What are examples of logs that you're considering IOCs? The picture you are painting is basically that most everyone is already compromised most of the time, which is ... hard to swallow.
I reported the experience on my devices, which said nothing about "everyone".
I reported the experience on my devices, which said nothing about "everyone".