{"id":1160,"date":"2015-08-03T02:44:52","date_gmt":"2015-08-02T18:44:52","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1160"},"modified":"2015-08-03T02:44:52","modified_gmt":"2015-08-02T18:44:52","slug":"definition-quid-pro-quo-attack","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/","title":{"rendered":"Definition of the Day: Quid Pro Quo Attack"},"content":{"rendered":"

Quid pro quo is Latin for, \u2018something for something.\u2019 In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. <\/p>\n

This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of a thing – like a free song download – a quid pro quo attack promises a service or action-based benefit. <\/p>\n

The most common form of a quid pro quo attack occurs when a hacker impersonates a IT specialist for a large company. That hacker spam calls a number of direct employee numbers of a specific company office and, when said hacker gets an employee on the phone, then offers the employee target some kind of upgrade to their work machine. They might tell the employee to disable their AV software temporarily to install a bogus \u2018fix\u2019 or software update. <\/p>\n

The employee, thinking he\/she is following the commands of IT then allows the hacker access to his\/her machine, upon which malware is then installed. This type of attack is rarely found in small to medium-sized businesses due to the fact that smaller numbers of employees usually means everyone knows the IT people by name. <\/p>\n","protected":false},"excerpt":{"rendered":"

Quid pro quo is Latin for, \u2018something for something.\u2019 In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[64,263,236,248,358,48,359,360,164],"class_list":["post-1160","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-crime","tag-definition-of-the-day","tag-hacking","tag-identity-theft","tag-keyword-logging","tag-malware","tag-quid-pro-quo","tag-quid-pro-quo-attack","tag-social-engineering"],"yoast_head":"\nDefinition of the Day: Quid Pro Quo Attack - BankVault<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of the Day: Quid Pro Quo Attack - BankVault\" \/>\n<meta property=\"og:description\" content=\"Quid pro quo is Latin for, \u2018something for something.\u2019 In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-02T18:44:52+00:00\" \/>\n<meta name=\"author\" content=\"A. Yost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Definition of the Day: Quid Pro Quo Attack - BankVault","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/","og_locale":"en_US","og_type":"article","og_title":"Definition of the Day: Quid Pro Quo Attack - BankVault","og_description":"Quid pro quo is Latin for, \u2018something for something.\u2019 In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of […]","og_url":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-08-02T18:44:52+00:00","author":"A. Yost","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"A. Yost","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/"},"author":{"name":"A. Yost","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a"},"headline":"Definition of the Day: Quid Pro Quo Attack","datePublished":"2015-08-02T18:44:52+00:00","dateModified":"2015-08-02T18:44:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/"},"wordCount":218,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"keywords":["cyber crime","definition of the day","hacking","identity theft","keyword logging","malware","quid pro quo","quid pro quo attack","social engineering"],"articleSection":["Definition of the Day"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/","url":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/","name":"Definition of the Day: Quid Pro Quo Attack - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"datePublished":"2015-08-02T18:44:52+00:00","dateModified":"2015-08-02T18:44:52+00:00","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Definition of the Day: Quid Pro Quo Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a","name":"A. Yost","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","caption":"A. Yost"},"url":"https:\/\/www.bankvault.com\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/1160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=1160"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/1160\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=1160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=1160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=1160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}