{"id":11932,"date":"2023-12-20T10:00:14","date_gmt":"2023-12-20T07:00:14","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=11932"},"modified":"2023-12-15T23:16:21","modified_gmt":"2023-12-15T20:16:21","slug":"macos-users-cyberthreats-2023","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/macos-users-cyberthreats-2023\/11932\/","title":{"rendered":"Mac&#8217;ler g\u00fcvenli mi? MacOS kullan\u0131c\u0131lar\u0131na y\u00f6nelik tehditler"},"content":{"rendered":"<p>Bir\u00e7ok Apple kullan\u0131c\u0131s\u0131 macOS i\u015fletim sisteminin hi\u00e7bir siber tehdidin kendilerine zarar veremeyece\u011fi kadar g\u00fcvenli oldu\u011funa inan\u0131yor ve bu y\u00fczden cihazlar\u0131n\u0131 koruma konusunda endi\u015felenmelerine gerek olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyor. Ancak durum bundan \u00e7ok farkl\u0131: macOS\u2019a y\u00f6nelik k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n say\u0131s\u0131 daha az olsa da, yine de say\u0131lar\u0131 Apple cihaz sahiplerinin d\u00fc\u015f\u00fcnmek istedi\u011finden \u00e7ok daha <em>fazla<\/em>.<\/p>\n<p>Bu yaz\u0131da macOS kullan\u0131c\u0131lar\u0131n\u0131n kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu g\u00fcncel tehditleri ve Mac\u2019inizi nas\u0131l etkili bir \u015fekilde koruyabilece\u011finize de\u011finiyoruz. macOS i\u00e7in vir\u00fcslerin var oldu\u011fu ger\u00e7e\u011fini g\u00f6stermek i\u00e7in, son birka\u00e7 hafta i\u00e7inde yay\u0131nlanan \u00e7e\u015fitli k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m aileleri \u00fczerine yap\u0131lan \u00fc\u00e7 yeni ara\u015ft\u0131rmaya bakaca\u011f\u0131z.<\/p>\n<h2>BlueNoroff macOS kullan\u0131c\u0131lar\u0131na sald\u0131r\u0131yor ve kripto para \u00e7al\u0131yor<\/h2>\n<p>Ekim 2023\u2019\u00fcn sonlar\u0131nda ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z, Kuzey Kore i\u00e7in \u00e7al\u0131\u015fan <a target=\"_blank\" href=\"https:\/\/apt.securelist.com\/apt\/lazarus\" rel=\"noopener\">Lazarus<\/a> APT grubunun \u201cticari kanad\u0131\u201d <a target=\"_blank\" href=\"https:\/\/apt.securelist.com\/apt\/bluenoroff\" rel=\"noopener\">BlueNoroff<\/a> ile ili\u015fkili oldu\u011funa inan\u0131lan <a target=\"_blank\" href=\"https:\/\/securelist.com\/bluenoroff-new-macos-malware\/111290\/\" rel=\"noopener\">yeni bir macOS Truva at\u0131 ke\u015ffetti<\/a>. Bu alt grup finansal sald\u0131r\u0131lar konusunda uzmanla\u015fm\u0131\u015ft\u0131r ve \u00f6zellikle iki \u015feye odaklan\u0131rlar: birincisi, <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/lazarus-modus-operandi-and-countermeasures\/6716\/\" rel=\"noopener nofollow\">Banglade\u015f Merkez Bankas\u0131 soygunu<\/a> da dahil olmak \u00fczere SWIFT sistemine y\u00f6nelik sald\u0131r\u0131lar ve ikincisi, kurulu\u015flardan ve bireylerden kripto para \u00e7almak.<\/p>\n<p>Ke\u015ffedilen macOS <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/knowledge\/trojan-downloader\/\" rel=\"noopener\">Trojan indiricisi <\/a>k\u00f6t\u00fc niyetli ar\u015fivler i\u00e7inde da\u011f\u0131t\u0131l\u0131yor. \u201cKripto varl\u0131klar ve finansal istikrar i\u00e7in riskleri\u201d ba\u015fl\u0131kl\u0131 bir PDF belgesi olarak gizlenmi\u015f ve bu belgenin \u00f6nizlemesini taklit eden bir simgeye sahip.<\/p>\n<div id=\"attachment_11934\" style=\"width: 2327px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/12\/15230744\/macos-users-cyberthreats-2023-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11934\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/12\/15230744\/macos-users-cyberthreats-2023-01.png\" alt=\"BlueNoroff\/RustBucket: tuzak PDF'nin kapak sayfas\u0131 \" width=\"2317\" height=\"1104\" class=\"size-full wp-image-11934\"><\/a><p id=\"caption-attachment-11934\" class=\"wp-caption-text\">Trojan\u0131n y\u00fckledi\u011fi ve vir\u00fcs bula\u015fm\u0131\u015f bir ar\u015fivden dosyay\u0131 ba\u015flat\u0131rken kullan\u0131c\u0131ya g\u00f6sterdi\u011fi aldat\u0131c\u0131 PDF\u2019nin kapak sayfas\u0131. <a target=\"_blank\" href=\"https:\/\/securelist.com\/bluenoroff-new-macos-malware\/111290\/\" rel=\"noopener\">Kaynak<\/a><\/p><\/div>\n<p>Kullan\u0131c\u0131 (PDF gibi g\u00f6r\u00fcnen) Trojana