Coercion in cybersecurity refers to the use of threats, intimidation, or undue psychological pressure to compel individuals, often employees, to bypass security protocols, divulge sensitive information, or perform actions against their will that compromise an organisation's security.

What is coercion in cybersecurity?

Coercion in cybersecurity extends beyond mere social engineering by incorporating a strong element of duress or threat, forcing an individual to act against their better judgment or organisational policy. While social engineering relies on deception and manipulation, coercion specifically leverages psychological vulnerabilities, fear, or a desire to avoid negative consequences—whether real or perceived—to manipulate targets into compromising security.

This can manifest in several forms, including:

  • Blackmail: Threatening to expose sensitive personal information unless the victim complies with demands.
  • Threats of reputational damage: Warning that damaging information will be made public if certain actions are not taken.
  • Threats of job loss: Pressuring employees by implying or stating they will lose their employment.
  • Physical threats: Threatening harm to the individual or their loved ones.

Coercion often plays a critical role in insider threats, where employees are pressured into facilitating data breaches, installing malware, or providing unauthorised access to systems and networks. According to research cited by the Cybersecurity and Infrastructure Security Agency (CISA), insider threats driven by coercion represent one of the most difficult attack vectors to detect and prevent.

Why is coercion effective in cyber attacks?

Coercion is highly effective because it exploits fundamental human emotions—fear, shame, and self-preservation. Unlike phishing or pretexting, which rely on a target's trust or curiosity, coercion creates an immediate sense of urgency and danger that overrides rational decision-making. Key reasons for its effectiveness include:

  • Emotional override: Fear and panic can cause individuals to bypass their training and act impulsively.
  • Isolation: Victims often feel they cannot seek help without exposing the compromising information the attacker holds over them.
  • Perceived legitimacy of the threat: Attackers often gather real personal data from social media, data breaches, or surveillance to make their threats credible.
  • Power imbalance: The attacker positions themselves as having total control over the situation, leaving the victim feeling helpless.

For example, a cybercriminal might threaten to release embarrassing personal photos of an employee online unless they provide their company network login credentials. Similarly, an attacker could use information gathered from public social media to blackmail a high-ranking executive into approving a fraudulent wire transfer. In both cases, the victim's fear of personal consequences outweighs their commitment to security protocols.

How to identify coercion tactics in cybersecurity?

Recognising coercion early is essential for preventing security breaches. The SANS Institute recommends training employees to identify the following warning signs:

  • Unsolicited contact with threats: Receiving unexpected messages—via email, phone, or social media—that contain explicit or implied threats.
  • Demands for secrecy: The attacker insists that the victim must not tell anyone about the interaction or the demands being made.
  • Artificial urgency: Imposing tight deadlines with dire consequences for non-compliance (e.g., "You have 24 hours or the data goes public").
  • Requests for policy violations: Being asked to bypass security controls, share credentials, transfer funds, or install software outside of normal procedures.
  • Escalating pressure: The attacker increases the severity of threats over time if the victim does not comply immediately.
  • Use of personal information: The attacker demonstrates knowledge of the victim's personal life, family, finances, or habits to establish credibility and fear.

Organisations should foster a culture where employees feel comfortable reporting unusual or threatening interactions without fear of judgment or punishment.

When should you report a coercion attempt?

The answer is straightforward: immediately. Any suspected coercion attempt should be reported as soon as it is identified, regardless of how minor or uncertain it may seem. According to the National Institute of Standards and Technology (NIST) Cybersecurity Framework, organisations should establish clear reporting mechanisms that include:

  • Dedicated reporting channels: Secure and confidential hotlines, email addresses, or internal platforms for reporting threats.
  • Non-retaliation policies: Formal assurance that employees who report coercion will not face reprisal, even if the coercion involves personal embarrassment.
  • Incident response integration: Coercion reports should be routed to both the security team and HR to enable a coordinated response.
  • Law enforcement escalation: In cases involving threats of violence, blackmail, or extortion, the organisation should have procedures for involving law enforcement promptly.

Delays in reporting can give attackers time to escalate their demands, extract valuable data, or establish deeper footholds within the organisation's systems. Early reporting is the single most effective countermeasure against coercion-based attacks.

Which coercion tactics are most common in cybersecurity?

Based on industry reports on insider threats and academic research on psychological manipulation in security, the most prevalent coercion tactics include:

TacticDescriptionTypical Target
**Sextortion**Threatening to release intimate or embarrassing images or videos unless the victim complies with demands.Individual employees at any level
**Doxing threats**Threatening to publicly release personal information such as home addresses, phone numbers, or financial details.Executives, public-facing employees
**Financial blackmail**Leveraging knowledge of financial difficulties, debts, or illicit activities to pressure compliance.Employees with financial vulnerabilities
**Impersonation of authority**Posing as law enforcement, regulators, or senior executives and threatening legal or career consequences for non-compliance.Junior or mid-level employees
**Threats to family or associates**Threatening harm or exposure of information related to the victim's family members or close colleagues.Any employee with known personal relationships

Mitigating these tactics requires a multi-layered approach: robust security awareness training that specifically covers coercion scenarios, strong organisational support systems including employee assistance programmes, and clear, confidential reporting mechanisms. As highlighted by CISA, empowering employees to resist and report coercion without fear of reprisal is the cornerstone of any effective defence strategy against this threat.