Sorry, I'm not omniscient, you just keep picking topics)
I've been in cybersecurity consulting for half my life, so I can tell you a lot about the subject)
It's not new, it's been around for many years, usually such attacks were carried out by APTs with the aim of stealing commercial and even secret information.
Then, when research reports became publicly available, ordinary scammers also became active.
Currently, there are simply hundreds of schemes, from simple test ones if you want to work with us, to creating a whole company history on LinkedIn with employees and reviews, and real interviews with live HR drops.
As for the attack vectors themselves, there have been such a diverse number of them in the last 2 years (references to all supply chain attacks and bugs found on GitHub during that time).
The simplest way is to inject some kind of package that downloads a binary and runs it with user privileges, doing whatever is needed.
If we consider the crypto case, for example, very recently a bug was fixed in a cryptographic library that was used by almost all decentralized wallets, where it was possible to gain access to the private key (if I'm not mistaken, it was a regular prototype pollution at its core) or there was a bug in the cryptography implementation itself, which allowed recovering the private key.
And there are also special confirmations on Ethereum that allow your funds to be debited sometime later. There are special services for checking and revoking such signatures.
Brief summary, in the 21st century, cybersecurity is no longer a separate profession, it is already a necessity for every person. Without delving into theory, you shouldn't be surprised by such cases.
And even if you do delve into it, there's always social engineering, which will make you unconsciously give everything to the attackers yourself.