{"id":11300,"date":"2023-03-03T13:39:30","date_gmt":"2023-03-03T10:39:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11300"},"modified":"2023-03-03T13:39:30","modified_gmt":"2023-03-03T10:39:30","slug":"bluenoroff-mark-of-the-web","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/bluenoroff-mark-of-the-web\/11300\/","title":{"rendered":"Mark-of-the-Web atlatma"},"content":{"rendered":"<p>Genellikle bir kullan\u0131c\u0131, e-posta ile g\u00f6nderilen veya bir web sitesinden indirilen bir ofis belgesini okumaya \u00e7al\u0131\u015ft\u0131\u011f\u0131 zaman, Microsoft Office o belgeyi korumal\u0131 modda a\u00e7ar. Bunu da Windows\u2019un varsay\u0131lan koruma mekanizmalar\u0131ndan birisi olan Mark-of-the-Web (MOTW) ile yapar. \u0130nternetten bilgisayar\u0131n\u0131za gelen dosyalar\u0131 i\u015faretler, b\u00f6ylece uygulamalar bu dosyalar\u0131n kayna\u011f\u0131n\u0131 bilir ve kullan\u0131c\u0131n\u0131n dikkatini potansiyel tehlikeye \u00e7ekebilir. Ancak, bu t\u00fcr bir uyar\u0131 mekanizmas\u0131n\u0131n etkilili\u011fine g\u00f6z\u00fc kapal\u0131 g\u00fcvenmek muhtemelen k\u00f6t\u00fc bir fikirdir zira son zamanlarda bir\u00e7ok sald\u0131rgan, MOTW\u2019yu atlatma y\u00f6ntemleri kullanmaya ba\u015flam\u0131\u015ft\u0131r. \u00d6rne\u011fin k\u0131sa s\u00fcre \u00f6nce BlueNoroff grubunun (Lazarus grubun bir par\u00e7as\u0131 oldu\u011fu d\u00fc\u015f\u00fcn\u00fclmektedir) ara\u00e7lar\u0131 \u00fczerinde \u00e7al\u0131\u015fma yapan uzmanlar\u0131m\u0131z, s\u00f6z konusu grubun, i\u015fletim sistemini kand\u0131rmak i\u00e7in yeni hileler kulland\u0131\u011f\u0131n\u0131 fark etti.<\/p>\n<h2>BlueNoroff grubu MOTW mekanizmas\u0131n\u0131 nas\u0131l atlat\u0131yor?<\/h2>\n<p>Mark-of-the-Web mekanizmas\u0131 \u015f\u00f6yle \u00e7al\u0131\u015f\u0131yor: Kullan\u0131c\u0131 (veya program) internetten bir dosya indirdi\u011fi anda NTFS dosya sistemi, o dosyaya \u201cinternetten indirilmi\u015ftir\u201d \u00f6zelli\u011fi ekliyor. Ancak bu \u00f6zellik her zaman al\u0131nm\u0131yor. Bir ar\u015fiv indirdi\u011finizde ar\u015fivin i\u00e7indeki t\u00fcm dosyalar bu \u00f6zelli\u011fi al\u0131yor. Fakat ar\u015fivler, dolayl\u0131 yoldan dosya aktarman\u0131n tek yolu de\u011fil.<\/p>\n<p>BlueNoroff grubunun arkas\u0131ndaki sald\u0131rganlar, k\u00f6t\u00fc ama\u00e7l\u0131 belgeleri yaymak i\u00e7in yeni dosya t\u00fcrleri kullanmay\u0131 denemeye ba\u015flad\u0131. Baz\u0131 durumlarda bu sald\u0131rganlar, genellikle optik disk g\u00f6r\u00fcnt\u00fcleri depolamak i\u00e7in yayg\u0131n olarak kullan\u0131lan.iso bi\u00e7imini kullan\u0131yor. Di\u011fer se\u00e7enek ise genellikle sanal bir sabit disk i\u00e7eren.vhd dosyas\u0131. Yani bu sald\u0131rganlar ger\u00e7ek sald\u0131r\u0131 unsurunu (hileli bir belge ve k\u00f6t\u00fc ama\u00e7l\u0131 bir dizin), bir g\u00f6rselin ya da sanal s\u00fcr\u00fcc\u00fcn\u00fcn i\u00e7ine sakl\u0131yorlar.<\/p>\n<p>G\u00fcncel BlueNoroff ara\u00e7 ve y\u00f6ntemlerine dair daha detayl\u0131 bir teknik a\u00e7\u0131klaman\u0131n yan\u0131 s\u0131ra risk g\u00f6stergelerine dair bilgi almak i\u00e7in <a target=\"_blank\" href=\"https:\/\/securelist.com\/bluenoroff-methods-bypass-motw\/108383\/\" rel=\"noopener\">uzmanlar\u0131m\u0131z\u0131n Securelist blogunda yer alan g\u00f6nderisine<\/a> bakabilirsiniz.<\/p>\n<h2>BlueNoroff kim ve ne istiyor?<\/h2>\n<p>Bu y\u0131l\u0131n ba\u015f\u0131nda, kripto para \u00e7almaya y\u00f6nelik <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/snatchcrypto-bluenoroff\/10466\/\" rel=\"noopener\">SnatchCrypto kampanyas\u0131<\/a> hakk\u0131nda bir yaz\u0131 payla\u015fm\u0131\u015ft\u0131k. Birtak\u0131m belirtilerden yola \u00e7\u0131kan ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z, bunun arkas\u0131nda yer alan\u0131n da BlueNoroff grubu oldu\u011funu d\u00fc\u015f\u00fcn\u00fcyor. Bug\u00fcn g\u00f6zlemlenen faaliyet de temelde mali kazan\u00e7 elde etmeye odakl\u0131. Asl\u0131nda sald\u0131r\u0131n\u0131n son a\u015famas\u0131 yine ayn\u0131: Su\u00e7lular, etkilenen bilgisayara izinsiz eri\u015fim ge\u00e7idi kuruyor.<\/p>\n<p>BlueNoroff grubu bug\u00fcne kadar, risk sermayesi ve yat\u0131r\u0131m \u015firketlerinin yan\u0131 s\u0131ra b\u00fcy\u00fck bankalar\u0131 taklit eden bir\u00e7ok etki alan\u0131 kaydetti. Bankalar\u0131n isimlerinden ve sald\u0131rganlar\u0131n kulland\u0131\u011f\u0131 hileli belgelerden yola \u00e7\u0131karak s\u00f6yleyebiliriz ki bu gruptaki ki\u015filerin \u015fu andaki birincil hedefi Japonca konu\u015fan ki\u015filer. Ancak, gruptaki en az bir kurban BAE\u2019de bulundu. G\u00f6r\u00fcld\u00fc\u011f\u00fc \u00fczere BlueNoroff aslen, kripto para ile ili\u015fkili i\u015fletmelerin yan\u0131 s\u0131ra finans \u015firketleriyle ilgileniyor.