{"id":10150,"date":"2021-10-13T13:59:56","date_gmt":"2021-10-13T10:59:56","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10150"},"modified":"2022-05-05T14:25:15","modified_gmt":"2022-05-05T11:25:15","slug":"most-common-initial-attack-vectors","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/most-common-initial-attack-vectors\/10150\/","title":{"rendered":"S\u0131k kullan\u0131lan ilk sald\u0131r\u0131 vekt\u00f6rleri"},"content":{"rendered":"<p>\u015eirketler, <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/incident-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">olay m\u00fcdahalesi<\/a> konusunda acil yard\u0131m, olay incelemesi (veya incelemenin y\u00fcr\u00fct\u00fclmesine yard\u0131mc\u0131 olunmas\u0131) veya siber su\u00e7lular\u0131n kulland\u0131\u011f\u0131 ara\u00e7lar\u0131n analizi i\u00e7in s\u0131k s\u0131k uzmanlar\u0131m\u0131z\u0131 ar\u0131yor. 2020 boyunca, en yayg\u0131n ilk sald\u0131r\u0131 vekt\u00f6rleri dahil olmak \u00fczere en olas\u0131 sald\u0131r\u0131 senaryolar\u0131n\u0131 tahmin etmemizi ve en iyi savunma taktiklerini se\u00e7memize yard\u0131mc\u0131 olan modern tehdit ortam\u0131na ili\u015fkin bir g\u00f6r\u00fc\u015f edinmemizi sa\u011flayan <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/13085018\/Incident-Response-Analyst-Report-eng-2021.pdf\">\u00e7ok say\u0131da veri toplad\u0131k<\/a>.<\/p>\n<p>Bir siber olay\u0131 ara\u015ft\u0131r\u0131rken, her zaman ilk sald\u0131r\u0131 vekt\u00f6r\u00fcne \u00f6zellikle dikkat ederiz. Basit\u00e7e s\u00f6ylemek gerekirse, sald\u0131rganlar giri\u015f i\u00e7in zay\u0131f bir noktay\u0131 kullan\u0131rlar ve bunun tekrarlanmas\u0131n\u0131 \u00f6nlemek i\u00e7in savunma sistemlerinin zay\u0131f noktalar\u0131n\u0131 belirlemek olduk\u00e7a \u00f6nemlidir.<\/p>\n<p>Ne yaz\u0131k ki, bunu yapmak her zaman m\u00fcmk\u00fcn olmaz. Baz\u0131 durumlarda olay ile olay\u0131n tespiti aras\u0131nda \u00e7ok fazla zaman ge\u00e7mi\u015fken baz\u0131lar\u0131nda ise kurban g\u00fcnl\u00fck tutmam\u0131\u015f veya olay\u0131n izlerini (yanl\u0131\u015fl\u0131kla veya kas\u0131tl\u0131 olarak) yok etmi\u015f olur.<\/p>\n<p>Siber su\u00e7lular giderek yayg\u0131nla\u015fan bir y\u00f6ntem olan <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/supply-chain\/\" target=\"_blank\" rel=\"noopener\">tedarik zinciri <\/a>yoluyla sald\u0131rd\u0131\u011f\u0131nda, olaylar\u0131 karma\u015f\u0131k hale getiren \u015fey, ilk vekt\u00f6r\u00fcn son kurban\u0131n de\u011fil, bir \u00fc\u00e7\u00fcnc\u00fc taraf program geli\u015ftiricisinin veya hizmet sa\u011flay\u0131c\u0131s\u0131n\u0131n alan\u0131na girmesidir. Ancak yine de uzmanlar\u0131m\u0131z, ya\u015fanan olaylar\u0131n yar\u0131s\u0131ndan fazlas\u0131nda ilk sald\u0131r\u0131 vekt\u00f6r\u00fcn\u00fc tam olarak belirlemeyi ba\u015fard\u0131lar.<\/p>\n<h2>Birinci ve ikinci s\u0131rada kaba kuvvet ve herkesin eri\u015febilece\u011fi uygulamalardan yararlanma bulunuyor<\/h2>\n<p>Kurumsal \u00e7evrenin d\u0131\u015f\u0131ndan eri\u015filebilen uygulamalara ve sistemlere kaba kuvvet sald\u0131r\u0131lar\u0131 d\u00fczenlenmesi ile g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma, sald\u0131rganlar\u0131n kulland\u0131\u011f\u0131 ilk iki giri\u015f noktas\u0131n\u0131 olu\u015fturuyor. Olaylar\u0131n %31,58\u2019inde ilk giri\u015f vekt\u00f6r\u00fc olarak bu noktalar kullan\u0131ld\u0131.<\/p>\n<p>\u00d6nceki y\u0131llarda da g\u00f6zlemledi\u011fimiz gibi ba\u015fka hi\u00e7bir y\u00f6ntem, bir sald\u0131r\u0131 ba\u015flatmak i\u00e7in g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma kadar etkili de\u011fil. Yararlan\u0131lan g\u00fcvenlik a\u00e7\u0131klar\u0131na ili\u015fkin yap\u0131lan daha ayr\u0131nt\u0131l\u0131 bir analiz, bu durumun \u00f6ncelikle, sald\u0131r\u0131lar s\u0131ras\u0131nda her bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in yama bulunmas\u0131na ra\u011fmen \u015firketlerin g\u00fcncellemeleri hemen y\u00fckleyememesinden kaynakland\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Yaln\u0131zca bu yamalar\u0131n y\u00fcklenmesi bile kurbanlar\u0131 koruyabilirdi.