The authors of this report examine cases from Russia, China, Iran, and North Korea to understand whether and how states use cyber operations to coerce other states or actors, and highlight the challenges of identifying cyber coercion. They also propose ways to develop a deeper understanding of cyber coercion and how to counter it.