{"id":10399,"date":"2021-12-28T13:09:21","date_gmt":"2021-12-28T10:09:21","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10399"},"modified":"2021-12-28T13:09:21","modified_gmt":"2021-12-28T10:09:21","slug":"common-spear-phishing-tricks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/common-spear-phishing-tricks\/10399\/","title":{"rendered":"Yayg\u0131n olarak kullan\u0131lan hedef odakl\u0131 kimlik av\u0131 hileleri"},"content":{"rendered":"<p>B\u00fcy\u00fck bir \u015firketteki neredeyse her \u00e7al\u0131\u015fan, kurumsal kimlik bilgilerini \u00e7almay\u0131 ama\u00e7layan e-postalarla kar\u015f\u0131la\u015f\u0131r. Genellikle bu taktikler, en az\u0131ndan baz\u0131lar\u0131n\u0131n g\u00f6nderilen e-postalardaki tuza\u011fa d\u00fc\u015fece\u011fi umuduyla rastgele g\u00f6nderildi\u011fi bir sald\u0131r\u0131 olan toplu kimlik av\u0131 bi\u00e7imindedir. Ancak, kimlik av\u0131 e-postalar\u0131n\u0131n ak\u0131\u015f\u0131nda, i\u00e7eri\u011fi belirli \u015firketlerin \u00e7al\u0131\u015fanlar\u0131 i\u00e7in \u00f6zelle\u015ftirilmi\u015f bir veya iki tehlikeli, hedefli mesaj daha olabilir. Bu, hedef odakl\u0131 kimlik av\u0131d\u0131r.<\/p>\n<p>Hedef odakl\u0131 kimlik av\u0131 mesajlar\u0131, siber su\u00e7lular\u0131n a\u00e7\u0131k bir \u015fekilde \u015firketinizle ilgilendi\u011fini g\u00f6steren bir i\u015farettir ve planlanan tek sald\u0131r\u0131 olmayabilir. Bu durum, bilgi g\u00fcvenli\u011fi g\u00f6revlilerinin herhangi bir \u00e7al\u0131\u015fan\u0131n hedef odakl\u0131 kimlik av\u0131 e-postas\u0131 al\u0131p almad\u0131\u011f\u0131n\u0131 bilmesinin \u00f6nemli bir nedenidir \u2014 kar\u015f\u0131 \u00f6nlemler haz\u0131rlamalar\u0131 ve personeli zaman\u0131nda uyarmalar\u0131 gerekir.<\/p>\n<p>Bu nedenle BT\u2019ye, hedef odakl\u0131 kimlik av\u0131 ararken filtrelenmi\u015f e-postalar\u0131 d\u00fczenli aral\u0131klarla kontrol etmesini ve di\u011fer \u00e7al\u0131\u015fanlara hedefli kimlik av\u0131n\u0131n belirtilerini nas\u0131l tespit edeceklerini \u00f6\u011fretmesini tavsiye ediyoruz. A\u015fa\u011f\u0131da, baz\u0131 yeni hedef odakl\u0131 kimlik av\u0131 sald\u0131r\u0131lar\u0131ndan \u00f6rneklerle birlikte en yayg\u0131n hilelerden birka\u00e7\u0131 yer al\u0131yor.<\/p>\n<h2>Yanl\u0131\u015f yaz\u0131lm\u0131\u015f \u015firket ad\u0131<\/h2>\n<p>\u0130nsan beyni her zaman yaz\u0131lan bir kelimenin hepsini alg\u0131lamaz \u2014 kelimenin tan\u0131d\u0131k gelen ba\u015flang\u0131c\u0131n\u0131 g\u00f6r\u00fcr ve gerisini tamamlar. Sald\u0131rganlar, \u015firketinizin ad\u0131yla yaln\u0131zca bir veya iki harfi farkl\u0131 olan bir alan ad\u0131 alarak beynin bu \u00f6zelli\u011finden yararlanabilir.<\/p>\n<div id=\"attachment_10400\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10400\" class=\"wp-image-10400 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/12\/28130631\/spearphishing-tricks-stadt.png\" alt=\"\" width=\"540\" height=\"192\"><p id=\"caption-attachment-10400\" class=\"wp-caption-text\">\u0130\u00e7inde bir harfin eksik oldu\u011fu \u015firket ad\u0131<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Alan ad\u0131n\u0131n sahibi siber su\u00e7lular, e-postan\u0131n t\u00fcm kontrolleri ge\u00e7mesi i\u00e7in bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/36c3-fake-emails\/7644\/\" target=\"_blank\" rel=\"noopener\">DKIM imzas\u0131<\/a> bile belirleyebilir \u2014 sonu\u00e7ta alan ad\u0131n\u0131n t\u00fcm kontrolleri onlarda.<\/p>\n<div id=\"attachment_10401\" style=\"width: 894px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10401\" class=\"wp-image-10401 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/12\/28130712\/spearphishing-tricks-stadt-dkim.jpg\" alt=\"\" width=\"884\" height=\"276\"><p id=\"caption-attachment-10401\" class=\"wp-caption-text\">Hedef odakl\u0131 bir e-postadaki ge\u00e7erli DKIM imzas\u0131<\/p><\/div>\n<p>\u00a0<\/p>\n<h2>\u015eirket ad\u0131ndaki fazla kelimeler<\/h2>\n<p>E-postay\u0131 alan ki\u015filerin, mesaj\u0131 g\u00f6nderenin i\u015f arkada\u015flar\u0131ndan biri oldu\u011funu d\u00fc\u015f\u00fcnmelerini sa\u011flayarak kand\u0131rman\u0131n bir ba\u015fka yolu da, \u00f6rne\u011fin e-postay\u0131 bir \u015fubeden veya belirli bir departmandan geliyormu\u015f gibi g\u00f6r\u00fcnmesi i\u00e7in iki kelimeli bir alan ad\u0131 kaydetmektir. Bu ikinci durumda, siber su\u00e7lular teknik destek veya g\u00fcvenlik personeli rol\u00fc yapma e\u011filimindedir.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10402\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/12\/28130731\/spearphishing-tricks-security.jpg\" alt=\"\" width=\"584\" height=\"192\"><\/p>\n<p>Ger\u00e7ekte, her departmandan \u00e7al\u0131\u015fan\u0131n standart bir kurumsal e-posta adresi olmal\u0131d\u0131r. Hi\u00e7 kimse g\u00fcvenlik personeli i\u00e7in ayr\u0131 bir alan ad\u0131 olu\u015fturmaz. Yerel ofislere gelince, adresin do\u011frulu\u011fundan emin de\u011filseniz kurumsal adres defterindeki alan ad\u0131n\u0131 kontrol edin.