Most real world high value attacks use a combination of techniques. Several tools are normally combined to pull off the attack.
nostr:npub1mxrssnzg8y9zjr6a9g6xqwhxfa23xlvmftluakxqatsrp6ez9gjssu0htc and nostr:npub1az9xj85cmxv8e9j9y80lvqp97crsqdu2fpu3srwthd99qfu9qsgstam8y8 discuss how some of these attacks play out, and the level of sophistication that can be involved.