{"id":10916,"date":"2022-08-10T10:50:34","date_gmt":"2022-08-10T07:50:34","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=10916"},"modified":"2022-08-10T10:50:34","modified_gmt":"2022-08-10T07:50:34","slug":"cybersecurity-history-iloveyou","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cybersecurity-history-iloveyou\/10916\/","title":{"rendered":"ILOVEYOU: Herkesi seven vir\u00fcs"},"content":{"rendered":"<p>2000 y\u0131l\u0131n\u0131n May\u0131s ay\u0131na do\u011fru bir yolculu\u011fa \u00e7\u0131kal\u0131m. Ofiste s\u0131radan bir g\u00fcn. \u0130\u015f bilgisayar\u0131n\u0131z\u0131 a\u00e7\u0131yor, internete ba\u011flan\u0131yor ve Microsoft Outlook istemcisindeki son gelen e-postay\u0131 indiriyorsunuz. Konu sat\u0131r\u0131nda tuhaf bir mesaj dikkatinizi \u00e7ekiyor: \u201cILOVEYOU.\u201d Tan\u0131d\u0131\u011f\u0131n\u0131z biri size olan a\u015fk\u0131n\u0131 itiraf ediyor. Belki okuldan bir arkada\u015f\u0131n\u0131z. Bir dakika, hay\u0131r! Daha da iyisi; ya\u015f\u00e7a sizden b\u00fcy\u00fck m\u00fcd\u00fcr\u00fcn\u00fcz.<\/p>\n<p>Kim olursa olsun kesinlikle dikkatinizi \u00e7ekecek biri, dolay\u0131s\u0131yla ekteki \u201cLOVE-LETTER-FOR-YOU.TXT.VBS\u201d adl\u0131 dosyaya t\u0131kl\u0131yorsunuz ve\u2026 Hi\u00e7bir \u015fey olmuyor. Ancak bir s\u00fcre sonra sabit diskinizdeki \u00f6nemli dosyalar\u0131n onar\u0131lmaz \u015fekilde bozuldu\u011funu ve adres defterinizdeki herkese sizin ad\u0131n\u0131za benzer a\u015fk mektuplar\u0131 g\u00f6nderildi\u011fini fark ediyorsunuz.<\/p>\n<div id=\"attachment_10918\" style=\"width: 490px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10918\" class=\"wp-image-10918 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/08\/10102533\/cybersecurity-history-iloveyou-1.png\" alt=\"ILOVEYOU solucan\u0131 i\u00e7eren bir mesaj \u00f6rne\u011fi\" width=\"480\" height=\"294\"><p id=\"caption-attachment-10918\" class=\"wp-caption-text\">Eski Microsoft e-posta istemcisinde ILOVEYOU solucan\u0131 i\u00e7eren bir e-posta b\u00f6yle g\u00f6r\u00fcn\u00fcyordu. <a>Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<p>ILOVEYOU, Microsoft e-posta istemcisindeki bir deli\u011fi k\u00f6t\u00fcye kullanan ilk k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m olmasa da kesinlikle yeni milenyumun ba\u015f\u0131ndaki en ciddi vir\u00fcs salg\u0131nlar\u0131ndan birini ba\u015flatt\u0131. Gelin birlikte tarih\u00e7esine bakal\u0131m ve bilgisayar sistemi g\u00fcvenli\u011fi alg\u0131m\u0131z\u0131 nas\u0131l de\u011fi\u015ftirdi\u011fini konu\u015fal\u0131m.<\/p>\n<h2>Ba\u011flam: \u0130nternet en son trend teknoloji<\/h2>\n<p>Y\u0131l, 2000. 2022\u2019den bak\u0131ld\u0131\u011f\u0131nda neredeyse tarih \u00f6ncesi zamanlar gibi geliyor. G\u00fcn\u00fcm\u00fczde o zamanlardaki web sitelerinin ar\u015fivlenmi\u015f kopyalar\u0131na bakabilir veya dolaptan eski Windows 98 diz\u00fcst\u00fc bilgisayar\u0131n\u0131z\u0131 \u00e7\u0131kar\u0131p o g\u00fcnlerde hangi programlar\u0131 kulland\u0131\u011f\u0131m\u0131z\u0131 hat\u0131rlayabilirsiniz. Ta\u015f devri gibi, de\u011fil mi? Asl\u0131na bakarsan\u0131z de\u011fil. Elbette milenyumun ba\u015f\u0131ndaki teknoloji g\u00fcn\u00fcm\u00fcz standartlar\u0131na g\u00f6re daha ilkeldi. Kullan\u0131c\u0131lar\u0131n \u00e7o\u011fu internete modemle ba\u011flan\u0131yordu ve internet h\u0131z\u0131 korkun\u00e7 derecede yava\u015ft\u0131. Fakat neredeyse t\u00fcm modern a\u011f hizmetlerinin prototipleri o g\u00fcnlerde de mevcuttu.