{"id":11476,"date":"2023-06-06T18:11:59","date_gmt":"2023-06-06T15:11:59","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11476"},"modified":"2023-06-06T18:11:59","modified_gmt":"2023-06-06T15:11:59","slug":"triangulation-attack-on-ios","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/triangulation-attack-on-ios\/11476\/","title":{"rendered":"\u00dc\u00e7genleme meselesi"},"content":{"rendered":"<p>Herkese selam. Bug\u00fcn \u00e7ok b\u00fcy\u00fck ve \u00f6nemli haberlerle geldim.<\/p>\n<p>Kaspersky uzmanlar\u0131, Apple mobil cihazlar\u0131n\u0131 kullanan a\u015f\u0131r\u0131 karma\u015f\u0131k ve profesyonelce hedefler se\u00e7en bir siber sald\u0131r\u0131 ke\u015ffetti. Bu sald\u0131r\u0131n\u0131n amac\u0131, \u015firket \u00e7al\u0131\u015fanlar\u0131n\u0131n -hem \u00fcst hem de orta d\u00fczey y\u00f6netim- iPhone\u2019lar\u0131na dikkat \u00e7ekmeyen bir casus yaz\u0131l\u0131m yerle\u015ftirmek.<\/p>\n<p>Sald\u0131r\u0131, iOS i\u015fletim sistemindeki bir dizi g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kullanarak cihaz \u00fczerinde \u00e7al\u0131\u015ft\u0131r\u0131lan ve casus yaz\u0131l\u0131m y\u00fckleyen k\u00f6t\u00fc ama\u00e7l\u0131 bir ek i\u00e7eren g\u00f6r\u00fcnmez bir iMessage kullan\u0131larak ger\u00e7ekle\u015ftiriliyor. Casus yaz\u0131l\u0131m\u0131n yerle\u015ftirilme s\u00fcreci tamamen gizli ve kullan\u0131c\u0131n\u0131n bir \u015fey yapmas\u0131 gerekmiyor. Casus yaz\u0131l\u0131m ayr\u0131ca, mikrofon kay\u0131tlar\u0131, anl\u0131k mesajla\u015fma uygulamalar\u0131ndan foto\u011fraflar, co\u011frafi konum ve vir\u00fcsl\u00fc cihaz\u0131n sahibinin bir dizi ba\u015fka faaliyeti hakk\u0131ndaki veriler gibi \u00f6zel bilgileri de sessizce uzak sunuculara iletiyor.<\/p>\n<p>Sald\u0131r\u0131 m\u00fcmk\u00fcn oldu\u011funca gizli bir \u015fekilde ger\u00e7ekle\u015ftirilse de vir\u00fcs, bilgi ve olay y\u00f6netimi i\u00e7in yerel bir <a href=\"https:\/\/tr.wikipedia.org\/wiki\/G%C3%BCvenlik_bilgi_ve_olay_y%C3%B6netimi\" target=\"_blank\" rel=\"nofollow noopener\">SIEM<\/a> \u00e7\u00f6z\u00fcm\u00fc olan Kaspersky Birle\u015fik \u0130zleme ve Analiz Platformu (KUMA) taraf\u0131ndan tespit edildi. Sistem, a\u011f\u0131m\u0131zda Apple cihazlar\u0131ndan gelen bir anormallik tespit etti. Ekibimiz taraf\u0131ndan yap\u0131lan ekstra ara\u015ft\u0131rmalar, \u00e7al\u0131\u015fanlar\u0131m\u0131z\u0131n \u00e7ok say\u0131da iPhone\u2019una \u201c\u00dc\u00e7genleme\u201d ad\u0131n\u0131 verdi\u011fimiz yeni ve teknolojik a\u00e7\u0131dan son derece geli\u015fmi\u015f bir casus yaz\u0131l\u0131m\u0131n bula\u015ft\u0131\u011f\u0131n\u0131 g\u00f6sterdi.<\/p>\n<p>iOS\u2019un kapal\u0131 yap\u0131s\u0131 nedeniyle, vir\u00fcsl\u00fc ak\u0131ll\u0131 telefonlarda bu casus yaz\u0131l\u0131m\u0131 tespit etmek ve kald\u0131rmak i\u00e7in standart bir i\u015fletim sistemi arac\u0131 yok (ve olamaz). Bunu yapmak i\u00e7in harici ara\u00e7lara ihtiyac\u0131n\u0131z var.<\/p>\n<p>Cihazda \u00dc\u00e7genleme varl\u0131\u011f\u0131n\u0131n \u00fcst\u00fc kapal\u0131 bir g\u00f6stergesi de iOS g\u00fcncelleme yetene\u011finin devre d\u0131\u015f\u0131 b\u0131rak\u0131lmas\u0131. Vir\u00fcs\u00fcn daha do\u011fru tan\u0131nmas\u0131 i\u00e7in cihaz\u0131n yedek bir kopyas\u0131n\u0131 alman\u0131z ve \u00f6zel bir yard\u0131mc\u0131 programla kontrol etmeniz gerekiyor. <a href=\"https:\/\/securelist.com\/operation-triangulation\/109842\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019teki bu teknik makalede<\/a> daha ayr\u0131nt\u0131l\u0131 \u00f6neriler yer al\u0131yor. Ayr\u0131ca \u00fccretsiz bir tespit arac\u0131 geli\u015ftiriyoruz ve test ettikten sonra kullan\u0131ma sunaca\u011f\u0131z.