web links to a malicious dropper; once executed, the code delivers Remote Access Tools (RATs) and evades detection using a range of techniques.
The report keeps the names/organizations of the attacks vague, so it may be that GOP representatives were targeted as well, only unsuccessfully.
I don't see anything in there that infers that actual voting systems or procedures were targeted or touched, but I'll look a little more.
Also, I'm not an IT guy, but I don't know that phishing is the same thing as hacking.
.