First, all the attacks required some kind of user interaction. Whether to execute "applications" or to open a Microsoft Word document, all the attacks shown required user interaction in order to compromise the device.
Second, these attacks could happen anywhere. They would not just happen in Moscow, nor did it require us to be in Moscow. Whether those attacks occur while you are sitting in a coffee shop in Berlin, or your home in Tokyo, these types of attacks can and do occur, on a worldwide scale.
Third, the infections occurred on newly unboxed hardware. Had basic security precautions such as updating the operating system or not opening emails from unrecognized sources been done, these attacks could have been prevented.
Finally, to reiterate, while all three devices looked like they had been compromised with no user interactions that was just not the case. Incorrect impressions may have been formed due to the editing process; no zero-days were used and all infections required plenty of risky behavior to succeed.