<\/p>\n<p>Video ak\u0131\u015f\u0131 yoktu ama radyo ak\u0131\u015f\u0131 vard\u0131. \u00c7ok \u00e7e\u015fitli \u00e7evrimi\u00e7i mesajla\u015fma uygulamalar\u0131 vard\u0131. Ma\u011fazay\u0131 telefonla aramak \u00e7o\u011funlukla bir web sitesinden sipari\u015f vermekten daha kolay olsa da \u00e7evrimi\u00e7i ticaret m\u00fcthi\u015f bir h\u0131zla geli\u015fiyordu.<\/p>\n<p>2000 y\u0131l\u0131nda genel olarak \u201ce-\u201d ile ba\u015flayan (yani, elektronik!) her t\u00fcrl\u00fc a\u011f teknolojisi veya servis b\u00fcy\u00fck ilgi ve yat\u0131r\u0131m topluyordu. 2001\u2019de bir\u00e7ok internet start-up\u2019\u0131 batt\u0131\u011f\u0131nda biraz hayal k\u0131r\u0131kl\u0131\u011f\u0131 ya\u015fand\u0131. Sekt\u00f6r yenilikten gelen heyecan\u0131n\u0131 kaybetti ama daha mant\u0131kl\u0131 hale geldi.<\/p>\n<p>O zamanlar internetin halihaz\u0131rda ne kadar yayg\u0131n oldu\u011funu anlamak i\u00e7in yar\u0131 romantik komedi, yar\u0131 o zamanlar\u0131n devi America Online\u2019\u0131n reklam\u0131 olan 1998 yap\u0131m\u0131 pop\u00fcler <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Mesaj%C4%B1n%C4%B1z_Var\" target=\"_blank\" rel=\"noopener nofollow\">Mesaj\u0131n\u0131z Var<\/a> filmine bakabiliriz.<\/p>\n<p>1990\u2019lar\u0131n sonunda internetin art\u0131k ayr\u0131cal\u0131kl\u0131 ki\u015filere \u00f6zg\u00fc bir yer olmad\u0131\u011f\u0131n\u0131 anlamak hikayemiz i\u00e7in \u00f6nemli. 2000 y\u0131l\u0131na <a href=\"https:\/\/www.pingdom.com\/blog\/incredible-growth-of-the-internet-since-2000\/\" target=\"_blank\" rel=\"noopener nofollow\">y\u00fcz milyonlarca<\/a> insan internete giriyordu. Hal b\u00f6yleyken e-posta hem bir\u00e7ok \u015firkette ve devlet kurumunda hem de s\u0131radan ev kullan\u0131c\u0131lar\u0131 taraf\u0131ndan kullan\u0131lan \u00f6nemli bir ileti\u015fim ve i\u015fbirli\u011fi arac\u0131 haline gelmi\u015fti.<\/p>\n<p>Fakat 2000\u2019in May\u0131s ay\u0131nda, \u00e7ok sonras\u0131nda pop\u00fclerle\u015fen deyimle bu \u201cdijital d\u00f6n\u00fc\u015f\u00fcm\u201d, ILOVEYOU vir\u00fcs\u00fc salg\u0131n\u0131yla aniden kesintiye u\u011frad\u0131. Bir\u00e7ok \u015firket, on binlerce a\u015fk mesaj\u0131yla ba\u015fa \u00e7\u0131kamayan e-posta sunucular\u0131n\u0131 ge\u00e7ici olarak kapatmak zorunda kald\u0131.<\/p>\n<h2>Bir \u00f6ncekiler: Concept.B ve Melissa<\/h2>\n<p>Esas\u0131nda ILOVEYOU bir <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/worm\/\" target=\"_blank\" rel=\"noopener\">a\u011f solucan\u0131<\/a> olarak s\u0131n\u0131fland\u0131r\u0131lmal\u0131 \u00e7\u00fcnk\u00fc kendini a\u011f \u00fczerinden yayan bir k\u00f6t\u00fc ama\u00e7l\u0131 program. ILOVEYOU\u2019nun bir di\u011fer \u00f6nemli \u00f6zelli\u011fi de ilk vir\u00fcs\u00fcn basit bir <a href=\"https:\/\/tr.wikipedia.org\/wiki\/VBScript\" target=\"_blank\" rel=\"noopener nofollow\">VBscript<\/a> program\u0131yla yap\u0131lm\u0131\u015f olmas\u0131. VBscript ise daha da eski bir konsept olan makrolara dayan\u0131yor. Temelde makrolar, \u00f6rne\u011fin dosyalarla \u00e7al\u0131\u015f\u0131rken belirli eylemleri otomatik hale getirmeyi sa\u011flayan basit programlar.