<\/p>\n<p>Vir\u00fcs bula\u015fm\u0131\u015f cihazlarda iOS g\u00fcncellemelerini engelleme \u00f6zellikleri nedeniyle, kullan\u0131c\u0131 verilerini kaybetmeden casus yaz\u0131l\u0131mlar\u0131 kald\u0131rman\u0131n etkili bir yolunu hen\u00fcz bulamad\u0131k. Bu yaln\u0131zca vir\u00fcs bula\u015fm\u0131\u015f iPhone\u2019lar\u0131 fabrika ayarlar\u0131na s\u0131f\u0131rlayarak, i\u015fletim sisteminin en son s\u00fcr\u00fcm\u00fcn\u00fc ve t\u00fcm kullan\u0131c\u0131 ortam\u0131n\u0131 s\u0131f\u0131rdan y\u00fckleyerek yap\u0131labilir. Aksi takdirde, yeniden ba\u015flatman\u0131n ard\u0131ndan casus yaz\u0131l\u0131m cihaz belle\u011finden silinse bile \u00dc\u00e7genleme, iOS\u2019un eski bir s\u00fcr\u00fcm\u00fcndeki g\u00fcvenlik a\u00e7\u0131klar\u0131 arac\u0131l\u0131\u011f\u0131yla yeniden vir\u00fcs bula\u015ft\u0131rabilir.<\/p>\n<p>\u00dc\u00e7genleme Operasyonuna ili\u015fkin bu rapor, bu geli\u015fmi\u015f sald\u0131r\u0131ya ili\u015fkin soru\u015fturman\u0131n sadece ba\u015flang\u0131c\u0131. Bug\u00fcn analizin ilk sonu\u00e7lar\u0131n\u0131 yay\u0131nl\u0131yoruz ancak daha yap\u0131lacak \u00e7ok i\u015f var. Olay ara\u015ft\u0131r\u0131ld\u0131k\u00e7a, <a href=\"https:\/\/securelist.com\/trng-2023\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019te konuya \u00f6zel bir yaz\u0131da<\/a> yeni veriler yay\u0131nlayaca\u011f\u0131z ve Ekim ay\u0131nda uluslararas\u0131 G\u00fcvenlik Analistleri Zirvesinde (<a href=\"https:\/\/thesascon.com\/\" target=\"_blank\" rel=\"noopener nofollow\">haberleri siteden takip edin<\/a>) yap\u0131lan \u00e7al\u0131\u015fmalara son noktay\u0131 koyaca\u011f\u0131z.<\/p>\n<p>Kaspersky\u2019nin bu siber sald\u0131r\u0131n\u0131n ana hedefi olmad\u0131\u011f\u0131ndan olduk\u00e7a eminiz. \u00d6n\u00fcm\u00fczdeki g\u00fcnlerde casus yaz\u0131l\u0131m\u0131n d\u00fcnya \u00e7ap\u0131nda ne kadar yay\u0131ld\u0131\u011f\u0131n\u0131 daha net ve ayr\u0131nt\u0131l\u0131 g\u00f6rece\u011fiz.<\/p>\n<p>Bu olay\u0131n ana nedeninin iOS\u2019un tescilli yap\u0131s\u0131 oldu\u011funa inan\u0131yoruz. Bu i\u015fletim sistemi, \u00dc\u00e7genleme gibi casus yaz\u0131l\u0131mlar\u0131n y\u0131llarca saklanabilece\u011fi bir \u201ckara kutu\u201d. Bu t\u00fcr tehditleri tespit ve analiz etmek, Apple\u2019\u0131n ara\u015ft\u0131rma ara\u00e7lar\u0131 \u00fczerindeki tekeli nedeniyle daha da zorla\u015f\u0131yor ve Apple casus yaz\u0131l\u0131mlar i\u00e7in m\u00fckemmel bir s\u0131\u011f\u0131nak haline geliyor. Ba\u015fka bir deyi\u015fle, <a href=\"https:\/\/eugene.kaspersky.com\/2019\/09\/10\/iclosed-architecture-and-the-illusion-of-unhackability\/\" target=\"_blank\" rel=\"noopener\">daha \u00f6nce \u00e7ok kez dile getirdi\u011fim gibi<\/a>, kullan\u0131c\u0131lar\u0131n zihninde sistemin tam anla\u015f\u0131lmaz olmas\u0131 \u00fczerinden bir g\u00fcvenlik yan\u0131lsamas\u0131 olu\u015fturuluyor. iOS\u2019ta ger\u00e7ekte ne oldu\u011fu siber g\u00fcvenlik uzmanlar\u0131 taraf\u0131ndan bilinmiyor. Sald\u0131r\u0131larla ilgili haberlerin olmamas\u0131, halihaz\u0131rda g\u00f6rd\u00fc\u011f\u00fcm\u00fcz gibi, sald\u0131r\u0131lar\u0131n imk\u00e2ns\u0131z oldu\u011funu g\u00f6stermiyor.