{"id":10570,"date":"2022-03-24T13:55:06","date_gmt":"2022-03-24T10:55:06","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10570"},"modified":"2022-05-05T14:25:09","modified_gmt":"2022-05-05T11:25:09","slug":"okta-hack-consequences","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/okta-hack-consequences\/10570\/","title":{"rendered":"Okta&#8217;n\u0131n hacklenmesi ne gibi olas\u0131 sonu\u00e7lar\u0131 do\u011furur?"},"content":{"rendered":"<p>LAPSUS$ siber su\u00e7 grubuna \u00fcye hackerlar, Okta\u2019n\u0131n bilgi sistemlerinden al\u0131nd\u0131\u011f\u0131 iddia edilen ekran g\u00f6r\u00fcnt\u00fclerini yay\u0131nlad\u0131. \u0130ddialar do\u011fruysa, yaln\u0131zca \u015firketin internet sitesine de\u011fil, ayn\u0131 zamanda olduk\u00e7a kritik olanlar da dahil olmak \u00fczere bir dizi ba\u015fka dahili sisteme de eri\u015fimleri eri\u015fmi\u015f olabilirler.<\/p>\n<p>LAPSUS$, \u015firkete ait herhangi bir veri \u00e7almad\u0131klar\u0131n\u0131 ve hedeflerinin a\u011f\u0131rl\u0131kl\u0131 olarak Okta\u2019n\u0131n m\u00fc\u015fterileri oldu\u011funu iddia ediyor. Ekran g\u00f6r\u00fcnt\u00fclerindeki tarihlere bak\u0131l\u0131rsa, sald\u0131rganlar 2022 Ocak ay\u0131 ba\u015f\u0131 gibi sistemlere eri\u015fim sa\u011flad\u0131lar.<\/p>\n<h2>Okta nedir ve ihlal neden bu kadar tehlikeli olabilir?<\/h2>\n<p>Okta, kimlik ve eri\u015fim y\u00f6netim sistemleri geli\u015ftiriyor ve sa\u011fl\u0131yor. \u00d6zellikle, tek oturum a\u00e7ma (single sign-on) \u00e7\u00f6z\u00fcm\u00fc sunuyorlar. \u00c7ok say\u0131da b\u00fcy\u00fck \u015firket Okta\u2019n\u0131n \u00e7\u00f6z\u00fcmlerini kullan\u0131yor.<\/p>\n<p>Kaspersky Lab uzmanlar\u0131, hacker\u2019\u0131n Okta sistemlerine eri\u015fiminin, LAPSUS$ hackerlar\u0131n\u0131n sorumlulu\u011funu \u00fcstlendi\u011fi, b\u00fcy\u00fck \u015firketlere ait olduk\u00e7a y\u00fcksek profilli bir dizi veri s\u0131z\u0131nt\u0131s\u0131na \u0131\u015f\u0131k tutabilece\u011fine inan\u0131yor.<\/p>\n<h2>Siber su\u00e7lular Okta\u2019n\u0131n sistemlerine nas\u0131l eri\u015fim sa\u011flad\u0131lar?<\/h2>\n<p>\u015eu anda, hackerlar\u0131n ger\u00e7ekten sistemlere eri\u015fim sa\u011flad\u0131\u011f\u0131na dair kesin bir kan\u0131t bulunmuyor. <a href=\"https:\/\/www.okta.com\/blog\/2022\/03\/okta-official-statement-on-lapsus-claims\/\" target=\"_blank\" rel=\"noopener nofollow\">Okta\u2019n\u0131n resmi a\u00e7\u0131klamas\u0131na<\/a> g\u00f6re, \u015firket uzmanlar\u0131 hali haz\u0131rda bir soru\u015fturma y\u00fcr\u00fct\u00fcyor ve \u015firket, soru\u015fturma tamamlan\u0131r tamamlanmaz ayr\u0131nt\u0131lar\u0131 payla\u015faca\u011f\u0131 s\u00f6z\u00fcn\u00fc veriyor. Yay\u0131nlanan ekran g\u00f6r\u00fcnt\u00fcleri, Ocak ay\u0131nda ya\u015fanan, bilinmeyen bir akt\u00f6r\u00fcn \u00fc\u00e7\u00fcnc\u00fc taraf bir alt y\u00fcklenici ad\u0131na \u00e7al\u0131\u015fan bir teknik destek m\u00fchendisine ait hesab\u0131n g\u00fcvenli\u011finin ihlal edilmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131 olayla ilgili olabilir.