<\/p>\n<p>\u00c7o\u011funlukla Microsoft Excel gibi elektronik tablolarda karma\u015f\u0131k hesaplamalar yapmak i\u00e7in kullan\u0131l\u0131yorlar. Microsoft Word, \u00f6rne\u011fin bir forma girilen verilerden otomatik olarak rapor olu\u015fturmak gibi i\u015fler i\u00e7in \u00e7ok eskiden beri makrolar\u0131 destekliyor.<\/p>\n<p>Bu Word i\u015flevi 1995\u2019te WM\/Concept.A vir\u00fcs\u00fc taraf\u0131ndan k\u00f6t\u00fcye kullan\u0131lm\u0131\u015ft\u0131. Bu <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/macro-virus-glossary\/\" target=\"_blank\" rel=\"noopener\">makro vir\u00fcs\u00fc<\/a> Microsoft Word belgelerine bula\u015f\u0131yor ve belge a\u00e7\u0131ld\u0131\u011f\u0131nda \u015fu mesaj\u0131 g\u00f6steriyordu:<\/p>\n<div id=\"attachment_10919\" style=\"width: 606px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10919\" class=\"wp-image-10919 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/08\/10103422\/cybersecurity-history-iloveyou-2.png\" alt=\"\u00a0Concept.A makro vir\u00fcs\u00fc bula\u015fm\u0131\u015f bir belgeyi a\u00e7\u0131nca \u00e7\u0131kan mesaj\" width=\"596\" height=\"441\"><p id=\"caption-attachment-10919\" class=\"wp-caption-text\">Concept.A makro vir\u00fcs\u00fc buna yol a\u00e7\u0131yordu. <a>Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<p>Hepsi buydu. Herhangi bir k\u00f6t\u00fc ama\u00e7l\u0131 i\u015flevi yoktu, sadece s\u00fcrekli \u00e7\u0131k\u0131p duran sinir bozucu bir pencereden ibaretti. 1998\u2019den 2006\u2019ya kadar \u015firketin Office \u00e7\u00f6z\u00fcmlerinin geli\u015ftirilmesinden sorumlu eski Microsoft \u00e7al\u0131\u015fan\u0131 Steven Sinofsky <a href=\"https:\/\/www.fastcompany.com\/90500378\/iloveyou-virus-microsoft-steven-sinofsky-book\" target=\"_blank\" rel=\"noopener nofollow\">an\u0131lar\u0131nda<\/a> Concept.A\u2019den ilk sinyal olarak bahsediyor. O noktada t\u00fcm Microsoft \u00e7\u00f6z\u00fcmlerinde uygulanan otomasyonun kendi aleyhine de kullan\u0131labilece\u011fi a\u00e7\u0131k\u00e7a ortaya \u00e7\u0131km\u0131\u015ft\u0131. Bunun sonucunda makrolar y\u00fcr\u00fct\u00fclmeden \u00f6nce bir uyar\u0131 g\u00f6stermeye karar verildi: Bu belge bir program i\u00e7eriyor, \u00e7al\u0131\u015ft\u0131rmak istedi\u011finizden emin misiniz?<\/p>\n<p>Microsoft makro \u00e7al\u0131\u015ft\u0131rmakla ilgili k\u0131s\u0131tlamalar uygulamaya ba\u015flar ba\u015flamaz k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m geli\u015ftiriciler bu k\u0131s\u0131tlamalar\u0131 atlatman\u0131n yollar\u0131n\u0131 aramaya ba\u015flad\u0131. Bir sonraki b\u00fcy\u00fck olay Mart 1999\u2019da ger\u00e7ekle\u015fti. Steven Sinofsky bu olay\u0131 \u015f\u00f6yle anlat\u0131yor: E-postan\u0131z\u0131 kontrol ederken konu sat\u0131r\u0131nda \u201c\u00d6nemli mesaj\u201d yazan, ekinde de bir dosya bulunan bir mesaj g\u00f6r\u00fcyorsunuz.