{"id":11549,"date":"2023-07-13T15:33:56","date_gmt":"2023-07-13T12:33:56","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11549"},"modified":"2023-07-13T15:35:01","modified_gmt":"2023-07-13T12:35:01","slug":"top-eight-crypto-scams-2023","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/top-eight-crypto-scams-2023\/11549\/","title":{"rendered":"Tarihteki en c\u00fcretk\u00e2r kripto h\u0131rs\u0131zl\u0131klar\u0131ndan sekizi"},"content":{"rendered":"<p>Kripto paralar\u0131n, bu varl\u0131klar\u0131 ellerinde tutanlar a\u00e7\u0131s\u0131ndan temel avantajlar\u0131, gev\u015fek yasal d\u00fczenlemeler ve bu para birimleri \u00fczerinde h\u00fck\u00fcmet kontrol\u00fcn\u00fcn olmamas\u0131d\u0131r. Ancak bunlar, siber h\u0131rs\u0131zlar i\u00e7in de b\u00fcy\u00fck art\u0131lard\u0131r. Kripto varl\u0131klar\u0131na y\u00f6nelik tehditler olduk\u00e7a \u00e7e\u015fitli oldu\u011fundan, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/11394\/\" target=\"_blank\" rel=\"noopener\">kripto yat\u0131r\u0131mlar\u0131n\u0131z\u0131 nas\u0131l koruyaca\u011f\u0131n\u0131z konusundaki genel bak\u0131\u015f\u0131m\u0131z\u0131<\/a> ve ayr\u0131ca <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/five-threats-hardware-crypto-wallets\/11425\/\" target=\"_blank\" rel=\"noopener\">donan\u0131m kripto c\u00fczdan sahiplerine y\u00f6nelik ipu\u00e7lar\u0131m\u0131z\u0131<\/a> incelemenizi \u00f6neririz. Ancak, her ne kadar bu g\u00f6nderilerimiz konuyla ilgili \u00e7ok\u00e7a ayr\u0131nt\u0131 i\u00e7erse de, kripto doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131n t\u00fcm \u00e7e\u015fitlerini veya \u00f6l\u00e7e\u011fini a\u00e7\u0131klamakta yine de yetersiz kalabilir. Kripto finansman\u0131n\u0131n doland\u0131r\u0131c\u0131lar i\u00e7in ne kadar \u00e7ekici oldu\u011funu daha iyi anlaman\u0131z i\u00e7in son y\u0131llarda ger\u00e7ekle\u015fen en \u00e7arp\u0131c\u0131 sald\u0131r\u0131 \u00f6rneklerini bir listede derledik. Polis kadromuz (siber su\u00e7lulardan olu\u015fan) sizin i\u00e7in farkl\u0131 kategorilerdeki en b\u00fcy\u00fck ve en k\u00fcstah sald\u0131r\u0131lar\u0131 derledi. Bir\u00e7ok sald\u0131r\u0131 t\u00fcr\u00fcn\u00fcn verdi\u011fi hasar\u0131 tam olarak belirlemek zor oldu\u011fundan, listemizdeki sald\u0131r\u0131lar\u0131 verdikleri hasara g\u00f6re s\u0131ralamad\u0131k. Bu sebeple, <a href=\"https:\/\/edition.cnn.com\/2022\/02\/27\/business\/bitconnect-ponzi-scheme-satish-kumbhani\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">BitConnect gibi piramit \u015femalar\u0131<\/a> derecelendirmemizden hari\u00e7 tuttuk.<\/p>\n<h2 id=\"sophisticated\">1. En iyi planlanm\u0131\u015f h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: 30.000 ABD Dolar\u0131<\/strong><\/p>\n<p><strong>Y\u00f6ntem: Truva at\u0131 bula\u015fm\u0131\u015f donan\u0131m c\u00fczdan\u0131<\/strong><\/p>\n<p>Bu sald\u0131r\u0131 uzmanlar\u0131m\u0131z taraf\u0131ndan derinlemesine ara\u015ft\u0131r\u0131ld\u0131, dilerseniz bu konuyla ilgili <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fake-trezor-hardware-crypto-wallet\/11437\/\" target=\"_blank\" rel=\"noopener\">ayr\u0131nt\u0131l\u0131 