{"id":10532,"date":"2022-02-22T12:34:34","date_gmt":"2022-02-22T09:34:34","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10532"},"modified":"2022-02-22T12:34:34","modified_gmt":"2022-02-22T09:34:34","slug":"threat-intelligence-latam-bank","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/threat-intelligence-latam-bank\/10532\/","title":{"rendered":"Latin Amerika&#8217;daki bir bankaya d\u00fczenlenen sald\u0131r\u0131"},"content":{"rendered":"<p>Bir\u00e7ok \u015firket i\u00e7in <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/threat-intelligence\/\" target=\"_blank\" rel=\"noopener\">tehdit istihbarat\u0131<\/a> yaln\u0131zca belirli siber su\u00e7 ara\u00e7lar\u0131na ili\u015fkin veri ve bilgi g\u00fcvenli\u011fi risk g\u00f6stergesi anlam\u0131na gelse de asl\u0131nda a\u011fdaki etkinliklerini izlemek de dahil olmak \u00fczere tehdit akt\u00f6rleri hakk\u0131nda \u00e7ok daha derin bir bilgi sunar. Bazen bu bilgiler, yaln\u0131zca i\u015flenen su\u00e7un y\u00f6ntemi ve kullan\u0131lan taktikler hakk\u0131nda fikir edinmenizi de\u011fil, ayn\u0131 zamanda bir siber su\u00e7u \u00f6nlemenizi de sa\u011flar. Latin Amerika\u2019daki bir \u00fclkenin merkez bankas\u0131na y\u00f6nelik d\u00fczenlenen sald\u0131r\u0131, bunun canl\u0131 bir \u00f6rne\u011fi.<\/p>\n<h2>Ne oldu?<\/h2>\n<p>Siber su\u00e7 faaliyetlerini incelerken uzmanlar\u0131m\u0131z, bir grubun bankan\u0131n a\u011f\u0131na eri\u015fmeyi ba\u015fard\u0131\u011f\u0131n\u0131 \u00f6\u011frendi. M\u00fcfetti\u015fler derhal kurban\u0131 bilgilendirdi, Interpol ile temasa ge\u00e7ti ve olayla ilgili kapsaml\u0131 bir soru\u015fturma y\u00fcr\u00fctt\u00fc. Sonu\u00e7 olarak kurumsal altyap\u0131daki zafiyetleri ortadan kald\u0131rmay\u0131 ve ger\u00e7ek finansal kay\u0131plar\u0131n \u00f6n\u00fcne ge\u00e7meyi ba\u015fard\u0131lar. Ne yaz\u0131k ki olaya ili\u015fkin ayr\u0131nt\u0131lar\u0131 payla\u015fam\u0131yor, sald\u0131rganlar\u0131n bankan\u0131n a\u011f\u0131na nas\u0131l girdi\u011fini a\u00e7\u0131klayam\u0131yoruz.<\/p>\n<h2>Uzmanlar\u0131m\u0131z a\u011fa s\u0131zan ki\u015filerin faaliyetlerini tespit etmeyi nas\u0131l ba\u015fard\u0131?<\/h2>\n<p>T\u00fcm siber su\u00e7lular, hedefe y\u00f6nelik ilk \u00e7al\u0131\u015fmadan son hamleye (genellikle veri veya para s\u0131zd\u0131rma veya fidye yaz\u0131l\u0131m\u0131 bula\u015ft\u0131rmak) kadar sald\u0131r\u0131yla ilgili s\u00fcrecin tamam\u0131ndan sorumlu de\u011fildir. Yaln\u0131zca \u015firketlerin altyap\u0131s\u0131na eri\u015fim sa\u011flama konusunda uzmanla\u015fm\u0131\u015f gruplar bulunur: A\u011fa ba\u015far\u0131l\u0131 bir \u015fekilde s\u0131zd\u0131ktan sonra, dark web\u2019de veya hacker forumlar\u0131nda sald\u0131r\u0131 d\u00fczenleyebilecek ki\u015filere eri\u015fim satmaya \u00e7al\u0131\u015f\u0131rlar. Ayr\u0131ca eri\u015fim sat\u0131n alan ve ard\u0131ndan bu eri\u015fimleri di\u011fer siber su\u00e7lulara satan \u0130lk Eri\u015fim Arac\u0131lar\u0131 (Initial Access Brokers) denen ki\u015filerde bulunur.<\/p>\n<p>Ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z tamamen ba\u015fka su\u00e7lulara ait faaliyetleri incelerken birilerinin, bir t\u00fcr siber doland\u0131r\u0131c\u0131l\u0131k amac\u0131yla bir bankaya sald\u0131r\u0131 d\u00fczenlemek i\u00e7in ortak arad\u0131\u011f\u0131n\u0131 fark etti. Bankan\u0131n altyap\u0131s\u0131na eri\u015fimin sa\u011flad\u0131klar\u0131na ili\u015fkin kan\u0131t olarak da baz\u0131 bilgiler payla\u015fm\u0131\u015flard\u0131 ve bu, uzmanlar\u0131m\u0131z\u0131n kurban\u0131 tespit etmesine ve su\u00e7u \u00f6nlemesine yard\u0131mc\u0131 oldu.<\/p>\n<h2>Tehdit istihbarat\u0131 bir \u015firkete nas\u0131l yard\u0131mc\u0131 olabilir?