<\/p>\n<h2>\u00d6zel i\u00e7erik<\/h2>\n<p>\u015eirketinizin (veya daha k\u00f6t\u00fcs\u00fc, e-posta al\u0131c\u0131s\u0131n\u0131n) ad\u0131n\u0131n ge\u00e7ti\u011fi bir kimlik av\u0131 e-postas\u0131, hedef odakl\u0131 kimlik av\u0131n\u0131n a\u00e7\u0131k bir i\u015fareti ve alarm \u00e7anlar\u0131n\u0131n \u00e7almas\u0131 i\u00e7in ge\u00e7erli bir nedendir.<\/p>\n<h2>Son derece \u00f6zelle\u015ftirilmi\u015f konu<\/h2>\n<p>A\u00e7\u0131k konu\u015fmak gerekirse, gelen e-postada b\u00f6yle konu ba\u015fl\u0131klar\u0131n\u0131 g\u00f6rmek her zaman bir mesaj\u0131n hedef odakl\u0131 kimlik av\u0131 oldu\u011fu anlam\u0131na gelmez \u2014 bu, toplu kimlik av\u0131 doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131n farkl\u0131 bir t\u00fcr\u00fc de olabilir. \u00d6rne\u011fin, kimlik av\u0131 sald\u0131r\u0131s\u0131 d\u00fczenleyen sald\u0131rganlar, konferans kat\u0131l\u0131mc\u0131lar\u0131n\u0131n e-posta adreslerinden olu\u015fan bir veri taban\u0131n\u0131 kullan\u0131yor olabilir ve konferans\u0131n konusu \u00fczerine bir e-posta haz\u0131rlayabilir \u2014 bu toplu kimlik av\u0131d\u0131r. Bununla birlikte, ayn\u0131 \u015fekilde belirli bir \u015firketin \u00e7al\u0131\u015fanlar\u0131na sald\u0131rmaya \u00e7al\u0131\u015fmalar\u0131 da hedef odakl\u0131 kimlik av\u0131d\u0131r ve bu nedenle g\u00fcvenlik departman\u0131n\u0131n bu konuda bilgi sahibi olmas\u0131 gerekir.<\/p>\n<p>Son olarak, \u015firketin mevcut g\u00fcvenli\u011fini azaltmadan potansiyel hedef odakl\u0131 kimlik av\u0131 i\u015faretlerini arayabilmek i\u00e7in, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/mail-server?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">posta sunucular\u0131na<\/a> ve \u00e7al\u0131\u015fanlar\u0131n <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">kulland\u0131\u011f\u0131 i\u015f istasyonlar\u0131na<\/a> koruyucu kimlik av\u0131 \u00f6nleme \u00e7\u00f6z\u00fcmleri y\u00fcklemenizi \u00f6neririz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>\u015eirketinizi hedef alan sald\u0131r\u0131lara haz\u0131r olmak i\u00e7in bilgi g\u00fcvenli\u011fi g\u00f6revlilerinin, g\u00f6nderilen hedef odakl\u0131 kimlik av\u0131 e-postalar\u0131 hakk\u0131nda bilgi sahibi olmas\u0131 gerekir. <\/p>\n","protected":false},"author":2598,"featured_media":10403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1921,2073,1074],"class_list":{"0":"post-10399","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-e-posta","10":"tag-hedef-odakli-kimlik-avi","11":"tag-kimlik-avi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/common-spear-phishing-tricks\/10399\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/common-spear-phishing-tricks\/23774\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/common-spear-phishing-tricks\/19273\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/common-spear-phishing-tricks\/9660\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/common-spear-phishing-tricks\/26000\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/common-spear-phishing-tricks\/23977\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/common-spear-phishing-tricks\/23663\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/common-spear-phishing-tricks\/26640\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/common-spear-phishing-tricks\/26235\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/common-spear-phishing-tricks\/32136\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/common-spear-phishing-tricks\/43224\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/common-spear-phishing-tricks\/18339\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/common-spear-phishing-tricks\/18715\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/common-spear-phishing-tricks\/15642\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/common-spear-phishing-tricks\/27911\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/common-spear-phishing-tricks\/32267\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/common-spear-phishing-tricks\/27967\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/common-spear-phishing-tricks\/24715\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/common-spear-phishing-tricks\/30134\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/common-spear-phishing-tricks\/29925\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10399"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10399\/revisions"}],"predecessor-version":[{"id":10404,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10399\/revisions\/10404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10403"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}