← BACK TO SCENARIOS
Scenario #17

THE SOCIAL ENGINEERING ATTACK

Family Hostage Protocol

HOSTAGE SITUATION ALERT
9:17 PM

Your phone rings at 9:17 PM. An unfamiliar voice speaks: "We have your daughter. Check your email for proof of life and instructions. You have 3 hours to transfer 15 BTC or we escalate this situation."


Your heart pounds as you open the email to find a photo of your daughter, clearly distressed, holding today's newspaper.

THREAT STATUS: FAMILY MEMBER UNDER DURESS

The email contains detailed instructions: Transfer exactly 15 BTC to a specified wallet address within 3 hours. No police involvement or the consequences will be severe. They know you have the funds, they've researched you thoroughly after discovering your crypto discussions on social media.


You're being watched, they claim. Any attempt to contact authorities will be detected. They've provided a small test address for you to transfer 0.01 BTC immediately to confirm you've received their demands.

Your Situation

You frantically assess your options while trying to maintain composure:

Immediate Assessment

Duress Challenge: Social Pressure Security

  1. What duress protocols have you established for coercion scenarios?
  2. Do you have decoy wallets or honeypot systems to deploy?
  3. How can you verify the authenticity of the threat?
  4. What distress signals can you use to alert authorities without detection?
  5. How are your crypto holdings structured to resist social engineering attacks?

Complications

As you consider your response:

Your Mission

Navigate this social engineering attack targeting your loved ones while protecting your cryptocurrency holdings. You must balance family safety with financial security while under extreme emotional duress.


Will your security systems function when the threat is to people rather than technology?

Your phone buzzes with a new message: "We see no transaction yet. Testing our patience is unwise. 0.01 BTC to the test address NOW to show good faith or this gets worse."

TIME REMAINING: 2:41:17 Until Deadline
What duress countermeasures did you implement, and how will you deploy them in this life-or-death scenario?