<\/p>\n<div id=\"attachment_10920\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10920\" class=\"wp-image-10920 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/08\/10103520\/cybersecurity-history-iloveyou-3-1024x644.png\" alt=\"\u00a0Melissa vir\u00fcs\u00fc ta\u015f\u0131yan mesaj\" width=\"1024\" height=\"644\"><p id=\"caption-attachment-10920\" class=\"wp-caption-text\">Melissa vir\u00fcs\u00fc ta\u015f\u0131yan mesaj. <a>Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<p>Ard\u0131ndan ayn\u0131 mesaj\u0131n ba\u015fka birinden daha geldi\u011fini g\u00f6r\u00fcyorsunuz. Sonra ba\u015fka birinden daha. Sonunda e-posta \u00e7al\u0131\u015fmamaya ba\u015fl\u0131yor. Microsoft\u2019un e-posta sunucusu bile bu kadar y\u00fck\u00fc kald\u0131ram\u0131yor. \u0130\u015fte <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Melissa_vir%C3%BCs%C3%BC\" target=\"_blank\" rel=\"noopener nofollow\">Melissa<\/a> internet solucan\u0131 b\u00f6yle bir \u015feydi. Ekteki Microsoft Word belgesi, adres defterindeki ilk 50 ki\u015fiye Microsoft Outlook\u2019tan mesaj g\u00f6nderen k\u00f6t\u00fc ama\u00e7l\u0131 bir kod i\u00e7eriyordu.<\/p>\n<h2>Her \u015fey a\u015fk i\u00e7in<\/h2>\n<p>ILOVEYOU solucan\u0131, Melissa\u2019da kullan\u0131lan fikrilerin geli\u015ftirilmi\u015f haliydi. Microsoft \u00fcr\u00fcnlerindeki herhangi bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kullanm\u0131yordu, standart fonksiyonlar\u0131 kullan\u0131yordu. Tek hata, Outlook e-posta istemcisinden komut dosyas\u0131 ba\u015flat\u0131ld\u0131\u011f\u0131nda hi\u00e7bir uyar\u0131 g\u00f6sterilmemesiydi.<\/p>\n<p>Solucan\u0131n i\u015flevleri t\u00fcm al\u0131c\u0131lara a\u015fk mesajlar\u0131 g\u00f6ndermekle <a href=\"https:\/\/threats.kaspersky.com\/en\/threat\/Email-Worm.VBS.LoveLetter\/\" target=\"_blank\" rel=\"noopener nofollow\">s\u0131n\u0131rl\u0131 de\u011fildi<\/a>. Kurban\u0131n ad\u0131na g\u00f6nderilen spam e-postalara ek olarak o s\u0131ralar pop\u00fcler olan <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Internet_Relay_Chat\" target=\"_blank\" rel=\"noopener nofollow\">IRC mesajla\u015fma uygulamas\u0131<\/a> \u00fcst\u00fcnden de yay\u0131labiliyordu. Dahas\u0131 solucan, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n yarat\u0131c\u0131s\u0131na e-posta ve internet eri\u015fimi parolalar\u0131n\u0131 g\u00f6nderen bir Truva At\u0131 program\u0131 indiriyordu. Son olarak da sabit diskteki dosyalar\u0131 siliyor, sakl\u0131yor ya da bozuyordu. Bozulan dosyalar aras\u0131nda MP3 format\u0131nda m\u00fczikler, JPEG resimler, \u00e7e\u015fitli komut dosyalar\u0131 ve web sitesi kopyalar\u0131 vard\u0131.<\/p>\n<p>ILOVEYOU salg\u0131n\u0131n\u0131n arkas\u0131ndaki ki\u015fi, \u00f6nceki makro vir\u00fcslerinden baz\u0131 geli\u015ftirmeleri i\u015fin i\u00e7ine katm\u0131\u015f, m\u00fcthi\u015f bir sosyal m\u00fchendislik hilesi bulmu\u015f (kim \u201cseni seviyorum\u201d adl\u0131 bir dosyay\u0131 g\u00f6rmezden gelebilir ki?), k\u00f6t\u00fc ama\u00e7l\u0131 i\u015flevler eklemi\u015f ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n otomatik olarak yay\u0131lmas\u0131ndan sonuna kadar faydalanm\u0131\u015ft\u0131.<\/p>\n<p>D\u00f6nemin Kaspersky ve medya raporlar\u0131n\u0131 izleyerek olaylar\u0131n s\u0131ras\u0131n\u0131 takip etmek m\u00fcmk\u00fcn. 4 May\u0131s\u2019ta, daha ilk g\u00fcnden, binlerce sistem vir\u00fcs\u00fc <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2000_-to-love-or-not-to-love---\" target=\"_blank\" rel=\"noopener nofollow\">tespit edildi<\/a>. 