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10572\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/03\/24134958\/okta-hack-consequences-lapsuss-reply.png\" alt=\"\" width=\"900\" height=\"700\"><\/p>\n<h2>Kim bu LAPSUS$ grubu ve hakk\u0131nda ne biliyoruz?<\/h2>\n<p>LAPSUS$, 2020\u2019de Brezilya Sa\u011fl\u0131k Bakanl\u0131\u011f\u0131\u2019na ait sistemlerin g\u00fcvenli\u011fini ihlal etmesiyle ad\u0131n\u0131 duyurdu. Muhtemelen grup, fidye i\u00e7in b\u00fcy\u00fck \u015firketlerden bilgi \u00e7alan bir Latin Amerikal\u0131 bir hacker grubu. Kurbanlar\u0131n fidye \u00f6demeyi reddetmesi halinde hackerlar, \u00e7ald\u0131klar\u0131 bilgileri internette yay\u0131nl\u0131yorlar. Di\u011fer bir\u00e7ok fidye yaz\u0131l\u0131m\u0131 grubunun aksine LAPSUS$, sald\u0131rd\u0131klar\u0131 kurulu\u015flar\u0131n verilerini \u015fifrelemiyor ancak fidyenin \u00f6denmemesi durumunda verileri s\u0131zd\u0131rmakla tehdit ediyor.<\/p>\n<p>LAPSUS$\u2019\u0131n \u00f6nemli kurbanlar\u0131 aras\u0131nda Nvidia, Samsung ve Ubisoft yer al\u0131yor. Buna ek olarak, yak\u0131n zamanda Microsoft\u2019un i\u00e7 projeleriyle ilgili oldu\u011funa inan\u0131lan 37 GB kod yay\u0131nlad\u0131lar.<\/p>\n<h2>Kendinizi koruman\u0131n yollar\u0131<\/h2>\n<p>\u015eu anda kesin olarak olay\u0131n ger\u00e7ekten ya\u015fand\u0131\u011f\u0131n\u0131 s\u00f6ylemek pek m\u00fcmk\u00fcn de\u011fil. Yaln\u0131zca ekran g\u00f6r\u00fcnt\u00fclerinin yay\u0131nlanmas\u0131 olduk\u00e7a garip bir hareket. Hackerlar kendi reklamlar\u0131n\u0131 yapmay\u0131, Okta\u2019n\u0131n itibar\u0131na y\u00f6nelik bir sald\u0131r\u0131 veya LAPSUS$\u2019\u0131n Okta\u2019n\u0131n m\u00fc\u015fterilerinden birine eri\u015fmesini sa\u011flayan ger\u00e7ek y\u00f6ntemi gizlemeyi ama\u00e7l\u0131yor olabilir.<\/p>\n<p>Bununla birlikte uzmanlar\u0131m\u0131z, tedbiri elden b\u0131rakmamalar\u0131 ad\u0131na, Okta m\u00fc\u015fterilerine a\u015fa\u011f\u0131daki koruyucu \u00f6nlemleri almalar\u0131n\u0131 tavsiye ediyor:<\/p>\n<ul>\n<li>A\u011f etkinli\u011finin ve bilhassa dahili sistemlerdeki kimlik do\u011frulamayla ilgili herhangi bir etkinli\u011fin \u00f6zellikle s\u0131k\u0131 bir \u015fekilde izlenmesini zorunlu hale getirilmesi,<\/li>\n<li>\u00c7al\u0131\u015fanlara ek siber g\u00fcvenlik hijyeni e\u011fitimi verilmesi ve herhangi bir \u015f\u00fcpheli etkinlik hakk\u0131nda uyan\u0131k olmalar\u0131 ve bu tarz olaylar\u0131 bildirmeleri konusuna haz\u0131rl\u0131kl\u0131 olunmas\u0131,<\/li>\n<li>A\u00e7\u0131klar\u0131 ve savunmas\u0131z sistemleri ortaya \u00e7\u0131karmak i\u00e7in kurulu\u015fun BT altyap\u0131s\u0131nda bir g\u00fcvenlik denetimi ger\u00e7ekle\u015ftirilmesi,<\/li>\n<li>Harici IP adreslerinden uzaktan y\u00f6netim ara\u00e7lar\u0131na eri\u015fimin k\u0131s\u0131tlanmas\u0131,<\/li>\n<li>Uzaktan kontrol aray\u00fczlerine yaln\u0131zca s\u0131n\u0131rl\u0131 say\u0131da u\u00e7 noktadan eri\u015filebildi\u011finden emin olunmas\u0131,<\/li>\n<li>\u00c7al\u0131\u015fanlara s\u0131n\u0131rl\u0131 ayr\u0131cal\u0131klar sunma ilkesine uyulmas\u0131 ve yaln\u0131zca g\u00f6revlerini yerine getirmek i\u00e7in bu ayr\u0131cal\u0131klara ihtiyac\u0131 olanlara y\u00fcksek ayr\u0131cal\u0131kl\u0131 hesaplar verilmesi,<\/li>\n<li>Potansiyel olarak teknolojik s\u00fcreci ve ana kurumsal varl\u0131klar\u0131 tehdit eden sald\u0131r\u0131lara kar\u015f\u0131 daha iyi koruma i\u00e7in ICS a\u011f trafi\u011fi izleme, analiz ve tespit \u00e7\u00f6z\u00fcmleri kullan\u0131lmas\u0131.