yaz\u0131m\u0131z\u0131<\/a> da okuyabilirsiniz. Bir yat\u0131r\u0131mc\u0131, ger\u00e7ek bir c\u00fczdan gibi g\u00f6r\u00fcnen ve \u00e7al\u0131\u015fan pop\u00fcler bir donan\u0131m c\u00fczdan\u0131 sat\u0131n ald\u0131 \u2014 ancak bir s\u00fcre sonra sat\u0131n ald\u0131\u011f\u0131 c\u00fczdan, olmas\u0131 gerekti\u011fi gibi \u00e7al\u0131\u015fmamaya ba\u015flad\u0131. \u00d6nceden fla\u015flanm\u0131\u015f \u00f6zel anahtarlar ve parola zay\u0131flatma sistemi i\u00e7eren kurnazca haz\u0131rlanm\u0131\u015f sahte bir donan\u0131m c\u00fczdan\u0131 oldu\u011fu ortaya \u00e7\u0131kt\u0131. Kripto para c\u00fczdanda g\u00f6r\u00fcnd\u00fc\u011f\u00fc gibi bilgisayar korsanlar\u0131 paray\u0131 \u00e7ekti. Ve bu i\u015flem, c\u00fczdan herhangi bir bilgisayara ba\u011flanmadan ger\u00e7ekle\u015ftirildi.<\/p>\n<h2 id=\"biggest\">2. En b\u00fcy\u00fck h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: 540.000.000 ABD Dolar\u0131<\/strong><\/p>\n<p><strong>Y\u00f6ntem: sunucu hack\u2019leme <\/strong><\/p>\n<p>Uzun bir s\u00fcre boyunca, kripto para birimi tarihindeki en b\u00fcy\u00fck hack\u2019leme vakas\u0131, 2014 y\u0131l\u0131nda <a href=\"https:\/\/buybitcoinworldwide.com\/mt-gox-hack\/\" target=\"_blank\" rel=\"noopener nofollow\">460 milyon ABD Dolar\u0131 de\u011ferindeki Mt. Got<\/a>\u2018a yap\u0131lan ve bu borsan\u0131n \u00e7\u00f6kmesine neden olan sald\u0131r\u0131yd\u0131. Ancak 2022 y\u0131l\u0131nda bu \u015f\u00fcpheli onur, pop\u00fcler kazan-kazan oyunu Axie Infinity\u2019nin geli\u015ftiricisi Sky Mavis\u2019e ge\u00e7ti. Sald\u0131rganlar, oyun i\u00e7i token\u2019larla Ethereum a\u011f\u0131 aras\u0131ndaki etkile\u015fimi y\u00f6neten Ronin Bridge sistemine sald\u0131rarak, \u00e7e\u015fitli tahminlere g\u00f6re 540 ila 650 milyon ABD dolar\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/sky-mavis-crypto-heist\/10887\/\" target=\"_blank\" rel=\"noopener\">tutar\u0131nda Ethereum ve USDC\u2019yi \u00e7ald\u0131<\/a>. Blok zincir k\u00f6pr\u00fcs\u00fc sald\u0131r\u0131s\u0131n\u0131n ayr\u0131nt\u0131lar\u0131na \u00e7ok fazla girmeyece\u011fiz. Sald\u0131rganlar\u0131n, Ronin i\u015flemlerini do\u011frulamak i\u00e7in kullan\u0131lan dokuz do\u011frulay\u0131c\u0131 d\u00fc\u011f\u00fcmden be\u015fini ele ge\u00e7irdi\u011fini ve bunlar\u0131 kendi kripto transferlerini imzalamak i\u00e7in kulland\u0131klar\u0131n\u0131 bilmeniz yeterli. G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re a\u011fa, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ve zaman\u0131nda iptal edilmemi\u015f, halen yasal ancak eskimi\u015f kimlik do\u011frulama bilgilerinin bir kombinasyonunu kullanarak s\u0131zd\u0131lar.<\/p>\n<p>Bilgisayar korsanlar\u0131 ayr\u0131ca hedef \u015firketlerin toplam piyasa de\u011ferinde ger\u00e7ekle\u015fecek \u00e7\u00f6k\u00fc\u015ften de faydalan\u0131p daha da \u00e7ok kazanmay\u0131 umuyorlard\u0131. Ancak, sald\u0131r\u0131 sadece bir hafta sonra fark edildi ve a\u00e7\u0131\u011fa sat\u0131\u015f giri\u015fimleri ba\u015far\u0131s\u0131z oldu.