{"id":10853,"date":"2022-07-19T18:51:58","date_gmt":"2022-07-19T15:51:58","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10853"},"modified":"2022-07-19T18:51:58","modified_gmt":"2022-07-19T15:51:58","slug":"macros-microsoft-2022","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/macros-microsoft-2022\/10853\/","title":{"rendered":"Makronun D\u00f6n\u00fc\u015f\u00fc"},"content":{"rendered":"<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 yayman\u0131n \u00e7ok bilinen yollar\u0131ndan biri, belgelerdeki makrolara k\u00f6t\u00fc ama\u00e7l\u0131 komutlar eklemek. Microsoft Office dosyalar\u0131n\u0131n bir\u00e7o\u011funda ise, bunun kar\u015f\u0131l\u0131\u011f\u0131 makrolard\u0131r. Di\u011fer bir deyi\u015fle, Word belgeleri, Excel elektronik tablolar\u0131 veya Power Point sunumlar\u0131. Ortalama bir \u015firket \u00e7al\u0131\u015fan\u0131 her g\u00fcn vaktini bu tarz dosyalarla harc\u0131yor.<\/p>\n<p>Bu sorunun ba\u015flang\u0131c\u0131 20 y\u0131l \u00f6ncesine dayan\u0131yor. Yani, en hafif tabirle, \u00e7\u00f6z\u00fcm zaman a\u015f\u0131m\u0131na u\u011frad\u0131. Ge\u00e7ti\u011fimiz \u015eubat ay\u0131nda Microsoft, internetten indirilen belgelerde makrolar\u0131n \u00e7al\u0131\u015fmas\u0131n\u0131 engelleyece\u011fini duyurdu. Ancak, Temmuz ay\u0131 ba\u015flar\u0131nda, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-rolls-back-decision-to-block-office-macros-by-default\/\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft Office kullan\u0131c\u0131lar\u0131<\/a>, Microsoft\u2019un bu engelleme karar\u0131ndan geri \u00e7ekildi\u011fini fark etti. Bir Microsoft s\u00f6zc\u00fcs\u00fc, karar\u0131n ge\u00e7ici ve \u201cgeri bildirime dayal\u0131\u201d oldu\u011funu belirtse de, \u015firket bu kararla ilgili hen\u00fcz resmi bir a\u00e7\u0131klama yapmad\u0131. Ne olursa olsun, makrolar\u0131n ne oldu\u011funu, kurumsal siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan ne \u00e7e\u015fit tehditler olu\u015fturabileceklerini ve bu tehditlere kar\u015f\u0131 korunma y\u00f6ntemlerini hat\u0131rlamak i\u00e7in iyi bir zaman.<\/p>\n<h2>Makro nedir ve neden tehlikelidir?<\/h2>\n<p>Microsoft Office kullan\u0131c\u0131lar\u0131 genellikle bir\u00e7ok i\u015flemi otomatikle\u015ftirir. Bunun i\u00e7in de, makro olarak bilinen belirli bir algoritmay\u0131 veya eylem dizisini yazars\u0131n\u0131z. Basit bir \u00f6rnek: Bir muhasebeci, her ay standart bir rapor haz\u0131rl\u0131yor. Zaman kazanmak ad\u0131na, ikinci s\u00fctundaki m\u00fc\u015fteri adlar\u0131n\u0131n otomatik olarak kal\u0131n harfler ile \u00f6ne \u00e7\u0131kmas\u0131 i\u00e7in bir makro yaz\u0131yor.<\/p>\n<p>Makrolar, k\u0131smen basitle\u015ftirilmi\u015f, fakat bir programlama dili olan VBA\u2019da (Visual Basic for Applications) yaz\u0131l\u0131yor. Her zaman oldu\u011fu gibi, sald\u0131rganlar bunu kendi ama\u00e7lar\u0131 i\u00e7in kullanabilirler.<\/p>\n<p>\u015eunu belirtmekte fayda var: Makrolar\u0131n ne oldu\u011funa a\u015fina olmak, Office Suite hakk\u0131nda derin bir bilgi birikimine sahip olmak demek. Ancak, \u00f6zge\u00e7mi\u015flerinde ne yazarsa yazs\u0131n, t\u00fcm \u00e7al\u0131\u015fanlar\u0131n sahip olmad\u0131\u011f\u0131 bir bilgi birikimi bu. Baz\u0131lar\u0131 makrolar\u0131n varl\u0131\u011f\u0131ndan haberdar bile de\u011fil. Ancak siber su\u00e7lular, makrolar\u0131, rutin i\u015fleri otomatikle\u015ftirmek i\u00e7in zarars\u0131z algoritmalar \u00fcretmek yerine k\u00f6t\u00fc niyetli komutlar olu\u015fturmak i\u00e7in kullan\u0131yor.<\/p>\n<h2>Nas\u0131l \u00e7al\u0131\u015f\u0131yorlar?