https://cryptome.org/2015/07/wikileaks-stratfor-malware.htm Wikileaks hasn't warned anyone about malware yet.
Interesting. Yesterday, I warned John Young about a link he'd posted: John took the link down right away. And what the download package looked like on disc. From Sophos: There is an unusually high amount of this kind of thing these days. In my awareness, it started a few weeks prior to the Hacking Team compromise and has increased since.
Your questions imply that you haven't examined the outcomes of the hacking team compromise or any of the trove of data released into the wild. I think that the answers you seek may be found in those areas, at least eventually. 400 gigabytes of data is massive and it will take time to analyze all of it. This twitter feed is worth watching and there's a hacking team thread in FOI: https://twitter.com/search?q=#hacking team&src=typd https://whyweprotest.net/threads/the-hacking-team.128944/
I've tested some of the examples used by the author of the letter to John Young @ Cryptome. Yup! Evil malware lurking in Stratfor e-mail attachments!