<\/p>\n<h2 id=\"persistent\">3. En \u0131srarc\u0131 h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: bilinmiyor<\/strong><\/p>\n<p><strong>Y\u00f6ntem: sahte Chrome uzant\u0131s\u0131<\/strong><\/p>\n<p>BlueNoroff grubu taraf\u0131ndan ger\u00e7ekle\u015ftirilen ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/snatchcrypto-bluenoroff\/10466\/\" target=\"_blank\" rel=\"noopener\">2022 y\u0131l\u0131nda taraf\u0131m\u0131zca tespit edilen<\/a> sald\u0131r\u0131lar, \u00f6ncelikle kripto para birimi ile \u00e7al\u0131\u015fan FinTech \u015firketlerini hedef alm\u0131\u015ft\u0131. Bu sald\u0131r\u0131 dizisinde bilgisayar korsanlar\u0131, giri\u015fim sermayesi fonlar\u0131ndan geliyormu\u015f gibi g\u00f6r\u00fcnen kimlik av\u0131 e-postalar\u0131n\u0131 kullanarak hedef \u015firketlerin dahili a\u011flar\u0131na s\u0131zd\u0131lar. Kurban k\u00f6t\u00fc ama\u00e7l\u0131 e-posta ekini a\u00e7t\u0131\u011f\u0131nda, bilgisayara bir Truva at\u0131 y\u00fcklendi ve sald\u0131rganlar\u0131n bilgi \u00e7almas\u0131na ve k\u00f6t\u00fc ama\u00e7l\u0131 ek yaz\u0131l\u0131mlar y\u00fcklemesine imkan sa\u011fland\u0131. Bilgisayar korsanlar\u0131, bir \u015firketin e-postalar\u0131yla ilgileniyorlarsa, aylarca o \u015firketin a\u011f\u0131nda kal\u0131yordu. Kripto h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in ise Metamask adl\u0131 de\u011fi\u015ftirilmi\u015f bir Chrome uzant\u0131s\u0131 kulland\u0131lar. Siber su\u00e7lular, resmi s\u00fcr\u00fcm yerine kendi Metamask s\u00fcr\u00fcmlerini y\u00fckleyerek kurban\u0131n t\u00fcm kripto para i\u015flemlerini g\u00f6zlemleyebildi ve de\u011fi\u015ftirebildi; bu sebeple kurban\u0131n donan\u0131m c\u00fczdan\u0131 kullanmas\u0131 bile yeterli koruma sa\u011flamad\u0131.<\/p>\n<h2 id=\"obscure\">4. En belirsiz h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: 35.000.000 ABD Dolar\u0131<\/strong><\/p>\n<p><strong>Y\u00f6ntem: bilinmiyor<\/strong><\/p>\n<p>2 Haziran 2023\u2019te <a href=\"https:\/\/twitter.com\/zachxbt\/status\/1665267820836319233\" target=\"_blank\" rel=\"noopener nofollow\">sald\u0131rganlar merkezi olmayan Atomic Wallet\u2019\u0131 hedef alarak<\/a> kurban\u0131n token\u2019lar\u0131n\u0131 zimmetine ge\u00e7irdi. Bu olay, mevcut yaz\u0131n\u0131n d\u00fczenlendi\u011fi d\u00f6nemdeki en son \u00f6rnektir. Atomic Wallet\u2019taki geli\u015ftiriciler <a href=\"https:\/\/twitter.com\/AtomicWallet\/status\/1665550651735023616\" target=\"_blank\" rel=\"noopener nofollow\">hack\u2019leme olay\u0131n\u0131 onaylad\u0131lar<\/a>, ancak nas\u0131l ger\u00e7ekle\u015ftirildi\u011fini hen\u00fcz \u00e7\u00f6zemediler. Atomic Wallet, sunucular\u0131nda ne \u015fifrelerin ne de \u00f6zel anahtarlar\u0131n saklanmamas\u0131yla gurur duyan bir \u015firket oldu\u011fu i\u00e7in bu sald\u0131r\u0131 kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131yla ba\u011flant\u0131l\u0131 olabilir.