<\/h2>\n<p>Genellikle bir \u015firkete y\u00f6nelik sald\u0131r\u0131, \u00e7al\u0131\u015fanlara k\u00f6t\u00fc niyetli toplu e-postalar\u0131n g\u00f6nderilmesiyle ba\u015flar. Bu e-posta i\u00e7erikleri; i\u015f teklifleri, \u015firket haberleri, y\u00fcklenici faturalar\u0131, rakipler hakk\u0131nda \u00e7e\u015fitli bilgiler gibi g\u00f6r\u00fcnebilir. Sald\u0131r\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131n\u0131, sadece sald\u0131rganlar\u0131n hayal g\u00fcc\u00fc belirler. Temel ama\u00e7, al\u0131c\u0131n\u0131n ekteki dosyay\u0131 a\u00e7mas\u0131n\u0131 sa\u011flamak ya da verilen ba\u011flant\u0131ya t\u0131klay\u0131p ard\u0131ndan belgeyi indirerek onu a\u00e7mas\u0131n\u0131 sa\u011flamak.<\/p>\n<p>Siber su\u00e7lular\u0131n ihtiyac\u0131 olan, dosyadaki zararl\u0131 makronun bir \u015fekilde \u00e7al\u0131\u015ft\u0131r\u0131lmas\u0131. G\u00f6m\u00fcl\u00fc makrolar \u00f6nceden otomatik \u00e7al\u0131\u015f\u0131rd\u0131. Ancak Microsoft bu i\u015fleve s\u0131n\u0131rland\u0131rma getirdi. \u015eimdi ise, kullan\u0131c\u0131 internetten bir dosya indirdi\u011finde makrolar\u0131n devre d\u0131\u015f\u0131 b\u0131rak\u0131ld\u0131\u011f\u0131 konusunda bilgilendiriliyor.<\/p>\n<div id=\"attachment_10854\" style=\"width: 843px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10854\" class=\"wp-image-10854 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/07\/19181642\/macros-microsoft-2022-security-warning.png\" alt=\"\" width=\"833\" height=\"72\"><p id=\"caption-attachment-10854\" class=\"wp-caption-text\">G\u00fcvenlik uyar\u0131s\u0131 \u201cMakrolar devre d\u0131\u015f\u0131 b\u0131rak\u0131ld\u0131\u201d.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>\u015eimdi t\u00fcm sorunlar \u00e7\u00f6z\u00fcld\u00fc, de\u011fil mi? Tam olarak \u00f6yle denemez. \u00c7o\u011fu kullan\u0131c\u0131, \u0130\u00e7eri\u011fi Etkinle\u015ftir\u2019e d\u00fc\u015f\u00fcnmeden t\u0131klay\u0131p bahsi ge\u00e7en makrolar\u0131n otomatik y\u00fcr\u00fct\u00fclmesine izin veriyor. Bu da k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara \u201cho\u015f geldiniz\u201d demek. Genellikle sald\u0131rganlar da hedef \u015firketin altyap\u0131s\u0131na bu y\u00f6ntemle eri\u015fim sa\u011fl\u0131yor. Ayr\u0131ca, yukar\u0131da da de\u011finildi\u011fi gibi, \u00e7o\u011fu \u00e7al\u0131\u015fan, \u0130\u00e7eri\u011fi Etkinle\u015ftir\u2019e yapt\u0131\u011f\u0131 masum bir t\u0131klamadan sonra ortaya \u00e7\u0131kabilecek sorunlar hakk\u0131nda bir fikre sahip de\u011fil.<\/p>\n<p>Microsoft nihayet verilebilecek tek do\u011fru karar\u0131 verdi: Kullan\u0131c\u0131ya bir se\u00e7enek vermek yerine, indirilen dosyalarda varsay\u0131lan olarak makrolar\u0131 engellemek. Bu iyi haber kar\u015f\u0131s\u0131nda, t\u00fcm bilgi g\u00fcvenli\u011fi uzmanlar\u0131n\u0131n y\u00fcz\u00fc g\u00fcld\u00fc. Yenilik, bu y\u0131l Nisan ay\u0131n\u0131n ba\u015flar\u0131nda hayata ge\u00e7irildi. Kullan\u0131c\u0131lar, bir buton yerine, makrolar\u0131n tehlikeleri konusunda bilgilendirme yapan bir <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/a-potentially-dangerous-macro-has-been-blocked-0952faa0-37e7-4316-b61d-5b5ed6024216\" target=\"_blank\" rel=\"noopener nofollow\">g\u00f6nderi<\/a>nin ba\u011flant\u0131s\u0131n\u0131 i\u00e7eren bir g\u00fcvenlik uyar\u0131s\u0131yla kar\u015f\u0131la\u015ft\u0131. Ancak bu sevin\u00e7 k\u0131sa s\u00fcrd\u00fc ve de\u011fi\u015fiklik k\u0131sa bir s\u00fcre sonra geri al\u0131nd\u0131.<\/p>\n<h2>Kendinizi nas\u0131l koruyabilirsiniz?<\/h2>\n<p>B\u00fcy\u00fck \u015firketlerin BT y\u00f6neticileri, g\u00fcvenlik politikas\u0131 d\u00fczeyinde makrolar\u0131 devre d\u0131\u015f\u0131 b\u0131rakma yetkisine sahip. Dolay\u0131s\u0131yla, i\u015f ak\u0131\u015flar\u0131n\u0131zda makro kullanman\u0131z gerekmiyorsa, size de devre d\u0131\u015f\u0131 b\u0131rakman\u0131z\u0131 \u00f6neriyoruz. B\u00f6ylece, belgeyi makro ile a\u00e7an ba\u015fka bir kullan\u0131c\u0131 farkl\u0131 bir uyar\u0131 g\u00f6recek:<\/p>\n<div id=\"attachment_10855\" style=\"width: 783px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10855\" class=\"wp-image-10855 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/07\/19181713\/macros-microsoft-2022-blocked-content.png\" alt=\"\" width=\"773\" height=\"64\"><p id=\"caption-attachment-10855\" class=\"wp-caption-text\">MS Word bildirimi \u201cmakrolar y\u00f6neticiniz taraf\u0131ndan devre d\u0131\u015f\u0131 b\u0131rak\u0131ld\u0131\u201d.