{"id":10890,"date":"2022-07-29T13:32:37","date_gmt":"2022-07-29T10:32:37","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10890"},"modified":"2022-07-29T13:32:37","modified_gmt":"2022-07-29T10:32:37","slug":"social-engineering-extortion","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/social-engineering-extortion\/10890\/","title":{"rendered":"K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131ms\u0131z siber sald\u0131r\u0131lar"},"content":{"rendered":"<p>Her \u015firket siber tehditlere kar\u015f\u0131 g\u00fcvenilir bir korumaya ihtiya\u00e7 duyar, ancak antivir\u00fcs yaz\u0131l\u0131mlar\u0131n\u0131n her derde deva olmad\u0131\u011f\u0131n\u0131 da unutmamal\u0131y\u0131z. \u015eirketlere y\u00f6nelik sald\u0131r\u0131lar\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011fu insan hatas\u0131ndan kaynaklan\u0131r. \u00d6rne\u011fin, bir \u00e7al\u0131\u015fan k\u00f6t\u00fc ama\u00e7l\u0131 bir ba\u011flant\u0131ya t\u0131klar, bir makroyu etkinle\u015ftirir veye vir\u00fcsl\u00fc bir dosya indirir. Baz\u0131 durumlarda siber su\u00e7lular\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kullanmas\u0131 bile gerekmez. Bir \u015firketin altyap\u0131s\u0131na yaln\u0131zca sosyal m\u00fchendislik ve yasal yaz\u0131l\u0131m \u00e7\u00f6z\u00fcmleri kullanarak da eri\u015fim elde etmeyi ba\u015farabilirler. \u0130\u015fte birka\u00e7 \u00f6rnek.<\/p>\n<h2>Fidye yaz\u0131l\u0131m\u0131 olmadan fidye istemek<\/h2>\n<p>K\u0131sa s\u00fcre \u00f6nce kurumsal veri \u00e7alarak \u015fantaj yapma konusunda uzmanla\u015fan Luna Moth grubunun faaliyetleri hakk\u0131nda baz\u0131 <a href=\"https:\/\/newsboardforme.com\/luna-moth-group-demands-data-without-ransomware\/45169\/\" target=\"_blank\" rel=\"noopener nofollow\">haberler<\/a> \u00e7\u0131kt\u0131. Luna Moth\u2019un benzersiz yan\u0131, bilgileri k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kullanmadan ele ge\u00e7irmeleri.<\/p>\n<p>Bir \u015firkete y\u00f6nelik sald\u0131r\u0131, tipik bir doland\u0131r\u0131c\u0131l\u0131k e-postas\u0131yla ba\u015fl\u0131yor. Su\u00e7lular \u00e7evrimi\u00e7i bir servisin temsilcileri gibi davranarak al\u0131c\u0131lar\u0131 bir aboneli\u011fe imza att\u0131klar\u0131na ve \u00f6demenin ertesi g\u00fcn \u00e7ekilece\u011fine inand\u0131rmaya \u00e7al\u0131\u015f\u0131yor. \u00c7al\u0131\u015fan, \u00f6demeyi iptal etmek veya daha fazla bilgi almak isterse e-posta ekindeki dosyada bulunan bir telefon numaras\u0131n\u0131 aramas\u0131 gerekiyor.<\/p>\n<p>\u0130\u015fler burada sarpa saracak gibi duruyor, de\u011fil mi? Ama hay\u0131r, beklenenin aksine dosya k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7ermiyor, dolay\u0131s\u0131yla antivir\u00fcs yaz\u0131l\u0131m\u0131 kullan\u0131c\u0131n\u0131n dosyay\u0131 a\u00e7mas\u0131na b\u00fcy\u00fck olas\u0131l\u0131kla izin veriyor. Burada su\u00e7lular\u0131n i\u015fi yaln\u0131zca \u00e7al\u0131\u015fan\u0131n numaray\u0131 aramas\u0131n\u0131 sa\u011flamak.<\/p>\n<p>Ba\u015far\u0131l\u0131 olurlarsa kurban\u0131 cihaz\u0131na bir <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/rat-remote-access-tools\/\" target=\"_blank\" rel=\"noopener\">uzaktan eri\u015fim arac\u0131<\/a> (RAT) kurmaya ikna ediyorlar, bunu b\u00fcy\u00fck olas\u0131l\u0131kla kafas\u0131 kar\u0131\u015fm\u0131\u015f kullan\u0131c\u0131n\u0131n aboneli\u011fi iptal etmesine yard\u0131mc\u0131 olma kisvesi alt\u0131nda yap\u0131yorlar. Teknik olarak RAT\u2019ler k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar de\u011fil, bu y\u00fczden antivir\u00fcslerin \u00e7o\u011fu bunlar\u0131 engellemiyor ve yaln\u0131zca baz\u0131lar\u0131 kullan\u0131c\u0131lar\u0131 potansiyel tehlikeler hakk\u0131nda uyar\u0131yor. Bunun sonucunda su\u00e7lular cihaza uzaktan eri\u015fim sa\u011fl\u0131yor ve cihaz \u00fczerinde kontrol sahibi oluyor.<\/p>\n<p>Bir\u00e7ok \u00f6rnekte doland\u0131r\u0131c\u0131lar\u0131n cihaza birden fazla RAT y\u00fckledi\u011fini de belirtelim. Dolay\u0131s\u0131yla i\u00e7lerinden biri kald\u0131r\u0131lsa bile kontrol\u00fc ellerinde tutmak ve kald\u0131r\u0131lan RAT\u2019i tekrar y\u00fcklemek i\u00e7in bir ba\u015fkas\u0131n\u0131 kullanabiliyorlar. Su\u00e7lular kurban\u0131n bilgisayar\u0131n\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irdikten sonra genellikle altyap\u0131ya daha fazla s\u0131zmak, daha fazla kayna\u011fa eri\u015fmek ve veri s\u0131zd\u0131rmak i\u00e7in ba\u015fka ara\u00e7lar da y\u00fckl\u00fcyor.