<\/p>\n<p>Kripto para izleme uzmanlar\u0131, kullan\u0131lan aklama y\u00f6ntemlerinin Lazarus grubunun i\u015fleyi\u015f bi\u00e7imiyle benzerlik g\u00f6sterdi\u011fini s\u00f6yl\u00fcyor. E\u011fer sald\u0131rgan ger\u00e7ekten Lazarus ise, bu sald\u0131r\u0131 b\u00fcy\u00fck ihtimalle Atomic Wallet\u2019\u0131n sahte Truva Atl\u0131 bir s\u00fcr\u00fcm\u00fcn\u00fcn kullan\u0131ld\u0131\u011f\u0131 (<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/lazarus-defi-wallet-backdoor\/10645\/\" target=\"_blank\" rel=\"noopener\">DeFi\u2019ye yap\u0131lan sald\u0131r\u0131ya<\/a> benzer bi\u00e7imde) veya resmi uygulamaya bir Truva At\u0131 bula\u015ft\u0131r\u0131larak do\u011frudan geli\u015ftiricilerin hedef al\u0131nd\u0131\u011f\u0131 bir sald\u0131r\u0131 olabilir.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"cinematic\">5. En sinematik h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p>Hasar: 4.000.000 ABD Dolar\u0131<\/p>\n<p><strong>Y\u00f6ntem: y\u00fcz y\u00fcze g\u00f6r\u00fc\u015fme<\/strong><\/p>\n<p>Baz\u0131 siber su\u00e7lular, kripto h\u0131rs\u0131zl\u0131\u011f\u0131 i\u00e7in <em>S\u0131k\u0131ysa Yakala<\/em> tarz\u0131 doland\u0131r\u0131c\u0131l\u0131klar planlar. Hedeflerle \u2014 bu senaryoda hedef yat\u0131r\u0131mc\u0131 arayan \u015firketlerdir \u2014 b\u00fcy\u00fck bir potansiyel yat\u0131r\u0131m\u0131 g\u00f6r\u00fc\u015fmek i\u00e7in \u201cyat\u0131r\u0131m fonlar\u0131\u201d taraf\u0131ndan ileti\u015fime ge\u00e7ilir. Birka\u00e7 telefon g\u00f6r\u00fc\u015fmesi ve e-postadan sonra, l\u00fcks bir otelde kurban se\u00e7ilen startup \u015firketlerin CEO\u2019lar\u0131 ile y\u00fcz y\u00fcze g\u00f6r\u00fc\u015fmeler planlan\u0131r. Bu g\u00f6r\u00fc\u015fmelerde t\u00fcm yasal ve mali konular uzun uzad\u0131ya tart\u0131\u015f\u0131l\u0131r, ard\u0131ndan uygun bir bahaneyle konu yat\u0131r\u0131mlara ve kripto para i\u015fletim \u00fccretlerine getirilir. Sonu\u00e7 olarak, doland\u0131r\u0131c\u0131lar kurban\u0131n tohum c\u00fcmlesine\/ifadesine gizlice bir g\u00f6z atar veya kripto c\u00fczdanlar\u0131n\u0131 k\u0131sa bir s\u00fcreli\u011fine inceleyerek akabinde kurbanlar\u0131n t\u00fcm hesaplar\u0131n\u0131 bo\u015falt\u0131r. Bir vakada kurbanlar <a href=\"https:\/\/www.theregister.com\/2023\/02\/08\/webaverse_crypto_stolen\/\" target=\"_blank\" rel=\"noopener nofollow\">4 milyon ABD Dolar\u0131<\/a> tutar\u0131nda; <a href=\"https:\/\/www.theregister.com\/2023\/02\/16\/fake_crypto_investor_scam\/\" target=\"_blank\" rel=\"noopener nofollow\">burada ayr\u0131nt\u0131l\u0131 olarak a\u00e7\u0131klanan<\/a>bir di\u011ferinde ise 206.000 ABD Dolar\u0131 tutar\u0131nda doland\u0131r\u0131l\u0131rd\u0131.<\/p>\n<h2 id=\"elegant\">6. En zarif h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: bilinmiyor<\/strong><\/p>\n<p><strong>Y\u00f6ntem: sahte mektuplar ve c\u00fczdanlar<\/strong><\/p>\n<p>Bu \u00f6rnek ise dedektif romanlar\u0131ndaki olay \u00f6rg\u00fclerini hat\u0131rlat\u0131yor. \u00c7\u00fcnk\u00fc, siber su\u00e7lular, Ledger donan\u0131m c\u00fczdanlar\u0131n\u0131n al\u0131c\u0131lar\u0131na <em>ka\u011f\u0131ttan<\/em> mektuplar g\u00f6nderdi. Adres listesini almak i\u00e7in ya isimsiz bir \u00fc\u00e7\u00fcnc\u00fc \u015fahs\u0131 (muhtemelen bir Ledger y\u00fcklenicisini) hack\u2019lediler ya da ge\u00e7mi\u015fte ya\u015fanan bir kullan\u0131c\u0131 verisi s\u0131z\u0131nt\u0131s\u0131ndan yararland\u0131lar.