{"id":10878,"date":"2022-07-29T13:10:36","date_gmt":"2022-07-29T10:10:36","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10878"},"modified":"2022-07-29T13:10:36","modified_gmt":"2022-07-29T10:10:36","slug":"phishing-stamp-verified","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-stamp-verified\/10878\/","title":{"rendered":"Kimlik av\u0131 kokuyor: g\u00fcvenli i\u015faretlenmi\u015f e-postalar"},"content":{"rendered":"<p>Kimlik av\u0131 e-postalar\u0131 veya k\u00f6t\u00fc ama\u00e7l\u0131 ekler g\u00f6nderirken, doland\u0131r\u0131c\u0131lar, bir ba\u011flant\u0131ya t\u0131klaman\u0131z veya bir dosyay\u0131 a\u00e7man\u0131z i\u00e7in bir\u00e7ok hileye ba\u015fvurur. Ba\u011flant\u0131n\u0131n veya ekte g\u00f6nderilen dosyan\u0131n g\u00fcvenilir oldu\u011funu g\u00f6steren her t\u00fcrl\u00fc i\u015fareti eklemek, bu hilelerden biri.<\/p>\n<p>Kula\u011fa aptalca gelse de i\u015fe yarayan bir yakla\u015f\u0131m. Bilgi g\u00fcvenli\u011finde uzman biri buna kanmayabilir, ancak BT konusunda g\u00f6rece daha az bilgisi olan bir \u00e7al\u0131\u015fan tuza\u011fa d\u00fc\u015febilir. Bu y\u00fczden, bilgi g\u00fcvenli\u011fi y\u00f6neticilerinin, \u00e7al\u0131\u015fanlar\u0131na zaman zaman belli ba\u015fl\u0131 siber su\u00e7lu hilelerini bile hat\u0131rlatmalar\u0131n\u0131 \u00f6neriyoruz.<\/p>\n<h2>\u201cDo\u011fruland\u0131\u201d i\u015faretleri nas\u0131l g\u00f6r\u00fcn\u00fcr?<\/h2>\n<p>Elbette bunlardan tek bir tane yok. Her sald\u0131rgan\u0131nki farkl\u0131. Farkl\u0131 \u00f6rneklerle kar\u015f\u0131la\u015ft\u0131k, ancak bunlar\u0131n bir\u00e7o\u011fu a\u015fa\u011f\u0131daki temalar\u0131n \u00e7e\u015fitli versiyonlar\u0131:<\/p>\n<ul>\n<li>Ekli dosya, bir antivir\u00fcs program\u0131 taraf\u0131ndan taranm\u0131\u015ft\u0131r (bazen alt\u0131nda bir logo olur).<\/li>\n<li>G\u00f6nderen, g\u00fcvenilir g\u00f6nderenler listesinde.<\/li>\n<li>T\u00fcm ba\u011flant\u0131lar, bir kimlik av\u0131 \u00f6nleme motoru taraf\u0131ndan tarand\u0131.<\/li>\n<li>Tehdit bulunamad\u0131.<\/li>\n<\/ul>\n<p>Al\u0131c\u0131n\u0131n ba\u011flant\u0131ya t\u0131klamas\u0131n\u0131 sa\u011flay\u0131p kand\u0131rarak Office 365 kimlik bilgilerini girmesi i\u00e7in destek personeli gibi davranan sald\u0131rganlar\u0131n g\u00f6nderdi\u011fi bir kimlik av\u0131 e-postas\u0131 \u00f6rne\u011fi. E-postay\u0131 daha inand\u0131r\u0131c\u0131 k\u0131lmak i\u00e7in, g\u00f6nderenin do\u011fruland\u0131\u011f\u0131n\u0131 iddia ediyor.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-10880\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/07\/22144249\/phishing-stamp-verified-letter-1024x706.png\" alt=\"\" width=\"1024\" height=\"706\"><\/p>\n<p>Ancak bu durumda, \u201cBu g\u00f6nderen, [\u015firket ad\u0131] g\u00fcvenilir g\u00f6nderenler listesinde ve do\u011fruland\u0131\u201d i\u015fareti bir tehlikeye i\u015faret ediyor olmal\u0131.<\/p>\n<h2>G\u00fcvenli olarak i\u015faretlenmi\u015f bir e-postaya nas\u0131l tepki verilir<\/h2>\n<p>Genelde kimlik av\u0131 veya k\u00f6t\u00fc ama\u00e7l\u0131 e-postalar, h\u0131zl\u0131 yan\u0131t gerektirse de (yukar\u0131daki \u00f6rnekte, i\u015f e-postas\u0131na eri\u015fim kaybetme tehlikesi) kesinlikle h\u0131zl\u0131 yan\u0131t vermemelisiniz. \u0130lk olarak, kendinize \u015fu sorular\u0131 sorun:<\/p>\n<ul>\n<li>Bu i\u015faretle daha \u00f6nce kar\u015f\u0131la\u015fm\u0131\u015f m\u0131yd\u0131n\u0131z? \u015eirkette hen\u00fcz bir haftad\u0131r \u00e7al\u0131\u015f\u0131yorsan\u0131z, muhtemelen bu ald\u0131\u011f\u0131n\u0131z ilk e-posta de\u011fil.<\/li>\n<li>\u0130\u015f arkada\u015flar\u0131n\u0131zdan herhangi biri i\u015f e-postalar\u0131nda b\u00f6yle bir i\u015faretle kar\u015f\u0131la\u015ft\u0131 m\u0131? \u015e\u00fcpheleniyorsan\u0131z, daha deneyimli bir i\u015f arkada\u015f\u0131n\u0131za veya BT \u00e7al\u0131\u015fan\u0131na sormak daha mant\u0131kl\u0131.<\/li>\n<li>\u0130\u015faret, e-posta i\u00e7eri\u011fine uygun mu? Elbette, bazen \u201cDosya tarand\u0131\u201d veya \u201cBa\u011flant\u0131 tarand\u0131\u201d i\u015fareti bir anlam ta\u015f\u0131yor. Ancak g\u00f6nderen ki\u015fiyle ayn\u0131 \u015firkette \u00e7al\u0131\u015f\u0131yorsan\u0131z, ki\u015finin kurumsal e-posta adresi nas\u0131l g\u00fcvenilir g\u00f6nderenler listesinde bulunmaz?