<\/p>\n<p>\u015eirketlerin toplu \u015fekilde uzaktan \u00e7al\u0131\u015fmaya ge\u00e7i\u015fi ve uzaktan eri\u015fim hizmetlerinin kullan\u0131m\u0131, kaba kuvvet sald\u0131r\u0131lar\u0131n\u0131n pop\u00fclaritesinin artmas\u0131na neden oldu. Ge\u00e7i\u015f s\u0131ras\u0131nda bir\u00e7ok i\u015fletme g\u00fcvenlik konular\u0131n\u0131 yeterince ele almad\u0131 ve bunun sonucunda, uzaktan ba\u011flant\u0131lara y\u00f6nelik sald\u0131r\u0131lar\u0131n say\u0131s\u0131nda neredeyse bir gecede art\u0131\u015f ya\u015fand\u0131. \u00d6rne\u011fin RDP tabanl\u0131 kaba kuvvet sald\u0131r\u0131lar\u0131nda, Mart\u2014Aral\u0131k 2020 d\u00f6neminde <a href=\"https:\/\/securelist.com\/the-story-of-the-year-remote-work\/99720\/\" target=\"_blank\" rel=\"noopener\">%242 art\u0131\u015f<\/a> g\u00f6r\u00fcld\u00fc.<\/p>\n<h2>\u00dc\u00e7\u00fcnc\u00fc s\u0131rada k\u00f6t\u00fc ama\u00e7l\u0131 e-posta yer al\u0131yor<\/h2>\n<p>Olaylar\u0131n %23,68\u2019inde ilk sald\u0131r\u0131 vekt\u00f6r\u00fc, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m eklenmi\u015f veya kimlik av\u0131 \u015feklinde d\u00fczenlenmi\u015f bir k\u00f6t\u00fc ama\u00e7l\u0131 e-postayd\u0131. Hedefli sald\u0131r\u0131 operat\u00f6rleri ve toplu e-posta g\u00f6nderenler, uzun bir s\u00fcredir her iki k\u00f6t\u00fc ama\u00e7l\u0131 e-posta \u015feklini de kullan\u0131yorlar.<\/p>\n<h2>D\u00f6rd\u00fcnc\u00fc s\u0131rada kurban\u0131n internette gezinirken g\u00fcvenli\u011finin ihlal edilmesi yer al\u0131yor<\/h2>\n<p>Bazen sald\u0131rganlar, kurban\u0131n periyodik olarak ziyaret etti\u011fi veya tesad\u00fcfen girdi\u011fi bir internet sitesini kullanarak sisteme eri\u015fmeye \u00e7al\u0131\u015f\u0131rlar. <a href=\"https:\/\/securelist.com\/holy-water-ongoing-targeted-water-holing-attack-in-asia\/96311\/\" target=\"_blank\" rel=\"noopener\">Baz\u0131 karma\u015f\u0131k APT sald\u0131r\u0131lar\u0131nda<\/a> kar\u015f\u0131m\u0131za \u00e7\u0131kan bu tarz bir takti\u011fi kullanmak i\u00e7in siber su\u00e7lular siteye, kurban\u0131n bilgisayar\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 kod \u00e7al\u0131\u015ft\u0131rmak amac\u0131yla bir taray\u0131c\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanan komut dosyalar\u0131 yerle\u015ftirir veya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 indirip y\u00fcklemesi i\u00e7in kurban\u0131 kand\u0131r\u0131r. 2020\u2019de vakalar\u0131n %7,89\u2019unda ilk sald\u0131r\u0131 vekt\u00f6r\u00fc olarak bu y\u00f6ntem kullan\u0131ld\u0131.<\/p>\n<h2>Be\u015finci ve alt\u0131nc\u0131 s\u0131rada ise ta\u015f\u0131nabilir s\u00fcr\u00fcc\u00fcler ve \u015firket i\u00e7indeki ki\u015filer bulunuyor<\/h2>\n<p>\u015eirket sistemlerine s\u0131zmak i\u00e7in USB s\u00fcr\u00fcc\u00fclerinin kullan\u0131m\u0131 art\u0131k nadiren tercih edilen bir y\u00f6ntem haline geldi. Flash s\u00fcr\u00fcc\u00fcye bula\u015fan vir\u00fcslerin b\u00fcy\u00fck \u00f6l\u00e7\u00fcde ge\u00e7mi\u015fte kalmas\u0131n\u0131n yan\u0131nda, birisine zararl\u0131 bir USB bellek verme takti\u011fi de pek g\u00fcvenilir de\u011fil. Bununla birlikte, a\u011fa ilk giri\u015f y\u00f6ntemlerinin %2,63\u2019\u00fcn\u00fc bu y\u00f6ntem olu\u015fturuyordu.<\/p>\n<p>\u015eirket i\u00e7indeki ki\u015filer de ayn\u0131 oranda (%2,63) olaya neden oldu. Bunlar, sebebi ne olursa olsun, kendi \u015firketlerine zarar vermek isteyen \u00e7al\u0131\u015fanlar.<\/p>\n<h2>Bir siber olay ya\u015fama olas\u0131l\u0131\u011f\u0131 ve neden oldu\u011fu sonu\u00e7lar nas\u0131l en aza indirilir?