<\/p>\n<p>Mektupta, g\u00fcvenlik sorunlar\u0131 nedeniyle al\u0131c\u0131n\u0131n Ledger Nano X donan\u0131m c\u00fczdan\u0131n\u0131n de\u011fi\u015ftirilmesi gerekti\u011fi ve garanti kapsam\u0131nda \u00fccretsiz bir yedek c\u00fczdan\u0131n mektuba ili\u015ftirildi\u011fini yaz\u0131yordu. Ger\u00e7ekte, ekteki kutuda Nano X gibi g\u00f6z\u00fcken ancak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f bir flash s\u00fcr\u00fcc\u00fc bulunuyordu. Flash s\u00fcr\u00fcc\u00fc ilk ba\u015flat\u0131ld\u0131\u011f\u0131nda, program kurbandan \u201canahtar i\u00e7e aktarma\u201d i\u015flemi ger\u00e7ekle\u015ftirmesini ve c\u00fczdana eri\u015fim sa\u011flamak i\u00e7in gizli tohum c\u00fcmlesini\/ifadesini girmesini istedi \u2014 tabii ki bu bilgiyi elde ettikten sonra siber doland\u0131r\u0131c\u0131lar\u0131n ne yapm\u0131\u015f olabileceklerini tahmin etmek \u00e7ok zor de\u011fil. Ancak al\u0131c\u0131lar\u0131n \u00e7o\u011fu bu hileye kanmad\u0131. Olduk\u00e7a ikna edici zarf\u0131na ra\u011fmen mektubun kendisi bir dizi yaz\u0131m hatas\u0131 i\u00e7eriyordu. Dikkatli olan asla kaybetmez!<\/p>\n<h2 id=\"inconspicuous\">7. En g\u00f6ze \u00e7arpmayan h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: bilinmiyor<\/strong><\/p>\n<p><strong>Y\u00f6ntem: k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m<\/strong><\/p>\n<p>En g\u00f6ze \u00e7arpmayan h\u0131rs\u0131zl\u0131k giri\u015fimleri aras\u0131nda, genellikle panonuzu (clipboard) hedef alan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar yard\u0131m\u0131yla ger\u00e7ekle\u015ftirilen <a href=\"https:\/\/securelist.com\/copy-paste-heist-clipboard-injector-targeting-cryptowallets\/109186\/\" target=\"_blank\" rel=\"noopener\">adres de\u011fi\u015ftirme sald\u0131r\u0131lar\u0131<\/a> yer al\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, kurban\u0131n bilgisayar\u0131na bula\u015ft\u0131ktan sonra sessizce panoyu kripto c\u00fczdan adresleri i\u00e7in izler. Kurban c\u00fczdan adresini girdi\u011finde, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kurban\u0131n adresini \u200b\u200bsald\u0131rgan\u0131n c\u00fczdan\u0131n\u0131n adresiyle de\u011fi\u015ftirir. Siber su\u00e7lular, kripto para transferleri s\u0131ras\u0131nda adresleri kopyalay\u0131p yap\u0131\u015ft\u0131rarak kolayca bu paralar\u0131 kendi hesaplar\u0131na y\u00f6nlendirebilir.<\/p>\n<h2 id=\"hurtful\">8. En incitici h\u0131rs\u0131zl\u0131k \u00f6rne\u011fi<\/h2>\n<p><strong>Hasar: 15.000 ABD Dolar\u0131<\/strong><\/p>\n<p><strong>Y\u00f6ntem: a\u015fk mektuplar\u0131<\/strong><\/p>\n<p>Romantik doland\u0131r\u0131c\u0131l\u0131klar, \u00f6zel hayat\u0131n\u0131 \u00f6n planda tutan kripto yat\u0131r\u0131mc\u0131lar\u0131n\u0131 aldatman\u0131n en yayg\u0131n yollar\u0131ndan biri olmaya devam ediyor. Bir \u00f6rne\u011fe g\u00f6z atal\u0131m. Kevin Kok, y\u0131llar\u0131n kripto deneyimine sahipti, ancak <a href=\"https:\/\/www.wptv.com\/news\/local-news\/investigations\/boynton-beach-man-warns-others-after-losing-15-000-in-cryptocurrency-scam\" target=\"_blank\" rel=\"noopener nofollow\">romantik vaadlerle o da kand\u0131r\u0131ld\u0131<\/a>. Bir tan\u0131\u015fma sitesinde bir kad\u0131nla tan\u0131\u015ft\u0131ktan