Zum Hauptinhalt springen
Elementary Threat · BSI IT-Grundschutz

G 0.35 — Coercion, Extortion or Corruption

Updated on 4 min Reviewed by: Cenedril Editorial
A.5.15A.5.19A.5.20A.5.21A.5.23A.6.1A.8.1A.8.17A.8.20A.8.21A.8.22A.8.30 BSI IT-GrundschutzISO 27001ISO 27002

An external attacker identifies a system administrator with far-reaching access rights and contacts him through an anonymous channel. The offer: 50,000 euros for setting up a hidden VPN access to the internal network. The administrator declines — but the fact that the attack was possible shows: technical security measures protect only as long as the people behind them act trustworthily.

Coercion, extortion or corruption (G 0.35) target the human component of information security. Technical controls can be circumvented when an insider is pressured or bought.

What’s behind it?

Coercion, extortion and corruption turn people into tools for security violations. Where technical attacks exploit weaknesses in software or configurations, these threats target the motivation and behaviour of the people involved.

Attack vectors

  • Coercion — Threat of violence or other disadvantages to force a person to disregard security policies. Can be directed against the person themselves or against family members.
  • Extortion — Exploitation of a compromising situation (incriminating information, financial difficulties) as leverage for security-violating actions.
  • Corruption — Targeted bribery of employees or service providers with money, gifts or other advantages. Goal: access to confidential information, manipulation of systems or installation of backdoors.

Impact

The damage is potentially unlimited, because a corrupted person acts within their permissions and can bypass technical security measures. All three protection goals are affected: confidential information can be leaked, data manipulated and systems sabotaged. Particular danger exists for people in positions of trust — administrators, security officers, executives — whose actions are less questioned.

Practical examples

Bribery of a data centre technician. A competitor offers a technician working in a cloud provider’s data centre money for copying customer data onto a USB stick. The technician has physical access to the servers, bypassing all logical access controls. Only video surveillance and a four-eyes principle for access to customer systems could have prevented the incident.

Extortion of an administrator. An attacker obtains knowledge of private information about an administrator and threatens to publish it. In return, the administrator is supposed to create a specific user account with elevated rights. The administrator reports the incident to his manager, who involves the responsible authorities.

Corruption in the supply chain. An employee of an IT service provider responsible for maintaining a firewall is contacted by an attacker. In exchange for payment, he sets up a subtle firewall exception that allows certain external IP addresses access to the internal network. The change goes unnoticed in the regular change log because it is formally documented as a maintenance action.

Relevant controls

The following ISO 27001 controls mitigate this threat. (You’ll find the complete list of 12 mapped controls below in the section ‘ISO 27001 Controls Covering This Threat’.)

Prevention:

Detection:

Response:

BSI IT-Grundschutz

G 0.35 is linked by the BSI IT-Grundschutz catalogue to the following modules:

  • ORP.2 (Personnel) — Requirements for background checks and trustworthiness.
  • OPS.2.3 (Use of outsourcing) — Security requirements for external service providers.
  • OPS.3.2 (Providing outsourcing) — Requirements for service providers delivering outsourcing services.
  • NET.1.2 (Network management) — Protection of network administration against manipulation by insiders.

Sources

ISO 27001 Controls Covering This Threat

A.5.15 Access control A.5.19 Information security in supplier relationships A.5.20 Addressing information security within supplier agreements A.5.21 Managing information security in the ICT supply chain A.5.23 Information security for use of cloud services A.6.1 Screening A.8.1 User endpoint devices A.8.17 Clock synchronisation A.8.20 Networks security A.8.21 Security of network services A.8.22 Segregation of networks A.8.30 Outsourced development

Frequently asked questions

How does extortion differ from ransomware?

Ransomware is a technical form of extortion (G 0.39) in which malware encrypts data and demands a ransom. Extortion under G 0.35 targets people: an attacker exerts pressure on a person to circumvent security measures or disclose confidential information. Both threats can occur in combination.

How can you protect against corruption in IT?

Segregation of duties is the most effective measure: no single person should be able to fully control a critical process. Regular rotation of responsibilities, unannounced audits and a four-eyes principle for sensitive actions make corrupt behaviour considerably harder.

Are executives especially at risk?

Yes, for two reasons. First, they typically have access to especially confidential information and far-reaching decision-making authority. Second, their exposed position makes them easier to identify and therefore easier to target. It becomes especially dangerous when the same person holds both decision-making and oversight authority.