Attackers primarily exploit psychological triggers such as Urgency, creating a time-critical situation that bypasses rational thought; Authority, impersonating a superior to enforce compliance; and Fear/Curiosity, using threats of negative consequences or lures of exclusive information. These are designed to make the victim react instantly, compromising security protocols.