<\/p>\n<h2>Nas\u0131l g\u00fcvende kalaca\u011f\u0131z?<\/h2>\n<p>\u00d6ncelikle, i\u015fletim sisteminde entegre haldeki varsay\u0131lan koruma mekanizmalar\u0131n\u0131n \u015firketinizi g\u00fcvende tutmak i\u00e7in yeterli oldu\u011fu varsay\u0131m\u0131ndan kurtulman\u0131z gerekir. Mark-of-the-Web mekanizmas\u0131, bir \u00e7al\u0131\u015fan\u0131n internetten ald\u0131\u011f\u0131 dosyay\u0131 a\u00e7mas\u0131n\u0131 ve zararl\u0131 bir dizin \u00e7al\u0131\u015ft\u0131rmas\u0131n\u0131 \u00f6nleyemez. \u015eirketinizin BlueNoroff ve benzeri APT gruplar\u0131n\u0131n tuza\u011f\u0131na d\u00fc\u015fmemesi i\u00e7in uzmanlar\u0131m\u0131z\u0131n \u00f6nerileri \u015fu \u015fekildedir:<\/p>\n<ul>\n<li>t\u00fcm i\u015f cihazlar\u0131na <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">modern g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kurmak<\/a>: Bu \u00e7\u00f6z\u00fcmler, k\u00f6t\u00fc ama\u00e7l\u0131 dosyalardan gelen dizinlerin \u00e7al\u0131\u015ft\u0131r\u0131lmas\u0131n\u0131 \u00f6nler;<\/li>\n<li>\u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 modern siber tehditler hakk\u0131nda bilgilendirmek: <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">Uygun \u015fekilde d\u00fczenlenmi\u015f e\u011fitimler,<\/a> \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n sald\u0131rganlara kanmamas\u0131n\u0131 sa\u011flar;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint-detection-response-edr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">EDR<\/a> s\u0131n\u0131f\u0131 g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullanmak ve gerekirse <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Y\u00f6netimli Alg\u0131lama ve Yan\u0131t<\/a> hizmetleri kullanmak: Bu sayede kurumsal a\u011fdaki k\u00f6t\u00fc ama\u00e7l\u0131 faaliyetler zaman\u0131nda tespit edilir ve ger\u00e7ek anlamda bir zarar meydana gelmeden \u00f6nce sald\u0131r\u0131 engellenir.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>BlueNoroff APT grubu, Mark-of-the-Web mekanizmas\u0131n\u0131 atlatmak i\u00e7in baz\u0131 y\u00f6ntemler uygulad\u0131<\/p>\n","protected":false},"author":2581,"featured_media":11301,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[493,1454,1912,113],"class_list":{"0":"post-11300","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-apt","10":"tag-lazarus","11":"tag-office","12":"tag-windows"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bluenoroff-mark-of-the-web\/11300\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/bluenoroff-mark-of-the-web\/25025\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/bluenoroff-mark-of-the-web\/20520\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/bluenoroff-mark-of-the-web\/10473\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/bluenoroff-mark-of-the-web\/27591\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bluenoroff-mark-of-the-web\/25353\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/bluenoroff-mark-of-the-web\/25672\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bluenoroff-mark-of-the-web\/28234\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bluenoroff-mark-of-the-web\/27489\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bluenoroff-mark-of-the-web\/34458\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bluenoroff-mark-of-the-web\/46690\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/bluenoroff-mark-of-the-web\/19927\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/bluenoroff-mark-of-the-web\/20516\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bluenoroff-mark-of-the-web\/29623\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/bluenoroff-mark-of-the-web\/33086\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/bluenoroff-mark-of-the-web\/28804\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/bluenoroff-mark-of-the-web\/25712\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bluenoroff-mark-of-the-web\/31400\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bluenoroff-mark-of-the-web\/31110\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11300"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11300\/revisions"}],"predecessor-version":[{"id":11303,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11300\/revisions\/11303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11301"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}