<\/p><\/div>\n<p>\u00a0<\/p>\n<p>Herhangi bir nedenle bu se\u00e7ene\u011fi kullanam\u0131yorsan\u0131z, Microsoft indirilen dosyalarda varsay\u0131lan makro engellemeyi yeniden etkinle\u015ftirene kadar, t\u00fcm i\u015f cihazlar\u0131n\u0131, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> ile korumak b\u00fcy\u00fck \u00f6nem ta\u015f\u0131yor. Ayr\u0131ca, t\u00fcm \u015firket \u00e7al\u0131\u015fanlar\u0131na, siber g\u00fcvenli\u011fin temel noktalar\u0131 hakk\u0131nda, \u00f6zellikle a\u015fa\u011f\u0131da belirtilen ana konulara odaklanarak e\u011fitim verilmesini \u00f6neriyoruz:<\/p>\n<ul>\n<li>G\u00fcvendi\u011finiz bir ki\u015fi veya i\u015fletme taraf\u0131ndan g\u00f6nderilmi\u015f gibi g\u00f6r\u00fcnse bile, beklemedi\u011finiz dosyalar\u0131 kesinlikle indirmeyin ve a\u00e7may\u0131n. Doland\u0131r\u0131c\u0131lar taraf\u0131ndan g\u00f6nderilmi\u015f olabilirler.<\/li>\n<li>\u0130nternetten indirdi\u011finiz veya e-posta ile gelen dosyalarda, i\u00e7eri\u011fi etkinle\u015ftirmeden \u00f6nce her zaman d\u00fc\u015f\u00fcn\u00fcn. Normal i\u00e7erik g\u00f6r\u00fcnt\u00fcleme s\u00f6z konusuysa, buna gerek yok.<\/li>\n<li>E-postada veya internet sitesinde bir ki\u015fi, i\u00e7eri\u011fi etkinle\u015ftirmenizi isterse, \u00f6zellikle tetikte olun.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Microsoft, makrolar\u0131 varsay\u0131lan olarak engelleme karar\u0131n\u0131 geri \u00e7ekiyor. Siber g\u00fcvenlik a\u00e7\u0131s\u0131ndan \u015firketlerin kar\u015f\u0131la\u015fabileceklerini tart\u0131\u015f\u0131yoruz.<\/p>\n","protected":false},"author":2684,"featured_media":10856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[728,2448,2564],"class_list":{"0":"post-10853","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-kotu-amacli-yazilim","11":"tag-makrolar","12":"tag-microsoft-office"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/macros-microsoft-2022\/10853\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/macros-microsoft-2022\/24369\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/macros-microsoft-2022\/19835\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/macros-microsoft-2022\/10017\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/macros-microsoft-2022\/26758\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/macros-microsoft-2022\/24668\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/macros-microsoft-2022\/25071\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/macros-microsoft-2022\/27412\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/macros-microsoft-2022\/33519\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/macros-microsoft-2022\/44877\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/macros-microsoft-2022\/19185\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/macros-microsoft-2022\/19746\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/macros-microsoft-2022\/29055\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/macros-microsoft-2022\/25240\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/macros-microsoft-2022\/30734\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/macros-microsoft-2022\/30481\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/makrolar\/","name":"makrolar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2684"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10853"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10853\/revisions"}],"predecessor-version":[{"id":10858,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10853\/revisions\/10858"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10856"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}