9 May\u0131s\u2019ta 2,5 milyon bilgisayara vir\u00fcs bula\u015ft\u0131\u011f\u0131 <a href=\"https:\/\/www.theregister.com\/2000\/05\/05\/love_bug_mutates_faster_than\/\" target=\"_blank\" rel=\"noopener nofollow\">raporlanm\u0131\u015ft\u0131<\/a>. Bu da d\u00fcnya \u00e7ap\u0131nda on milyonlarca e-posta g\u00f6nderildi\u011fi anlam\u0131na geliyordu.<\/p>\n<p>Vir\u00fcs\u00fcn yarat\u0131c\u0131s\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 kodu bir ofis belgesi gibi g\u00f6stermeye bile \u00e7al\u0131\u015fmam\u0131\u015ft\u0131. \u201cLOVE-LETTER-FOR-YOU.TXT.VBS\u201d olan dosya ad\u0131, yaz\u0131n\u0131n ba\u015f\u0131ndaki ekran g\u00f6r\u00fcnt\u00fcs\u00fcnde de g\u00f6r\u00fclebilece\u011fi gibi Microsoft e-posta istemcilerinin uzun bir ismin yaln\u0131zca ilk k\u0131sm\u0131n\u0131 g\u00f6stermesinden faydalan\u0131yordu. \u0130\u00e7erideki kod a\u00e7\u0131k formattayd\u0131 ve k\u0131sa s\u00fcre i\u00e7inde bir\u00e7ok k\u00f6t\u00fc niyetli ki\u015fi internet solucan\u0131n\u0131n farkl\u0131 varyasyonlar\u0131n\u0131 yaratmak i\u00e7in bu kodu kullanmaya ba\u015flad\u0131. Zamanla konu sat\u0131r\u0131nda ILOVEYOU yerine ba\u015fka s\u00f6zc\u00fckler belirdi. Bunlar\u0131n aras\u0131nda kendinden emin bir dille yaz\u0131lm\u0131\u015f vir\u00fcs uyar\u0131lar\u0131 da vard\u0131. 19 May\u0131s\u2019ta <a href=\"https:\/\/www.kaspersky.com\/about\/press-releases\/2000_a-new-variation-of-the--loveletter-virus-hits-the-world\" target=\"_blank\" rel=\"noopener nofollow\">tespit edilen<\/a> NewLove varyant\u0131 dosyalar\u0131 se\u00e7erek silmiyor, sabit diskteki t\u00fcm bilgileri yok ediyordu.<\/p>\n<p>ILOVEYOU vir\u00fcs\u00fcn\u00fcn etkilerine dair nihai tahminlere g\u00f6re internete ba\u011fl\u0131 bilgisayarlar\u0131n %10\u2019una <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/05\/04\/this-20-year-old-virus-infected-50-million-windows-computers-in-10-days-why-the-iloveyou-pandemic-matters-in-2020\/\" target=\"_blank\" rel=\"noopener nofollow\">vir\u00fcs bula\u015ft\u0131<\/a>. Varyantlar\u0131n y\u0131k\u0131c\u0131 eylemleri de dahil toplam zarar\u0131n yakla\u015f\u0131k 10 milyar USD oldu\u011fu tahmin ediliyor. Olay bas\u0131nda b\u00fcy\u00fck yer buldu. ABD Senatosu\u2019nda konuyla ilgili oturumlar bile ger\u00e7ekle\u015fti.<\/p>\n<h2>Hatalar yap\u0131ld\u0131<\/h2>\n<p>2022\u2019de hikayeyi ba\u015ftan sona bilen biri \u015fu soruyu sorabilir: Bu kadar basit bir vir\u00fcs salg\u0131n\u0131 en ba\u015ftan \u00f6nlenemez miydi? Microsoft, sonunda komut dosyas\u0131 y\u00fcr\u00fctmeye ciddi k\u0131s\u0131tlamalar getiren b\u00fcy\u00fck Outlook e-posta istemcisi g\u00fcvenlik g\u00fcncellemesini <a href=\"https:\/\/news.microsoft.com\/2000\/06\/08\/outlook-email-security-update-now-available\/\" target=\"_blank\" rel=\"noopener nofollow\">8 Haziran 2000<\/a> tarihine kadar yay\u0131nlamad\u0131. G\u00fcncellemeyle birlikte t\u00fcm e-posta ekleri varsay\u0131lan olarak g\u00fcvenilmez hale geldi ve harici bir uygulaman\u0131n Outlook adres defterine eri\u015fmesine ya da ayn\u0131 anda birden fazla e-posta g\u00f6ndermeye \u00e7al\u0131\u015fmas\u0131na kontroller getirildi.