<\/p>\n<p>Bunun \u015firketimize y\u00f6nelik <a href=\"https:\/\/securelist.com\/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns\/70504\/\" target=\"_blank\" rel=\"noopener\">ilk<\/a> hedefli sald\u0131r\u0131 vakas\u0131 olmad\u0131\u011f\u0131n\u0131 hat\u0131rlatmak isterim. \u00c7ok agresif bir ortamda \u00e7al\u0131\u015ft\u0131\u011f\u0131m\u0131z\u0131n fark\u0131nday\u0131z ve uygun olay m\u00fcdahale prosed\u00fcrleri geli\u015ftirdik. Al\u0131nan \u00f6nlemler sayesinde \u015firket normal bir \u015fekilde \u00e7al\u0131\u015f\u0131yor, i\u015f s\u00fcre\u00e7leri ve kullan\u0131c\u0131 verileri etkilenmiyor ve tehdit etkisiz hale getiriliyor. Her zaman oldu\u011fu gibi, sizi korumaya devam ediyoruz.<\/p>\n<p>Not Neden \u201c\u00dc\u00e7genleme\u201d?<\/p>\n<p>\u00dc\u00e7genleme, sald\u0131r\u0131ya u\u011frayan sistemin yaz\u0131l\u0131m ve donan\u0131m \u00f6zelliklerini tan\u0131mak i\u00e7in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Canvas_fingerprinting\" target=\"_blank\" rel=\"nofollow noopener\">Canvas Fingerprinting<\/a> teknolojisini kullan\u0131yor ve cihaz\u0131n belle\u011fine sar\u0131 bir \u00fc\u00e7gen \u00e7iziyor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00dc\u00e7genleme Truva At\u0131yla y\u00f6netimimize yap\u0131lan hedefli sald\u0131r\u0131.  <\/p>\n","protected":false},"author":13,"featured_media":11478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1351],"tags":[14,750,26,1986],"class_list":{"0":"post-11476","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-threats","10":"tag-apple","11":"tag-ios","12":"tag-iphone","13":"tag-truva-atlari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/triangulation-attack-on-ios\/11476\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/triangulation-attack-on-ios\/25750\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/triangulation-attack-on-ios\/21185\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/triangulation-attack-on-ios\/10677\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/triangulation-attack-on-ios\/28444\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/triangulation-attack-on-ios\/26053\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/triangulation-attack-on-ios\/26373\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/triangulation-attack-on-ios\/28855\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/triangulation-attack-on-ios\/27787\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/triangulation-attack-on-ios\/35467\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/triangulation-attack-on-ios\/48353\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/triangulation-attack-on-ios\/20644\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/triangulation-attack-on-ios\/21332\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/triangulation-attack-on-ios\/30186\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/triangulation-attack-on-ios\/33936\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/triangulation-attack-on-ios\/28861\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/triangulation-attack-on-ios\/26351\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/triangulation-attack-on-ios\/32064\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/triangulation-attack-on-ios\/31748\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11476"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11476\/revisions"}],"predecessor-version":[{"id":11480,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11476\/revisions\/11480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11478"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}