{"id":1160,"date":"2015-08-03T02:44:52","date_gmt":"2015-08-02T18:44:52","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1160"},"modified":"2015-08-03T02:44:52","modified_gmt":"2015-08-02T18:44:52","slug":"definition-quid-pro-quo-attack","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-quid-pro-quo-attack\/","title":{"rendered":"Definition of the Day: Quid Pro Quo Attack"},"content":{"rendered":"
Quid pro quo is Latin for, \u2018something for something.\u2019 In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. <\/p>\n
This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of a thing – like a free song download – a quid pro quo attack promises a service or action-based benefit. <\/p>\n
The most common form of a quid pro quo attack occurs when a hacker impersonates a IT specialist for a large company. That hacker spam calls a number of direct employee numbers of a specific company office and, when said hacker gets an employee on the phone, then offers the employee target some kind of upgrade to their work machine. They might tell the employee to disable their AV software temporarily to install a bogus \u2018fix\u2019 or software update. <\/p>\n
The employee, thinking he\/she is following the commands of IT then allows the hacker access to his\/her machine, upon which malware is then installed. This type of attack is rarely found in small to medium-sized businesses due to the fact that smaller numbers of employees usually means everyone knows the IT people by name. <\/p>\n","protected":false},"excerpt":{"rendered":"
Quid pro quo is Latin for, \u2018something for something.\u2019 In the realm of cyber crime, a quid pro quo attack occurs when the hacker offers a service or benefit in exchange for information or access. This technique is a derivation of baiting and differs in that instead of baiting a target with the promise of […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[64,263,236,248,358,48,359,360,164],"class_list":["post-1160","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-crime","tag-definition-of-the-day","tag-hacking","tag-identity-theft","tag-keyword-logging","tag-malware","tag-quid-pro-quo","tag-quid-pro-quo-attack","tag-social-engineering"],"yoast_head":"\n