<\/p>\n<h2>\u015eirket d\u00fczeyinde telefon doland\u0131r\u0131c\u0131l\u0131\u011f\u0131<\/h2>\n<p>Amerikan telekom\u00fcnikasyon \u015firketi Verizon k\u0131sa s\u00fcre \u00f6nce daha da sa\u00e7ma bir \u015fantaj oyununun <a href=\"https:\/\/www.vice.com\/en\/article\/wxdwxn\/hacker-steals-database-of-hundreds-of-verizon-employees\" target=\"_blank\" rel=\"noopener nofollow\">kurban\u0131 oldu<\/a>. Anonim bir hacker, Motherboard\u2019a sadece kendisini \u015firket i\u00e7i teknik destek ekibinin bir \u00fcyesi olarak tan\u0131tarak Verizon \u00e7al\u0131\u015fanlar\u0131ndan birini kendisine bir \u015firket bilgisayar\u0131na uzaktan eri\u015fim vermeye ikna etti\u011fini anlatt\u0131. S\u00f6yledi\u011fine g\u00f6re bilgisayarda \u00e7al\u0131\u015fan bilgilerini i\u015flemeye y\u00f6nelik \u015firket i\u00e7i bir arac\u0131 \u00e7al\u0131\u015ft\u0131rm\u0131\u015f ve \u00f6zel bir kod kullanarak y\u00fczlerce ki\u015finin ad\u0131n\u0131 soyad\u0131n\u0131, e-posta adresini, \u015firket kimliklerini ve telefon numaralar\u0131n\u0131 i\u00e7eren bir veri taban\u0131 olu\u015fturmu\u015ftu.<\/p>\n<p>Verizon hacker\u2019\u0131n \u015firketle ileti\u015fime ge\u00e7erek 250.000 USD istedi\u011fini ve \u00e7al\u0131nan verileri yay\u0131nlamakla tehdit etti\u011fini do\u011frulad\u0131, ancak \u00f6nem ta\u015f\u0131yan bilgiler ele ge\u00e7irmeyi ba\u015fard\u0131\u011f\u0131n\u0131 reddetti. \u00d6te yandan Motherboard\u2019da \u00e7al\u0131\u015fan gazeteciler, bilgileri veri taban\u0131nda bulunan ki\u015filerden baz\u0131lar\u0131yla temas kurdu. Bunlardan bir k\u0131sm\u0131 cevap verdi ve isimlerini, e-posta adreslerini ve Verizon\u2019da \u00e7al\u0131\u015ft\u0131klar\u0131n\u0131 do\u011frulad\u0131.<\/p>\n<h2>Bu hikayeden ne ders \u00e7\u0131karmal\u0131y\u0131z?<\/h2>\n<p>Hikayeden \u00e7\u0131kar\u0131lmas\u0131 gereken ders basit: \u015eirketiniz en son teknoloji \u00fcr\u00fcn\u00fc g\u00fcvenlik \u00fcr\u00fcnlerine sahip olsa da \u00e7al\u0131\u015fanlar bu t\u00fcr sosyal m\u00fchendislik sald\u0131r\u0131lar\u0131na kar\u015f\u0131 haz\u0131r de\u011filse verileriniz g\u00fcvende de\u011fil demektir. Bu y\u00fczden, eksiksiz bir siber g\u00fcvenlik stratejisi yaln\u0131zca teknik g\u00fcvenlik ara\u00e7lar\u0131n\u0131 y\u00fcklemeyi de\u011fil, ayn\u0131 zamanda en yeni siber tehditler ve siber su\u00e7lular\u0131n oyunlar\u0131 hakk\u0131nda \u00e7al\u0131\u015fanlar\u0131n fark\u0131ndal\u0131\u011f\u0131n\u0131 artt\u0131rmay\u0131 da kapsar. Bunun i\u00e7in \u00f6rne\u011fin <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00e7evrimi\u00e7i bir e\u011fitim platformu<\/a> kullanabilirsiniz.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kullanmadan \u015firketlere nas\u0131l sald\u0131r\u0131yor<\/p>\n","protected":false},"author":2684,"featured_media":10891,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1763,1753,648,1660],"class_list":{"0":"post-10890","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-fidye-yazilimlari","10":"tag-rat","11":"tag-siber-tehditler","12":"tag-sosyal-muhendislik"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/social-engineering-extortion\/10890\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/social-engineering-extortion\/24407\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/social-engineering-extortion\/19873\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/social-engineering-extortion\/26802\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/social-engineering-extortion\/24708\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/social-engineering-extortion\/25103\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/social-engineering-extortion\/27449\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/social-engineering-extortion\/27115\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/social-engineering-extortion\/33579\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/social-engineering-extortion\/44912\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/social-engineering-extortion\/19228\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/social-engineering-extortion\/19782\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/social-engineering-extortion\/29080\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/social-engineering-extortion\/32572\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/social-engineering-extortion\/25297\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/social-engineering-extortion\/30773\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/social-engineering-extortion\/30519\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/sosyal-muhendislik\/","name":"sosyal m\u00fchendislik"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2684"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10890"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10890\/revisions"}],"predecessor-version":[{"id":10892,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10890\/revisions\/10892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10891"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}