sonra bu kad\u0131nla birka\u00e7 ay sohbet etti. Bu s\u00fcre zarf\u0131nda yat\u0131r\u0131m konular\u0131 g\u00fcndeme bile gelmedi. Bir g\u00fcn kad\u0131n durup dururken kripto yat\u0131r\u0131mlar\u0131 \u00fczerine kullan\u0131\u015fl\u0131 yeni bir uygulama hakk\u0131nda \u201ckendisinin de arkada\u015flar\u0131ndan edindi\u011fi baz\u0131 bilgileri\u201d Kevin Kok ile payla\u015ft\u0131. S\u00f6yledi\u011fine g\u00f6re bu uygulamay\u0131 anlamakta zorlan\u0131yordu ve kendi (!) paras\u0131n\u0131 bu uygulamaya yat\u0131rabilmek i\u00e7in yard\u0131m istedi. Elbette Kevin yard\u0131m etmeyi teklif etti. Yeni sevgilisinin varl\u0131klar\u0131n\u0131n giderek daha \u00e7ok de\u011ferlendi\u011fini g\u00f6rd\u00fc\u011f\u00fcnde bu uygulaman\u0131n iyi \u00e7al\u0131\u015ft\u0131\u011f\u0131ndan emin oldu. Bunun \u00fczerine kendi paras\u0131n\u0131 da yat\u0131rmaya karar verdi ve y\u00fcksek getiri elde edece\u011fini d\u00fc\u015f\u00fcnerek bir s\u00fcre mutlu oldu. Ancak Kevin, s\u00f6z konusu kad\u0131n aniden t\u00fcm mesajla\u015fma uygulamalar\u0131ndan kayboldu\u011funda ve mesajlar\u0131na yan\u0131t vermeyi b\u0131rakt\u0131\u011f\u0131nda \u015f\u00fcphelenmeye ba\u015flad\u0131. \u0130\u015fte o zaman bu yeni \u201cyat\u0131r\u0131m sisteminden\u201d paras\u0131n\u0131 \u00e7ekmenin m\u00fcmk\u00fcn olmad\u0131\u011f\u0131n\u0131 ac\u0131 olsa da ke\u015ffetti.<\/p>\n<h2 id=\"stay_safe\">Kendimizi bu h\u0131rs\u0131zl\u0131k giri\u015fimlerinden nas\u0131l koruyabiliriz?<\/h2>\n<p>Zaten <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/11394\/\" target=\"_blank\" rel=\"noopener\">kripto yat\u0131r\u0131mc\u0131lar\u0131 i\u00e7in ayr\u0131nt\u0131l\u0131 \u00f6neriler<\/a> payla\u015ft\u0131k. Bu y\u00fczden burada sadece iki \u00f6nerimizi tekrarlayaca\u011f\u0131z: kriptoyla ilgili t\u00fcm tekliflere, e-postalara, mektuplara ve masum sorulara azami \u015f\u00fcpheyle yakla\u015f\u0131n ve ilgili t\u00fcm cihazlarda her zaman kripto yat\u0131r\u0131mlar\u0131 i\u00e7in \u00f6zel olarak haz\u0131rlanm\u0131\u015f bir g\u00fcvenlik yaz\u0131l\u0131m\u0131 kullan\u0131n. Ve mutlaka bir veya gerekirse birden fazla cihaz\u0131n\u0131z i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> aboneli\u011fini tavsiye ediyoruz. Yukar\u0131daki \u00f6rneklerin de net bir \u015fekilde g\u00f6sterdi\u011fi gibi, bu abonelik i\u00e7in \u00f6deyece\u011finiz tutar, bu t\u00fcr doland\u0131r\u0131c\u0131l\u0131klara kurban gitmeniz halinde kaybedebilece\u011finiz varl\u0131klara k\u0131yasla k\u00fc\u00e7\u00fck bir su damlas\u0131yla e\u015fde\u011fer. Premium, kripto yat\u0131r\u0131mlar\u0131n\u0131z\u0131 korumak i\u00e7in \u00f6zel ara\u00e7lar i\u00e7erir:<\/p>\n<ul>\n<li>Kripto para doland\u0131r\u0131c\u0131l\u0131\u011f\u0131na ve yetkisiz kripto madencili\u011fine kar\u015f\u0131 koruma<\/li>\n<li>Bankac\u0131l\u0131k uygulamalar\u0131 ve finansal i\u015flemler i\u00e7in ek koruma<\/li>\n<li>Kimlik av\u0131 korumas\u0131<\/li>\n<li>Parola giri\u015f pencereleri i\u00e7in \u00f6zel anti-keylogger korumas\u0131<\/li>\n<li>Bilgisayar\u0131n\u0131za uzaktan eri\u015fimin