{"id":10773,"date":"2022-06-20T14:04:22","date_gmt":"2022-06-20T11:04:22","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10773"},"modified":"2022-06-20T14:04:22","modified_gmt":"2022-06-20T11:04:22","slug":"mdr-report-contribution","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/mdr-report-contribution\/10773\/","title":{"rendered":"2021&#8217;deki olaylarda en s\u0131k kar\u015f\u0131la\u015f\u0131lan d\u00fc\u015fmanca teknikler"},"content":{"rendered":"<p>Kaspersky Managed Detection and Response (MDR) hizmeti, kurumsal altyap\u0131y\u0131 24 saat d\u0131\u015far\u0131dan izleyerek \u015firketlerin g\u00fcvenlik ekiplerini g\u00fc\u00e7lendirmesine olanak sa\u011fl\u0131yor. Yeni yay\u0131nlanan bir <a href=\"https:\/\/securelist.com\/managed-detection-and-response-in-2021\/106540\/\" target=\"_blank\" rel=\"noopener\">MDR analiz raporuna<\/a> g\u00f6re, 2021\u2019de servis yakla\u015f\u0131k 414.000 g\u00fcvenlik alarm\u0131n\u0131 i\u015fleme ald\u0131 ve bu i\u015flemlerin sonucunda m\u00fc\u015fterilere 8479 olay bildirildi. SOC uzmanlar\u0131m\u0131z bu olaylar\u0131 analiz ederken MITRE ATT&amp;CK s\u0131n\u0131fland\u0131rmas\u0131 alt\u0131nda en s\u0131k g\u00f6r\u00fclen sald\u0131r\u0131 tekniklerini tan\u0131mlad\u0131, toplam olay say\u0131s\u0131 i\u00e7inde bu teknikleri temel alan olaylar\u0131n oran\u0131n\u0131 hesaplad\u0131 ve en pop\u00fcler \u00fc\u00e7 tanesini belirledi.<\/p>\n<h2>Kullan\u0131c\u0131 Taraf\u0131ndan Y\u00fcr\u00fctme<\/h2>\n<p>Bu kategori, sald\u0131rgan\u0131n altyap\u0131 i\u00e7inden bir kullan\u0131c\u0131n\u0131n eylemlerine ihtiya\u00e7 duydu\u011fu t\u00fcm olaylar\u0131 kaps\u0131yor. Yani bunlar, sald\u0131rganlar\u0131n bir \u00e7al\u0131\u015fan\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 bir ba\u011flant\u0131ya t\u0131klamaya ya da bir e-posta ekini a\u00e7maya zorlad\u0131\u011f\u0131 olaylar. Bu grup ayn\u0131 zamanda kand\u0131r\u0131lan bir kullan\u0131c\u0131n\u0131n sald\u0131rgana kurumsal kaynaklara eri\u015fim verdi\u011fi olaylar\u0131 da i\u00e7eriyor.<\/p>\n<h2>Hedef Odakl\u0131 Kimlik Av\u0131 Eki<\/h2>\n<p>MITRE ATT&amp;CK s\u0131n\u0131fland\u0131rmas\u0131na g\u00f6re Hedef Odakl\u0131 Kimlik Av\u0131 Eki takti\u011fi, ekinde k\u00f6t\u00fc ama\u00e7l\u0131 bir dosya bulunan e-postalar\u0131n g\u00f6nderilmesini i\u00e7eriyor. Sald\u0131rganlar genellikle bu t\u00fcr bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirirken sosyal m\u00fchendislik ve kullan\u0131c\u0131 taraf\u0131ndan y\u00fcr\u00fctme y\u00f6ntemini de kullan\u0131yorlar. Tipik y\u00fckler aras\u0131nda y\u00fcr\u00fct\u00fclebilir dosyalar, MS Office belgeleri, PDF\u2019ler ve ar\u015fiv dosyalar\u0131 yer al\u0131yor.<\/p>\n<h2>Uzaktan Hizmetlerin K\u00f6t\u00fcye Kullan\u0131m\u0131<\/h2>\n<p>Uzaktan Hizmetlerin K\u00f6t\u00fcye Kullan\u0131m\u0131 kategorisi, sald\u0131rganlar\u0131n kurumsal bir a\u011f i\u00e7indeki sistemlere eri\u015fmek i\u00e7in g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan servisleri kulland\u0131\u011f\u0131 olaylar\u0131 kaps\u0131yor. Bu genellikle altyap\u0131 i\u00e7inde yanal hareket i\u00e7in kullan\u0131l\u0131yor. Sald\u0131rganlar genellikle sunucular\u0131 hedef alsalar da bazen i\u015f istasyonlar\u0131 da dahil olmak \u00fczere di\u011fer u\u00e7 noktalardaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 da k\u00f6t\u00fcye kullanabiliyorlar.<\/p>\n<h2>Altyap\u0131n\u0131z\u0131 sald\u0131rganlar\u0131n en yayg\u0131n tekniklerine kar\u015f\u0131 nas\u0131l korursunuz?<\/h2>\n<p><a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener nofollow\">MITRE ATT&amp;CK web sitesinde<\/a> her d\u00fc\u015fman tekni\u011fine kar\u015f\u0131 kullan\u0131labilecek en etkili y\u00f6ntemler s\u0131ralan\u0131yor.<\/p>\n<ul>\n<li>\u015eirketinizin altyap\u0131s\u0131na y\u00f6nelik bir sald\u0131r\u0131ya \u00e7al\u0131\u015fanlar\u0131n\u0131zdan birinin bilmeden kat\u0131lmas\u0131n\u0131 otomatik olarak \u00f6nlemek i\u00e7in, uygulama kontrol\u00fc becerilerine sahip, ayn\u0131 zamanda a\u011f sald\u0131r\u0131lar\u0131n\u0131 engelleyebilen, web sitelerinin itibar\u0131n\u0131 kontrol edebilen ve y\u00fcklenen dosyalar\u0131 tarayabilen <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> kullanmak \u00f6neriliyor. Ayr\u0131ca \u00e7al\u0131\u015fanlar\u0131n\u0131za modern d\u00fc\u015fman taktik ve tekniklerini a\u00e7\u0131klayarak <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik fark\u0131ndal\u0131\u011f\u0131<\/a> kazand\u0131rmak da \u00f6nem ta\u015f\u0131yor.