<\/p>\n<div id=\"attachment_10921\" style=\"width: 606px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-10921\" class=\"wp-image-10921 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2022\/08\/10103913\/cybersecurity-history-iloveyou-4.png\" alt=\"\u00a0Outlook e-posta istemcisi, Haziran 2000'deki g\u00fcncellemenin ard\u0131ndan harici bir uygulaman\u0131n adres defterine eri\u015fti\u011fine ve ayn\u0131 anda birden fazla mesaj g\u00f6ndermeye \u00e7al\u0131\u015ft\u0131\u011f\u0131na dair kullan\u0131c\u0131lar\u0131 uyarmaya ba\u015flad\u0131.\" width=\"596\" height=\"664\"><p id=\"caption-attachment-10921\" class=\"wp-caption-text\">Outlook e-posta istemcisi, Haziran 2000\u2019deki g\u00fcncellemenin ard\u0131ndan harici bir uygulaman\u0131n adres defterine eri\u015fti\u011fine ve ayn\u0131 anda birden fazla mesaj g\u00f6ndermeye \u00e7al\u0131\u015ft\u0131\u011f\u0131na dair kullan\u0131c\u0131lar\u0131 uyarmaya ba\u015flad\u0131. <a>Kaynak<\/a><\/p><\/div>\n<p>\u00a0<\/p>\n<p>Bunun daha \u00f6nce yap\u0131lmamas\u0131n\u0131n sebebi, g\u00fcvenlik ve rahatl\u0131k ikileminde Microsoft\u2019un rahatl\u0131ktan yana olmas\u0131yd\u0131. Kullan\u0131c\u0131lar da \u00f6yleydi. Microsoft 1995\u2019te Microsoft Word\u2019e basit bir uyar\u0131 getirdi\u011finde (\u201cBu belge makro i\u00e7eriyor\u201d) m\u00fc\u015fterilerden \u00e7ok fazla olumsuz geri bildirim alm\u0131\u015ft\u0131. Bu ek onay, baz\u0131 \u015firketlerde komut dosyalar\u0131na dayal\u0131 i\u00e7 s\u00fcre\u00e7leri sekteye u\u011fratm\u0131\u015ft\u0131. Bu sebeple ILOVEYOU\u2019nun ard\u0131ndan yama geli\u015ftirilirken bile \u201cBu yama kullan\u0131c\u0131lar i\u00e7in bir \u015feyleri bozacak m\u0131?\u201d sorusu g\u00fcndemdeydi. Ancak bu sefer g\u00fcvenli\u011fin h\u0131zla iyile\u015ftirilmesi gerekti\u011fi \u00e7oktan netle\u015fmi\u015fti.<\/p>\n<h2>Eski vir\u00fcs, yeni problemler<\/h2>\n<p>ILOVEYOU salg\u0131n\u0131 g\u00fcn\u00fcm\u00fczde bilgi g\u00fcvenli\u011fi alan\u0131nda hala g\u00fcncelli\u011fini koruyan bir\u00e7ok soruyu ortaya att\u0131. \u0130\u00e7lerinden en \u00f6nemlisi \u015fuydu: Yamalar\u0131 daha h\u0131zl\u0131 yay\u0131nlayamaz m\u0131y\u0131z? Bu kesinlikle sorunlu bir noktayd\u0131. Microsoft, Outlook i\u00e7in yama kitini salg\u0131n ba\u015flad\u0131ktan bir ay sonra yay\u0131nlam\u0131\u015ft\u0131. Ayr\u0131ca bu g\u00fcncellemelere y\u00f6nelik otomatik da\u011f\u0131t\u0131m mekanizmalar\u0131 da hen\u00fcz ilkeldi. Dolay\u0131s\u0131yla yerel e-posta salg\u0131nlar\u0131n\u0131n ortadan kalkmas\u0131 uzun s\u00fcr\u00fcyordu.<\/p>\n<p>G\u00fcvenlik \u00e7\u00f6z\u00fcmleri sekt\u00f6r\u00fc bu anlamda olduk\u00e7a faydal\u0131 oldu\u011funu halihaz\u0131rda kan\u0131tlam\u0131\u015ft\u0131. Eugene Kaspersky\u2019nin de hat\u0131rlad\u0131\u011f\u0131 gibi, <a href=\"https:\/\/eugene.kaspersky.com\/2020\/05\/05\/iloveyou-20-years-ago-to-the-day\/\" target=\"_blank\" rel=\"noopener\">\u015firketin antivir\u00fcs kullan\u0131c\u0131lar\u0131n\u0131 korumak zor de\u011fildi<\/a>. Di\u011fer t\u00fcrde program geli\u015ftiricilerin benzer bir h\u0131zl\u0131 yama da\u011f\u0131t\u0131m\u0131 plan\u0131 uygulamas\u0131 \u00e7ok uzun y\u0131llar sonra ger\u00e7ekle\u015fse de o y\u0131llarda bile g\u00fcvenlik yaz\u0131l\u0131mlar\u0131nda d\u00fczenli g\u00fcncellemeler i\u00e7in \u00e7evrimi\u00e7i da\u011f\u0131t\u0131m sistemi vard\u0131. K\u0131sa bir s\u00fcre sonra, bilinmeyen k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyalar\u0131n\u0131 bile otomatik olarak tespit edip engellemeye y\u00f6nelik sezgisel analiz y\u00f6ntemleri geli\u015ftirildi.