The near-perfect personal attack vector is "shoulder surfing". If you are not familiar with the concept, it is literally a threat actor looking over your shoulder and observing everything you type, see on the screen and interact with in the physical world, including paper, pens and even removable media.

Shoulder surfing is the ultimate method a threat actor can use to compromise a system because the only method of detection is just to say "no" or obfuscate the screen with a polarized filter and shield the keyboard from view. Both, however, are not typically present in a corporate environment when dealing with trusted individuals. But what about untrusted identities? Read more.. (Page 14-15)