<\/li>\n<\/ul>\n<p>BT altyap\u0131lar\u0131ndaki \u015f\u00fcpheli etkinlikleri izlemek i\u00e7in dahili kaynaklara sahip olmayan \u015firketler bunun yerine <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">harici uzmanlar\u0131<\/a> istihdam edebilir.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lapsus$ grubundan bilgisayar korsanlar\u0131, \u00f6nemli bir eri\u015fim y\u00f6netim sistemleri sa\u011flay\u0131c\u0131s\u0131 olan Okta&#8217;ya s\u0131zd\u0131klar\u0131n\u0131 iddia ediyor. Peki s\u0131rada ne var?<\/p>\n","protected":false},"author":2706,"featured_media":10571,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1351],"tags":[587,1575,2541,1611],"class_list":{"0":"post-10570","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-threats","10":"tag-hackerlar","11":"tag-kimlik-dogrulama","12":"tag-okta","13":"tag-tedarik-zinciri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/okta-hack-consequences\/10570\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/okta-hack-consequences\/23978\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/okta-hack-consequences\/19461\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/okta-hack-consequences\/9796\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/okta-hack-consequences\/26279\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/okta-hack-consequences\/24238\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/okta-hack-consequences\/24095\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/okta-hack-consequences\/27012\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/okta-hack-consequences\/26551\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/okta-hack-consequences\/32979\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/okta-hack-consequences\/43971\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/okta-hack-consequences\/18644\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/okta-hack-consequences\/19149\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/okta-hack-consequences\/15866\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/okta-hack-consequences\/28356\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/okta-hack-consequences\/28165\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/okta-hack-consequences\/24890\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/okta-hack-consequences\/30323\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/okta-hack-consequences\/30095\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tedarik-zinciri\/","name":"tedarik zinciri"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10570"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10570\/revisions"}],"predecessor-version":[{"id":10573,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10570\/revisions\/10573"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10571"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}