<\/li>\n<li>Ayn\u0131 koruma mekanizmalar\u0131, hedefli e-postalardaki k\u00f6t\u00fc ama\u00e7l\u0131 eklere kar\u015f\u0131 da etkili. Kurumsal e-posta sisteminiz i\u00e7in ilave bir koruma katman\u0131 olarak <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-cure-dmarc\/8716\/\" target=\"_blank\" rel=\"noopener\">SPF, DKIM ve DMARC teknolojilerini<\/a> de kullanman\u0131z\u0131 \u00f6neriyoruz.<\/li>\n<li>Uygulama izolasyonu teknolojileri, Uzaktan Hizmetlerin K\u00f6t\u00fcye Kullan\u0131m\u0131 tekniklerine kar\u015f\u0131 i\u015fe yar\u0131yor. Ancak \u00f6ncelik listenizde daha \u00fcst s\u0131ralarda olmas\u0131 gereken belirli ad\u0131mlar var: Kullan\u0131lmayan t\u00fcm uzaktan hizmetleri, segment a\u011flar\u0131n\u0131 ve sistemleri kald\u0131rman\u0131z veya devre d\u0131\u015f\u0131 b\u0131rakman\u0131z ve servis hesaplar\u0131n\u0131n eri\u015fim ve izin d\u00fczeylerini en aza indirmeniz \u00f6neriliyor. Ayr\u0131ca kritik sistemlerin g\u00fcvenlik g\u00fcncellemelerini zaman\u0131nda y\u00fcklemek ve davran\u0131\u015fsal tespit becerilerine sahip g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullanmak da gerekiyor. Ek olarak, potansiyel olarak g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunabilecek servisler i\u00e7in a\u011f\u0131 d\u00fczenli aral\u0131klarla taramak ve g\u00fcncel <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/threat-intelligence?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Tehdit \u0130stihbarat\u0131 verileri<\/a> kullanmak da faydal\u0131.<\/li>\n<\/ul>\n<p>Genel olarak, kurumsal altyap\u0131n\u0131z\u0131 karma\u015f\u0131k sald\u0131r\u0131lardan korumak i\u00e7in, altyap\u0131n\u0131z\u0131 koruyabilecek, g\u00fcvenlik alarmlar\u0131n\u0131 inceleyebilecek ve tehlikeli aktiviteleri size bildirip m\u00fcdahale eylemleri ve \u00f6neriler sa\u011flayabilecek <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">\u015firket d\u0131\u015f\u0131 uzmanlar\u0131n yard\u0131m\u0131n\u0131<\/a> almal\u0131s\u0131n\u0131z.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Managed Detection and Response uzmanlar\u0131 2021&#8217;deki siber g\u00fcvenlik olaylar\u0131nda en \u00e7ok kar\u015f\u0131la\u015f\u0131n d\u00fc\u015fman tekniklerini belirledi.<\/p>\n","protected":false},"author":2581,"featured_media":10774,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287],"tags":[2200,2307,1313],"class_list":{"0":"post-10773","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-mdr","9":"tag-olaylar","10":"tag-raporlar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mdr-report-contribution\/10773\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mdr-report-contribution\/24263\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mdr-report-contribution\/19746\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mdr-report-contribution\/26599\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mdr-report-contribution\/24556\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mdr-report-contribution\/24920\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mdr-report-contribution\/27271\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mdr-report-contribution\/33328\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mdr-report-contribution\/44584\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mdr-report-contribution\/19027\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mdr-report-contribution\/19588\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mdr-report-contribution\/28904\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mdr-report-contribution\/25110\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mdr-report-contribution\/30625\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mdr-report-contribution\/30374\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/mdr\/","name":"MDR"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10773","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10773"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10773\/revisions"}],"predecessor-version":[{"id":10775,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10773\/revisions\/10775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10774"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10773"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10773"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}