<\/li>\n<\/ul>\n<p>Asl\u0131nda, g\u00fcn\u00fcm\u00fczdeki e-posta filtreleri tam tersi \u015fekilde \u00e7al\u0131\u015f\u0131yor: tehdit bulunamayanlar\u0131 de\u011fil, potansiyel olarak tehlikeli e-postalar\u0131 i\u015faretliyorlar. E-postalar, tehlikeli bir ba\u011flant\u0131n\u0131n veya ekin kald\u0131r\u0131ld\u0131\u011f\u0131n\u0131, istenmeyen posta ya da kimlik av\u0131 olabilece\u011fini belirtmek i\u00e7in i\u015faretlenir. Office 365\u2019te Outlook\u2019tan bahsediyorsak, bu t\u00fcr i\u015faretler genellikle e-posta metninde de\u011fil, \u00f6zel alanlarda g\u00f6r\u00fcl\u00fcr. Bunun yan\u0131 s\u0131ra, b\u00f6yle \u2011e-postalar s\u0131k s\u0131k, al\u0131c\u0131s\u0131na ula\u015fmadan ya da gereksiz klas\u00f6r\u00fcne d\u00fc\u015fmeden \u00f6nce silinir. G\u00fcvenli iletileri i\u015faretlemek i\u015fe yaramaz.<\/p>\n<p>Bu yakla\u015f\u0131m, \u00f6nceden \u00fccretsiz e-posta hizmetlerinde tercih ediliyordu. Ancak her zaman i\u00e7in ama\u00e7, rekabet \u00fcst\u00fcnl\u00fc\u011f\u00fcn\u00fc vurgulamakt\u0131: yerle\u015fik bir filtre veya antivir\u00fcs motoru.<\/p>\n<h2>Kendinizi ve \u015firketinizi koruman\u0131n yollar\u0131<\/h2>\n<p>Bir kez daha, i\u015f arkada\u015flar\u0131n\u0131z\u0131, zaman zaman siber su\u00e7lu hileleri hakk\u0131nda bilgilendirmenizi \u00f6neriyoruz (mesela, onlara bu g\u00f6nderinin ba\u011flant\u0131s\u0131n\u0131 g\u00f6nderebilirsiniz). Daha g\u00fc\u00e7l\u00fc bir koruma i\u00e7in <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00f6zel hizmetler<\/a> yard\u0131m\u0131yla i\u015f arkada\u015flar\u0131n\u0131z\u0131n siber tehdit fark\u0131ndal\u0131\u011f\u0131n\u0131 art\u0131rmak iyi bir fikir.<\/p>\n<p>Bir e-posta ekinin olas\u0131 t\u00fcm siber tehditlere kar\u015f\u0131 tarand\u0131\u011f\u0131n\u0131, e-posta g\u00f6vdesinde herhangi bir i\u015faret olmadan belirtmek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/mail-server?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">posta a\u011f ge\u00e7idi korumas\u0131<\/a> veya <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/microsoft-office-365-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener\">Office 365 i\u00e7in \u00f6zel g\u00fcvenlik \u00e7\u00f6z\u00fcmlerini<\/a> kullanman\u0131z\u0131 \u00f6neriyoruz. G\u00fcvenilir bir kimlik av\u0131 \u00f6nleme motoruyla, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">\u00e7al\u0131\u015fma yerinde<\/a> koruma sa\u011flamak da zarar vermez.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Do\u011fruland\u0131&#8221; i\u015fareti bulunan i\u015f e-postalar\u0131 s\u00f6z konusuysa tehlike \u00e7anlar\u0131 \u00e7almal\u0131. <\/p>\n","protected":false},"author":2598,"featured_media":10879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1921,1074,2566],"class_list":{"0":"post-10878","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-e-posta","11":"tag-kimlik-avi","12":"tag-kimlik-avi-dolandiriciligi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-stamp-verified\/10878\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-stamp-verified\/24396\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-stamp-verified\/19862\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-stamp-verified\/26789\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-stamp-verified\/24696\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-stamp-verified\/25091\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-stamp-verified\/27439\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-stamp-verified\/27107\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-stamp-verified\/33574\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-stamp-verified\/44907\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-stamp-verified\/19211\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-stamp-verified\/19770\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/phishing-stamp-verified\/28380\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-stamp-verified\/25290\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-stamp-verified\/30761\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-stamp-verified\/30508\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10878"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10878\/revisions"}],"predecessor-version":[{"id":10881,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10878\/revisions\/10881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10879"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}