alg\u0131lanmas\u0131<\/li>\n<li>Hassas veriler i\u00e7in parola y\u00f6neticisi ve g\u00fcvenli depolama<\/li>\n<li>Uygulama davran\u0131\u015f\u0131 kontrol\u00fc ile ger\u00e7ek zamanl\u0131 antivir\u00fcs korumas\u0131<\/li>\n<li>Potansiyel olarak tehlikeli bulunan uygulamalar hakk\u0131nda uyar\u0131lar<\/li>\n<li>Uygulamalar\u0131n eski s\u00fcr\u00fcmleri ve resmi kaynaklardan gelen g\u00fcncellemeler i\u00e7in otomatik arama<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec-crypto\"><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Nitelik konusunda birbiriyle yar\u0131\u015fan blok zinciri sald\u0131r\u0131lar\u0131n\u0131n t\u00fcm\u00fc: t\u00fcm zamanlar\u0131n en b\u00fcy\u00fck, en iyi planlanm\u0131\u015f, en c\u00fcretk\u00e2r kripto para soygunlar\u0131.<\/p>\n","protected":false},"author":2722,"featured_media":11551,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[374,1098,612,1444,649,519,2616,1831,2577,561,537],"class_list":{"0":"post-11549","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-bitcoin","10":"tag-blok-zinciri","11":"tag-dolandiricilik","12":"tag-ethereum","13":"tag-hirsizlik","14":"tag-ipuclari-2","15":"tag-kripto-cuzdani","16":"tag-kripto-paralar","17":"tag-nft","18":"tag-sifreler","19":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top-eight-crypto-scams-2023\/11549\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top-eight-crypto-scams-2023\/25837\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/21278\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/10842\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/28535\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top-eight-crypto-scams-2023\/26136\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/26480\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top-eight-crypto-scams-2023\/28959\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top-eight-crypto-scams-2023\/27875\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top-eight-crypto-scams-2023\/35628\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top-eight-crypto-scams-2023\/48489\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top-eight-crypto-scams-2023\/20788\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top-eight-crypto-scams-2023\/21474\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top-eight-crypto-scams-2023\/30308\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top-eight-crypto-scams-2023\/34204\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top-eight-crypto-scams-2023\/26451\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top-eight-crypto-scams-2023\/32146\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top-eight-crypto-scams-2023\/31830\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kripto-paralar\/","name":"kripto paralar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11549"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11549\/revisions"}],"predecessor-version":[{"id":11554,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11549\/revisions\/11554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11551"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}