{"id":10553,"date":"2022-03-16T18:14:51","date_gmt":"2022-03-16T15:14:51","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10553"},"modified":"2022-03-16T18:14:51","modified_gmt":"2022-03-16T15:14:51","slug":"geopolitics-opportunistic-malware-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/geopolitics-opportunistic-malware-phishing\/10553\/","title":{"rendered":"Ba\u011flant\u0131 karma\u015fas\u0131: T\u0131klamak ya da t\u0131klamamak"},"content":{"rendered":"<p>Siber su\u00e7lular\u0131n kolay para kazanmak veya kurumsal bir altyap\u0131ya girmek i\u00e7in ellerindeki her f\u0131rsat\u0131 nas\u0131l kulland\u0131klar\u0131n\u0131 anlatan yaz\u0131lar\u0131 bu blogda s\u0131k s\u0131k g\u00f6r\u00fcyorsunuz. Ge\u00e7mi\u015fte, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/coronavirus-corporate-phishing-2\/8019\/\" target=\"_blank\" rel=\"noopener\">koronavir\u00fcs<\/a>, D\u00fcnya Kupalar\u0131, <a href=\"https:\/\/www.kaspersky.com\/blog\/olympic-games-2016-threats-guide\/12617\/\" target=\"_blank\" rel=\"noopener nofollow\">Olimpiyatlar<\/a>, se\u00e7imler ve di\u011fer \u00f6nemli olaylar\u0131 oda\u011f\u0131na alan hedefli sald\u0131r\u0131lar\u0131 g\u00f6rd\u00fck.<\/p>\n<p>Bunun nedeni basit \u2014 b\u00fct\u00fcn bunlar, insanlar aras\u0131nda yank\u0131 uyand\u0131ran heyecanl\u0131 konulard\u0131r. Bazen heyecan, insanlar\u0131n g\u00f6rd\u00fckleri, t\u0131klad\u0131klar\u0131 veya arkada\u015flar\u0131yla, aileleriyle, i\u015f arkada\u015flar\u0131yla ve sosyal medyadaki hemen herkesle payla\u015ft\u0131\u011f\u0131 \u015feyleri sorgulama konusunda normalde sahip olduklar\u0131 dikkatli olma i\u00e7g\u00fcd\u00fcs\u00fcn\u00fc olumsuz etkiler.<\/p>\n<p>Bug\u00fcne d\u00f6nd\u00fc\u011f\u00fcm\u00fczde, t\u00fcm d\u00fcnyan\u0131n g\u00f6z\u00fcn\u00fc Ukrayna\u2019daki jeopolitik anla\u015fmazl\u0131\u011fa \u00e7evirdi\u011fini g\u00f6r\u00fcyoruz. Bu anla\u015fmazl\u0131\u011fa ili\u015fkin artan odak sonucunda, kolay para kazanmak isteyen siber su\u00e7lular da dahil olmak \u00fczere konuya m\u00fcdahil olan insan say\u0131s\u0131n\u0131n artt\u0131\u011f\u0131 g\u00f6r\u00fcl\u00fcyor.<\/p>\n<p>Herhangi bir sosyal a\u011fa \u00fcyeyseniz, muhtemelen, hashtag\u2019lere atlayan veya g\u00fcncel olaylarla ilgili \u00e7ok say\u0131da bilgi payla\u015fan insanlarla kar\u015f\u0131la\u015fm\u0131\u015fs\u0131n\u0131zd\u0131r. Baz\u0131 konularda, y\u0131llard\u0131r tan\u0131d\u0131\u011f\u0131n\u0131z arkada\u015flar\u0131n\u0131z, k\u00f6r\u00fc k\u00f6r\u00fcne payla\u015f\u0131m yapan botlara d\u00f6n\u00fc\u015fm\u00fc\u015f gibi g\u00f6r\u00fcnebilir.<\/p>\n<p>Bununla birlikte, olaya dahil olup bunlardan daha fazlas\u0131n\u0131 yapmak isteyenler de var. \u00d6zellikle, hackleme konusunda teknik becerilere sahip olmamalar\u0131na ra\u011fmen <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Hacktivizm\" target=\"_blank\" rel=\"noopener nofollow\">hacktivizm<\/a> gruplar\u0131na kat\u0131lmaya \u00e7al\u0131\u015fan baz\u0131 insanlar s\u00f6z konusu. Teknik a\u00e7\u0131dan daha bilgili hackerlar, daha az teknolojiye sahip karde\u015flerinin kolayca faaliyetlerine kat\u0131lmalar\u0131n\u0131 ve kendileri i\u00e7in komut dosyalar\u0131n\u0131 \u00e7al\u0131\u015ft\u0131rmalar\u0131n\u0131 kolayla\u015ft\u0131rd\u0131lar.