<\/p>\n<p>Aradan ge\u00e7en 22 y\u0131l i\u00e7inde pop\u00fcler programlar\u0131n ve i\u015fletim sistemlerinin g\u00fcvenli\u011fi devasa \u00f6l\u00e7\u00fcde geli\u015fse de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yarat\u0131c\u0131lar\u0131 da ba\u015far\u0131l\u0131 siber sald\u0131r\u0131lar i\u00e7in yeni bo\u015fluklar bulmaya devam etti.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 makrolar da ortadan kaybolmad\u0131. Microsoft, 2022\u2019nin \u015eubat ay\u0131nda internet \u00fczerinden al\u0131nan Office belgelerindeki t\u00fcm komut dosyalar\u0131n\u0131n y\u00fcr\u00fct\u00fclmesini yasaklayarak da\u011f\u0131t\u0131lmalar\u0131n\u0131 <a href=\"https:\/\/www.wired.com\/story\/microsoft-disables-macros-default-security-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">k\u0131s\u0131tlamaya nihayet s\u00f6z verdi<\/a>. Temmuz 2022\u2019nin ba\u015f\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/macros-microsoft-2022\/10853\/\" target=\"_blank\" rel=\"noopener\">bu yasak kald\u0131r\u0131ld\u0131<\/a>. Kullan\u0131c\u0131 taraf\u0131nda bir \u015feylerin bozulmas\u0131yla ilgili korkulan\u0131n ger\u00e7ekle\u015fmi\u015f olabilece\u011fini varsaymak m\u00fcmk\u00fcn. Microsoft, ayn\u0131 ay\u0131n ilerleyen g\u00fcnlerinde tekrar <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-starts-blocking-office-macros-by-default-once-again\/\" target=\"_blank\" rel=\"noopener nofollow\">makrolar\u0131 varsay\u0131lan olarak engellemeye karar verdi<\/a> fakat bu sefer ihtiya\u00e7 duyanlara yasa\u011f\u0131 nas\u0131l delebileceklerini de a\u00e7\u0131klad\u0131.<\/p>\n<p>Art\u0131k tek bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n on veya y\u00fcz milyonlarca bilgisayara yay\u0131ld\u0131\u011f\u0131 daha az say\u0131da b\u00fcy\u00fck \u00f6l\u00e7ekli salg\u0131n ger\u00e7ekle\u015fse de hala bunlar\u0131 tamamen \u00f6nleyemiyoruz. Kesinlikle de\u011fi\u015fen \u015fey, art\u0131k \u015firket ve kulan\u0131c\u0131 verilerini rehin al\u0131p <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ransomware\/\" target=\"_blank\" rel=\"noopener\">fidye talep ederek<\/a> siber sald\u0131r\u0131lar\u0131n paraya \u00e7evriliyor olmas\u0131.<\/p>\n<p>Hikayemizi ILOVEYOU internet solucan\u0131n\u0131n yarat\u0131c\u0131s\u0131n\u0131n ba\u015f\u0131na gelenleri k\u0131saca \u00f6zetleyerek bitirelim. Onel de Guzman salg\u0131n s\u0131ras\u0131nda 24 ya\u015f\u0131nda bir \u00f6\u011frenciydi. FBI yetkilileri 2000\u2019de solucan\u0131 i\u00e7eren orijinal mesajlar\u0131n Filipinler\u2019deki kullan\u0131c\u0131lardan olu\u015fan pop\u00fcler e-posta listelerine g\u00f6nderildi\u011fini belirlemeyi ba\u015fard\u0131. Hala Filipinler\u2019de ya\u015fayan de Guzman, 2000 y\u0131l\u0131nda ILOVEYOU\u2019nun yazar\u0131 oldu\u011fundan \u015f\u00fcphelenilen ki\u015filer listesine eklendi. Ancak iki sebeple ceza almad\u0131: Hem yeterli kan\u0131t bulunamad\u0131 hem de o y\u0131llarda yerel kanunlarda siber su\u00e7lara y\u00f6nelik cezai bir madde bulunmuyordu.