I don't disagree with either of those assessments. That being said:
1. Those who have obvious high-value information are the most likely to have strong passwords for their vaults and also to have changed those for high value accounts very quickly after a compromise like this one.
2. Spearphishing is a constant and those who are high-value targets should, in 2023, be well aware of this practice and how to recognize it.
I'll still be sitting here with my popcorn waiting for the first documented instance of one of those password vaults being cracked, period, and even longer waiting for any to be cracked that had strong passwords on them.
The reality of the situation is that it's a low risk of actual compromise of accounts, particularly if reasonable precautions are taken in promptly changing passwords for high-value online accounts.
The information in many of those vaults, in terms of the high-value targets, is already so stale as to be worthless. For those that had MFA/2FA on them in addition, it was not of much use to begin with.
I simply presume that those in the IT industry, banking industry, credit card industry, etc., know and follow best practices for securing their accounts and/or password vaults. If they don't, in 2023, then they should not be in the positions they're in. You have to have been living under a rock not to understand what you need to do after years, and years, and years of reporting on all kinds of compromises, both electronic and social engineering.