<\/h2>\n<p>Bu olayda uzmanlar\u0131m\u0131z, belirli bir bankaya y\u00f6nelik sald\u0131r\u0131ya dair i\u015faretleri aram\u0131yordu. S\u00f6z konusu banka m\u00fc\u015fterimiz bile de\u011fildi. Bununla birlikte ara\u00e7lar\u0131m\u0131z, belirli bir i\u015fletme \u00f6zelindeki tehditleri izleme imkan\u0131 da sunar. Digital Footprint Intelligence hizmetine sahip <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Threat Intelligence<\/a> portf\u00f6y\u00fcm\u00fcz, bir i\u015fletmenin dinamik bir \u201cdijital portresini\u201d olu\u015fturman\u0131za ve ard\u0131ndan dark web ve deep web\u2019deki a\u00e7\u0131k kaynaklar arac\u0131l\u0131\u011f\u0131yla tehlike i\u015faretlerini izlemenize olanak tan\u0131r. Bazen bu, olduk\u00e7a ciddi siber olaylar\u0131 \u00f6nlemenizi sa\u011flar.<\/p>\n<p>Ayr\u0131ca, karma\u015f\u0131k sald\u0131r\u0131lara kar\u015f\u0131 koruma sa\u011flamak i\u00e7in <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Y\u00f6netilen Tespit ve Yan\u0131t<\/a> gibi hizmetlerin kullan\u0131lmas\u0131n\u0131 \u00f6neriyoruz. Bu, \u015firket altyap\u0131s\u0131na y\u00f6nelik karma\u015f\u0131k sald\u0131r\u0131lar\u0131 erken bir a\u015famada tespit edip durdurmak i\u00e7in siber g\u00fcvenlik ekibinizin \u015firket d\u0131\u015f\u0131ndaki uzmanlardan yard\u0131m almas\u0131na olanak tan\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>Tehdit istihbarat\u0131 kurulu\u015flara y\u00f6nelik siber sald\u0131r\u0131lar\u0131 \u00f6nlemeye nas\u0131l yard\u0131mc\u0131 olur?<\/p>\n","protected":false},"author":2581,"featured_media":10533,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[2537,2200,543,1935],"class_list":{"0":"post-10532","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-bankacilik-tehditleri","11":"tag-mdr","12":"tag-saldiri","13":"tag-tehdit-istihbarati"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/threat-intelligence-latam-bank\/10532\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/threat-intelligence-latam-bank\/23916\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/threat-intelligence-latam-bank\/19403\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/threat-intelligence-latam-bank\/9760\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/threat-intelligence-latam-bank\/26167\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/threat-intelligence-latam-bank\/24131\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/threat-intelligence-latam-bank\/23940\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/threat-intelligence-latam-bank\/26938\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/threat-intelligence-latam-bank\/26478\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/threat-intelligence-latam-bank\/32408\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/threat-intelligence-latam-bank\/43722\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/threat-intelligence-latam-bank\/18572\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/threat-intelligence-latam-bank\/19025\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/threat-intelligence-latam-bank\/15815\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/threat-intelligence-latam-bank\/28204\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/threat-intelligence-latam-bank\/28129\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/threat-intelligence-latam-bank\/24843\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/threat-intelligence-latam-bank\/30259\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/threat-intelligence-latam-bank\/30038\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tehdit-istihbarati\/","name":"tehdit istihbarat\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10532"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10532\/revisions"}],"predecessor-version":[{"id":10534,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10532\/revisions\/10534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10533"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}