<\/p>\n<p>2020\u2019de gazeteciler de Guzman\u2019\u0131 <a href=\"https:\/\/www.computerweekly.com\/news\/252481937\/Revealed-The-man-behind-the-first-major-computer-virus-pandemic\" target=\"_blank\" rel=\"noopener nofollow\">buldu<\/a>. De Guzman gazetecilere ILOVEYOU\u2019nun ilk ba\u015fta Outlook adres defteri i\u00e7in bir toplu posta g\u00f6nderme i\u015flevi bulunmad\u0131\u011f\u0131n\u0131 ve solucan\u0131 internete \u00f6deyecek paras\u0131 olmad\u0131\u011f\u0131ndan internet eri\u015fim parolas\u0131 \u00e7almak i\u00e7in yaratt\u0131\u011f\u0131n\u0131 anlatt\u0131. De Guzman k\u00f6t\u00fcc\u00fcl yeteneklerini hi\u00e7bir zaman paraya \u00e7evirmeyi ba\u015faramad\u0131. Yaz\u0131 yay\u0131nland\u0131\u011f\u0131 s\u0131rada Manila\u2019da m\u00fctevazi bir telefon tamiri d\u00fckkan\u0131nda \u00e7al\u0131\u015f\u0131yordu.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>22 y\u0131l \u00f6ncesinin en k\u00f6t\u00fc \u015f\u00f6hretli vir\u00fcslerinden biri olan ILOVEYOU solucan\u0131n\u0131n hikayesini hat\u0131rl\u0131yoruz.<\/p>\n","protected":false},"author":665,"featured_media":10917,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[2575,1921,790,38,2453,2002],"class_list":{"0":"post-10916","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-chronicle","9":"tag-e-posta","10":"tag-guvenlik-aciklari","11":"tag-microsoft","12":"tag-outlook","13":"tag-solucanlar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cybersecurity-history-iloveyou\/10916\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cybersecurity-history-iloveyou\/24432\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/19899\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/10050\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/26869\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-history-iloveyou\/24777\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/25156\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cybersecurity-history-iloveyou\/27485\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cybersecurity-history-iloveyou\/27149\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cybersecurity-history-iloveyou\/33691\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/45001\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cybersecurity-history-iloveyou\/19266\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cybersecurity-history-iloveyou\/19835\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cybersecurity-history-iloveyou\/25325\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cybersecurity-history-iloveyou\/30835\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cybersecurity-history-iloveyou\/30544\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/chronicle\/","name":"Chronicle"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=10916"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10916\/revisions"}],"predecessor-version":[{"id":10922,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/10916\/revisions\/10922"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/10917"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=10916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=10916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=10916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}