<\/p>\n<p>\u0130nsanlar\u0131n bu \u00e7abalara dahil olmak ve desteklemek istemesini anl\u0131yoruz ancak ya\u015fad\u0131\u011f\u0131n\u0131z yere veya yapt\u0131klar\u0131n\u0131za ba\u011fl\u0131 olarak bu faaliyetlerin yasa d\u0131\u015f\u0131 olabilece\u011fini de belirtmek zorunday\u0131z. Bu faaliyetlere kat\u0131lmak isteyen biriyseniz, l\u00fctfen yapt\u0131klar\u0131n\u0131z konusunda vicdanen rahat olman\u0131n yan\u0131 s\u0131ra bunlar\u0131 hem etik, hem de yasal a\u00e7\u0131lardan anlad\u0131\u011f\u0131n\u0131zdan emin olun.<\/p>\n<p>Dahas\u0131, g\u00fcvenlik endi\u015felerini de g\u00f6z \u00f6n\u00fcnde bulundurmal\u0131s\u0131n\u0131z. Ne yaz\u0131k ki, bu konudaki y\u00fckselen trend doland\u0131r\u0131c\u0131lar taraf\u0131ndan da benimsendi: <a href=\"https:\/\/blog.talosintelligence.com\/2022\/03\/threat-advisory-cybercriminals.html\" target=\"_blank\" rel=\"noopener nofollow\">Talos\u2019taki meslekta\u015flar\u0131m\u0131z yak\u0131n zamanda yapt\u0131klar\u0131 ara\u015ft\u0131rmada<\/a>, k\u00f6t\u00fc niyetli ki\u015filerin nas\u0131l asl\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m olan benzer paketleri olu\u015fturdu\u011funu ele ald\u0131lar.<\/p>\n<p>Bunun yan\u0131 s\u0131ra baz\u0131 aktivistler destek\u00e7ilerini, yard\u0131m talebi bombard\u0131man\u0131na tutarak veya tam tersi \u015fekilde baz\u0131 faaliyetleri yapmay\u0131 b\u0131rakarak ticari i\u015fletmeleri zor duruma sokma \u00e7a\u011fr\u0131s\u0131nda bulunuyor. Bu \u00e7a\u011fr\u0131lar aras\u0131nda g\u00fcvenlik yaz\u0131l\u0131m\u0131n\u0131 daha az etkili \u00fcr\u00fcnlerle de\u011fi\u015ftirmek gibi olduk\u00e7a tehlikeli olanlar da bulunuyor.<\/p>\n<p>Hacktivist gruplardaki bu eylem \u00e7a\u011fr\u0131lar\u0131, f\u0131rsat\u00e7\u0131 su\u00e7lular\u0131n bu kimli\u011fe b\u00fcr\u00fcnmeleri i\u00e7in de uygun hale gelmi\u015f durumda. Bu hedefli kampanyalar, <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/spear-phishing\/\" target=\"_blank\" rel=\"noopener\">hedef odakl\u0131 kimlik av\u0131 sald\u0131r\u0131lar\u0131na<\/a> da yol a\u00e7abilir.<\/p>\n<h2>Kendinizi koruman\u0131z\u0131 sa\u011flayacak ipu\u00e7lar\u0131<\/h2>\n<p><strong>Kendinizi d\u00fc\u015f\u00fcn\u00fcn.<\/strong> Size ne yapaca\u011f\u0131n\u0131z\u0131 s\u00f6yleyemeyiz ancak verece\u011finiz herhangi bir karar\u0131n <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/information-check-2022\/10477\/\" target=\"_blank\" rel=\"noopener\">sahte haberlere de\u011fil, somut ger\u00e7eklere<\/a> dayanmas\u0131 gerekti\u011fini hat\u0131rlatmak zorunday\u0131z. Her zaman kendi ara\u015ft\u0131rman\u0131z\u0131 yap\u0131n ve eylemlerinizin t\u00fcm sonu\u00e7lar\u0131n\u0131 elinizden geldi\u011fince en iyi \u015fekilde anlamaya \u00e7al\u0131\u015f\u0131n.<\/p>\n<p><strong>E-postay\u0131 kimin g\u00f6nderdi\u011fini kontrol edin.<\/strong> K\u00f6t\u00fc ama\u00e7l\u0131 bir e-postan\u0131n kurban\u0131 olmamak i\u00e7in yap\u0131lacak ilk \u015feylerden biri, g\u00f6nderenin kim oldu\u011funa bakmakt\u0131r. \u0130sim tan\u0131d\u0131k gelse de e-postan\u0131n g\u00fcvenilir bir kaynaktan geldi\u011finden veya size ula\u015fan\u0131n yasal bir \u015firket\/ki\u015fi oldu\u011fundan emin olun.<\/p>\n<p><strong>Ba\u011flant\u0131lar\u0131n do\u011frulu\u011funu teyit edin.<\/strong> G\u00f6nderen ki\u015fiye bakmaya benzer \u015fekilde, ba\u011flant\u0131lara da bir g\u00f6z at\u0131n ve t\u0131klamadan \u00f6nce yasal sitelere ait oldu\u011fundan, g\u00f6nderenle ili\u015fkili oldu\u011fundan emin olun. Daha \u00f6nce de belirtildi\u011fi gibi, duygular\u0131n\u0131zla hareket etmek muhakeme yetene\u011finizi olumsuz etkileyebilir, bu nedenle e-postadaki ba\u011flant\u0131lara t\u0131klarken g\u00fcvenlik konusunda dikkatli olmaya devam edin.