{"id":19485,"date":"2022-07-10T08:57:34","date_gmt":"2022-07-10T08:57:34","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=19485"},"modified":"2023-07-19T11:38:58","modified_gmt":"2023-07-19T11:38:58","slug":"what-is-quid-pro-quo","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/","title":{"rendered":"What is a Quid Pro Quo Attack?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">There are a plethora of different cyberattack methods used to prey on companies\u2019 information. Some require months of research, while others can be done in a single day. Certain attack types are more successful than others, too. These methods range from spoof emails to baiting employees into unwise decisions.\u00a0<\/span><span style=\"font-weight: 400;\">This article delves into the <strong>social engineering<\/strong> method known as the &#8220;<strong>Quid Pro Quo<\/strong>&#8221; <strong>social engineering attack<\/strong>.<\/span><\/p>\n<p><b>What is a quid pro quo <\/b><span style=\"font-weight: 400;\">attack? Read on to find out and learn what it can do and how to prevent it. We\u2019ll also go over some <\/span><b>quid pro quo examples<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Quid Pro Quo Attack Definition<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Technically speaking, a quid pro quo attack is a type of baiting method. However, instead of trying to get someone to fall for something out of their own curiosity or fear, cyber actors offer them something in return. The Latin phrase means \u201ca favor for a favor,\u201d and that\u2019s essentially what it boils down to. Attackers offer you something in return for information.<\/span><\/p>\n<h2><b>What Can Happen After a Quid Pro Quo Attack?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The worst part about a <strong>quid pro quo social engineering<\/strong> attack? Most times, it\u2019s not the final component of an attack; It\u2019s often a gateway attackers use to open the company or target up to other predatory measures. Here are just a few examples of consequences deriving from a quid pro quo attack.<\/span><\/p>\n<h3><b>Phishing Emails<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A quid pro quo attack doesn\u2019t always feel like you\u2019re giving something away. For instance, your email address, which may seem inconsequential to you at the moment, might be all they\u2019re looking for from the beginning. As soon as it\u2019s in their grasp, prepare for an onslaught of malicious emails, scams, and spam messages.<\/span><\/p>\n<h3><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-attacks-a-complete-guide\/\" target=\"_blank\" rel=\"noopener\"><b>Ransomware Attacks<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">The threat doesn\u2019t necessarily come from what you traded away. Sometimes, what you receive in return can be the real poison. In some <strong>quid pro quo attack situations<\/strong>, attackers convince the victim they\u2019re making a reasonable trade or transaction for a genuine product or service.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, if they\u2019re given a link to visit or a file to download, it\u2019s already too late. Attackers can hand you faulty scripts and malicious files that siphon your information, infect your hardware, and even contaminate the entire company\u2019s systems.<\/span><\/p>\n<h3><a href=\"https:\/\/easydmarc.com\/blog\/what-is-business-email-compromise-bec\/\" target=\"_blank\" rel=\"noopener\"><b>Business Email Compromise (BEC) Attacks<\/b><\/a><\/h3>\n<p><span style=\"font-weight: 400;\">If your end of the deal had anything to do with company email accounts, you can bet they\u2019re being used for malicious purposes. Depending on what emails the attacker gains access to, they can spam emails to all available email addresses of the company.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Or even worse, if they were able to get a glimpse of a higher-up\u2019s email, they may attempt an <a href=\"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/\" target=\"_blank\" rel=\"noopener\">impersonation attack<\/a> and target other employees under its guise. This practice is extremely common as attackers can manipulate employees\u2019 trust in company authorities.<\/span><\/p>\n<h2><b>Quid Pro Quo Social Engineering Attack vs. Baiting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-is-baiting-in-cybersecurity-techniques-examples-protection\/\" target=\"_blank\" rel=\"noopener\">Baiting<\/a> generally relies on the fear or curiosity of its victims. It\u2019s a trap that has little to no interaction on the attacker\u2019s end once it\u2019s set. All they do is wait for someone to trigger it. That\u2019s its primary difference from a quid pro quo attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A <strong>quid pro quo email<\/strong> attack, on the other hand, requires a lot of direct interaction from the attacker. Such an attack offers the victim something in return, attempting to frame it as an even trade, or even one that\u2019s more beneficial to the victim.<\/span><\/p>\n<h2><b>Quid Pro Quo Attack Examples<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Think you\u2019d be able to easily identify and avoid a quid pro quo attack? It\u2019s not always that simple. Rather than exploiting a target\u2019s greed, sometimes attackers don&#8217;t offer something of extrinsic value. Rather, they hold victims hostage with information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If an attacker has information on the target or the target\u2019s company, they may threaten to release it publicly or to the wrong person. <strong>An\u00a0<\/strong><\/span><strong>example of quid pro quo harassment is<\/strong> when a<span style=\"font-weight: 400;\">ttackers make demands using threats like:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cI have precious company information. Give me your user account information or I\u2019ll make it publicly available.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even if this claim is false, the individual wouldn\u2019t know it, so the hackers usually try to sound confident and avoid giving out more details than needed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While the one above is one of the more extreme <\/span><b>quid pro quo examples<\/b><span style=\"font-weight: 400;\">, it\u2019s also a very real and possible scenario. Many companies lose even more information when trying to appease these predatory attackers.<\/span><\/p>\n<h2><b>How to Prevent Quid Pro Quo Social Engineering Attacks?