A six-month social engineering operation, attributed to suspected North Korean actors with medium-high confidence, has been linked to a $280 million exploit by Drift and the SEAL 911 team1. This assessment suggests a connection to the same actors responsible for the Radiant Capital hack, implying a coordinated and targeted effort. The operation's duration and sophistication indicate a high level of planning and resources, underscoring the threat posed by nation-state actors. The use of social engineering tactics over an extended period allowed the attackers to gain trust and ultimately exploit vulnerabilities, resulting in significant financial losses. This incident highlights the importance of robust security measures and awareness training to counter such threats, as sophisticated social engineering operations can have devastating consequences for organizations, so what matters most to practitioners is the need to enhance their defenses against these highly targeted and persistent attacks.