<\/p>\n<p><strong>\u015e\u00fcpheli paketleri kurmay\u0131n.<\/strong> B\u00fcy\u00fcrken hepimize yabanc\u0131lardan \u015feker almamam\u0131z gerekti\u011fi s\u00f6ylenmi\u015ftir. Ayn\u0131 \u015fekilde, g\u00fcvenilir oldu\u011fundan emin olmad\u0131\u011f\u0131n\u0131z bir e-posta veya siteden de herhangi bir \u015fey indirmemelisiniz. Yine de indirecekseniz, en az\u0131ndan g\u00fcvenilir bir antivir\u00fcs ile taray\u0131n.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>Hi\u00e7bir \u015feyden \u015f\u00fcphelenmeyen kurbanlar \u00fczerinden para kazanmaya \u00e7al\u0131\u015fan k\u00f6t\u00fc niyetli akt\u00f6rlere ili\u015fkin son \u00f6rnek, Ukrayna&#8217;da ya\u015fanan jeopolitik anla\u015fmazl\u0131k.<\/p>\n","protected":false},"author":636,"featured_media":10554,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[2073,1074,728],"class_list":{"0":"post-10553","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-hedef-odakli-kimlik-avi","9":"tag-kimlik-avi","10":"tag-kotu-amacli-yazilim"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/geopolitics-opportunistic-malware-phishing\/10553\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/geopolitics-opportunistic-malware-phishing\/23964\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/geopolitics-opportunistic-malware-phishing\/19449\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/geopolitics-opportunistic-malware-phishing\/9779\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/geopolitics-opportunistic-malware-phishing\/26262\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/geopolitics-opportunistic-malware-phishing\/24223\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/geopolitics-opportunistic-malware-phishing\/24069\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/geopolitics-opportunistic-malware-phishing\/26998\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/geopolitics-opportunistic-malware-phishing\/26519\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/geopolitics-opportunistic-malware-phishing\/43932\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/geopolitics-opportunistic-malware-phishing\/18618\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/geopolitics-opportunistic-malware-phishing\/19119\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/geopolitics-opportunistic-malware-phishing\/15842\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/geopolitics-opportunistic-malware-phishing\/28311\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/geopolitics-opportunistic-malware-phishing\/28159\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/geopolitics-opportunistic-malware-phishing\/30310\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/geopolitics-opportunistic-malware-phishing\/30083\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kotu-amacli-yazilim\/","name":"k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10553","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10553"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10553\/revisions"}],"predecessor-version":[{"id":10555,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10553\/revisions\/10555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10554"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10553"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10553"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10553"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}