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Quid pro quo attacks can get messy fast. But they\u2019re not unavoidable. There are certain precautions and prevention methods that reduce the chances of a quid pro quo attack from ever finding you. Keep the following guidelines in mind to steer clear of these sorts of attacks in the future.<\/span><\/p>\n<h3><b>Have You Initiated the Information Exchange?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the most important rules of thumb is never to exchange information unless you initiate the interaction. Whether over a call or via a message, don\u2019t give up personal or sensitive information of any kind if you didn\u2019t contact the support yourself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s always safer to assume that customer support or similar services won\u2019t seek you out. If you reach out to official support representatives, that\u2019s one thing. If they find you on their own accord and start demanding information, there\u2019s a problem.<\/span><\/p>\n<h3><b>Use Official Company Phone Numbers<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Trusted phone numbers are readily available on official company websites. Never use unofficial or untrusted numbers of any kind. If you do, you\u2019ll immediately put your number at risk of malicious callers and messengers looking to scam or exploit you. Be extremely cautious about where your number goes and who gets hold of it. The more eyes on your number, the higher the risk of a <strong>quid pro quo attack<\/strong>.<\/span><\/p>\n<h3><b>Keep your Passwords Clean<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Good password management is one of the most underestimated ways to protect yourself against cyberattacks. Keep your passwords clean and hard to guess, and never reuse them. Of course, make sure you can remember them all.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the biggest ways attackers hold leverage over their victims in a quid pro quo attack is by holding information hostage\u2014information they attain by hacking accounts with weak passwords.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><strong>Quid pro quo emails<\/strong> are similar to other email attacks and cyberattack methods. However, something tempting on offer can hook in far more victims than a simple sense of urgency. In many scenarios, the temptation is a stronger driver compared to knee-jerk fear and often more reliable, too.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember to be careful when dealing with attractive offers on the internet. Do your research and take precautions, but if something sounds too good to be true, it probably is.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a plethora of different cyberattack methods &#8230;<\/p>\n","protected":false},"author":5,"featured_media":19496,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-19485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is a Quid Pro Quo Attack? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Social engineering attacks are dangerous, especially for people that can be easily manipulated. Learn about quid pro quo to stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Quid Pro Quo Attack?\" \/>\n<meta property=\"og:description\" content=\"Social engineering attacks are dangerous, especially for people that can be easily manipulated. Learn about quid pro quo to stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-10T08:57:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T11:38:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"What is a Quid Pro Quo Attack?\",\"datePublished\":\"2022-07-10T08:57:34+00:00\",\"dateModified\":\"2023-07-19T11:38:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/\"},\"wordCount\":1143,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-6.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/\",\"name\":\"What is a Quid Pro Quo Attack? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-6.jpg\",\"datePublished\":\"2022-07-10T08:57:34+00:00\",\"dateModified\":\"2023-07-19T11:38:58+00:00\",\"description\":\"Social engineering attacks are dangerous, especially for people that can be easily manipulated. Learn about quid pro quo to stay safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-6.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/05.01-6.jpg\",\"width\":1440,\"height\":910,\"caption\":\"05.01 6\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-quid-pro-quo\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"What is a Quid Pro Quo Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is a Quid Pro Quo Attack? | EasyDMARC","description":"Social engineering attacks are dangerous, especially for people that can be easily manipulated. Learn about quid pro quo to stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/","og_locale":"en_US","og_type":"article","og_title":"What is a Quid Pro Quo Attack?","og_description":"Social engineering attacks are dangerous, especially for people that can be easily manipulated. Learn about quid pro quo to stay safe.","og_url":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-07-10T08:57:34+00:00","article_modified_time":"2023-07-19T11:38:58+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"What is a Quid Pro Quo Attack?","datePublished":"2022-07-10T08:57:34+00:00","dateModified":"2023-07-19T11:38:58+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/"},"wordCount":1143,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/","url":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/","name":"What is a Quid Pro Quo Attack? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg","datePublished":"2022-07-10T08:57:34+00:00","dateModified":"2023-07-19T11:38:58+00:00","description":"Social engineering attacks are dangerous, especially for people that can be easily manipulated. Learn about quid pro quo to stay safe.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg","width":1440,"height":910,"caption":"05.01 6"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"What is a Quid Pro Quo Attack?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/05.01-6.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=19485"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19485\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/19496"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=19485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=19485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=19485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}