<\/h2>\n<p>Uzmanlar\u0131m\u0131z\u0131n analiz etti\u011fi olaylar\u0131n \u00e7o\u011fu \u00f6nlenebilir nitelikteydi. Elde etti\u011fi bulgulara dayanarak uzmanlar\u0131m\u0131z \u015funlar\u0131n yap\u0131lmas\u0131n\u0131 \u00f6neriyorlar:<\/p>\n<ul>\n<li>Kat\u0131 bir parola politikas\u0131n\u0131n belirlenmesi ve \u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama kullan\u0131m\u0131n\u0131n zorunlu hale getirilmesi,<\/li>\n<li>Herkesin eri\u015fimine a\u00e7\u0131k olan uzaktan y\u00f6netim hizmetlerinin kullan\u0131m\u0131n\u0131n yasaklanmas\u0131,<\/li>\n<li>Yaz\u0131l\u0131m g\u00fcncellemelerinin m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede y\u00fcklenmesi,<\/li>\n<li>Kimlik av\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6nleme ara\u00e7lar\u0131yla [KSMail placeholder] e-posta sunucular\u0131n\u0131n korunmas\u0131[\/KSMail placeholder],<\/li>\n<li>Modern siber tehditler hakk\u0131nda d\u00fczenli olarak [KASAP placeholder]\u00e7al\u0131\u015fan fark\u0131ndal\u0131\u011f\u0131 olu\u015fturulmas\u0131[\/KASAP placeholder].<\/li>\n<\/ul>\n<p>Ayr\u0131ca, yaln\u0131zca incelemeleri kolayla\u015ft\u0131rmak i\u00e7in de\u011fil, ayn\u0131 zamanda siber olaylardan kaynaklanan hasar\u0131 da en aza indirmek i\u00e7in t\u00fcm denetim ve kay\u0131t sistemlerini yap\u0131land\u0131rmay\u0131 ve verilerinizi d\u00fczenli olarak yedeklemeyi unutmay\u0131n.<\/p>\n<p>Elbette yukar\u0131da yer alan veriler, uzmanlar\u0131m\u0131z\u0131n burada sundu\u011fu faydal\u0131 bilgilerin sadece k\u00fc\u00e7\u00fck bir b\u00f6l\u00fcm\u00fcn\u00fc olu\u015fturuyor. Olay M\u00fcdahale Analiz Raporu 2021\u2019in tam metnine <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/13085018\/Incident-Response-Analyst-Report-eng-2021.pdf\">buradan<\/a> ula\u015fabilirsiniz.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sald\u0131rganlar\u0131n hedeflerindeki \u015firketlerin altyap\u0131s\u0131na girme konusunda en \u00e7ok kulland\u0131\u011f\u0131 aptler.<\/p>\n","protected":false},"author":2706,"featured_media":10151,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2485,2486,2487],"class_list":{"0":"post-10150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-gert","10":"tag-olay-mudahalesi","11":"tag-saldiri-vektorleri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/most-common-initial-attack-vectors\/10150\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/most-common-initial-attack-vectors\/23481\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/most-common-initial-attack-vectors\/18958\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/most-common-initial-attack-vectors\/25557\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/most-common-initial-attack-vectors\/23628\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/most-common-initial-attack-vectors\/23052\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/most-common-initial-attack-vectors\/26209\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/most-common-initial-attack-vectors\/25755\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/most-common-initial-attack-vectors\/31677\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/most-common-initial-attack-vectors\/42379\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/most-common-initial-attack-vectors\/17864\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/most-common-initial-attack-vectors\/18291\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/most-common-initial-attack-vectors\/15394\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/most-common-initial-attack-vectors\/27548\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/most-common-initial-attack-vectors\/31775\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/most-common-initial-attack-vectors\/27704\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/most-common-initial-attack-vectors\/24472\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/most-common-initial-attack-vectors\/29833\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/most-common-initial-attack-vectors\/29632\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/olay-mudahalesi\/","name":"Olay M\u00fcdahalesi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10150"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10150\/revisions"}],"predecessor-version":[{"id":10153,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10150\/revisions\/10153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10151"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}