t\u0131klad\u0131\u011f\u0131nda, ilgili PDF belgesini internetten indiren ve a\u00e7an bir komut dosyas\u0131 \u00e7al\u0131\u015ft\u0131r\u0131l\u0131yor. Ancak, elbette, t\u00fcm olanlar bu kadar de\u011fil. Trojan\u0131n ana g\u00f6revi, bula\u015ft\u0131\u011f\u0131 sistem hakk\u0131nda bilgi toplayan ba\u015fka bir vir\u00fcs indirmek, bunu C2\u2019ye g\u00f6ndermek ve ard\u0131ndan iki olas\u0131 eylemden birini ger\u00e7ekle\u015ftirmek i\u00e7in bir komut beklemektir. Bu eylemlerden biri kendini silme di\u011feri de bir dosyaya kaydetme ve sunucudan yan\u0131t olarak g\u00f6nderilen k\u00f6t\u00fc ama\u00e7l\u0131 kodu \u00e7al\u0131\u015ft\u0131rma.<\/p>\n<h2>macOS i\u00e7in korsan yaz\u0131l\u0131mda Proxy Trojan<\/h2>\n<p>Kas\u0131m 2023\u2019\u00fcn sonlar\u0131nda, ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z Mac kullan\u0131c\u0131lar\u0131n\u0131 tehdit eden ba\u015fka bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rne\u011fi daha ke\u015ffetti: macOS i\u00e7in korsan yaz\u0131l\u0131mla birlikte da\u011f\u0131t\u0131lan bir proxy Trojan. \u00d6zellikle, bu Trojan k\u0131r\u0131lm\u0131\u015f video d\u00fczenleme programlar\u0131n\u0131n, veri kurtarma ara\u00e7lar\u0131n\u0131n, a\u011f yard\u0131mc\u0131 programlar\u0131n\u0131n, dosya d\u00f6n\u00fc\u015ft\u00fcr\u00fcc\u00fclerinin ve di\u011fer bir\u00e7ok yaz\u0131l\u0131m\u0131n PKG dosyalar\u0131na eklenmi\u015fti. Uzmanlar\u0131m\u0131z taraf\u0131ndan ke\u015ffedilen vir\u00fcsl\u00fc y\u00fckleyicilerin tam listesi <a target=\"_blank\" href=\"https:\/\/securelist.com\/trojan-proxy-for-macos\/111325\/\" rel=\"noopener\">Securelist\u2019te yay\u0131nlanan raporun<\/a> sonunda bulunabilir.<\/p>\n<p>Daha \u00f6nce de belirtildi\u011fi gibi, bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m proxy Trojanlar kategorisine girmektedir. Bunlar vir\u00fcsl\u00fc bilgisayarda bir proxy sunucusu kuran ve esasen internet trafi\u011fini y\u00f6nlendirmek i\u00e7in bir ana bilgisayar olu\u015fturan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlard\u0131r. Daha sonra, siber su\u00e7lular bu t\u00fcr vir\u00fcsl\u00fc cihazlar\u0131 kullanarak \u00fccretli bir proxy sunucu a\u011f\u0131 olu\u015fturabilir ve bu t\u00fcr hizmetler arayanlardan para kazanabilirler.<\/p>\n<p>Alternatif olarak, Trojan\u0131n sahipleri vir\u00fcs bula\u015fm\u0131\u015f bilgisayarlar\u0131 do\u011frudan kurban\u0131n ad\u0131na web sitelerine, \u015firketlere veya di\u011fer kullan\u0131c\u0131lara sald\u0131rmak veya silah, uyu\u015fturucu veya di\u011fer yasa d\u0131\u015f\u0131 mallar\u0131 sat\u0131n almak gibi su\u00e7 faaliyetleri y\u00fcr\u00fctmek i\u00e7in kullanabilir..<\/p>\n<h2>Sahte Safari taray\u0131c\u0131 g\u00fcncellemelerinde Atomic h\u0131rs\u0131z\u0131<\/h2>\n<p>Ayr\u0131ca Kas\u0131m 2023\u2019te, Atomic olarak bilinen ve <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/trojan-psw-psw-password-stealing-ware\/\" rel=\"noopener\">h\u0131rs\u0131zl\u0131k<\/a> kategorisine ait olan macOS i\u00e7in ba\u015fka bir Truva at\u0131n\u0131 yayan yeni bir k\u00f6t\u00fc ama\u00e7l\u0131 kampanya <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/atomic-stealer-malware-strikes-macos-via-fake-browser-updates\/\">ke\u015ffedildi<\/a>. Bu t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, kurban\u0131n bilgisayar\u0131nda bulunan her t\u00fcrl\u00fc de\u011ferli bilgiyi, \u00f6zellikle de taray\u0131c\u0131larda kay\u0131tl\u0131 verileri arar, \u00e7\u0131kar\u0131r ve yarat\u0131c\u0131lar\u0131na g\u00f6nderir. Giri\u015fler ve parolalar, banka kart\u0131 bilgileri, kripto c\u00fczdan anahtarlar\u0131 ve benzeri hassas bilgiler h\u0131rs\u0131zlar i\u00e7in \u00f6zellikle de\u011ferlidir.<\/p>\n<p>Atomic Trojan ilk olarak Mart 2023\u2019te <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-atomic-macos-info-stealing-malware-targets-50-crypto-wallets\/\">ke\u015ffedilmi\u015f ve tan\u0131mlanm\u0131\u015ft\u0131r<\/a>. Yeni olan \u015fey ise sald\u0131rganlar\u0131n Atomic Trojan\u2019\u0131 yaymak i\u00e7in Safari ve Chrome taray\u0131c\u0131lar\u0131 i\u00e7in sahte g\u00fcncellemeler kullanmaya ba\u015flam\u0131\u015f olmalar\u0131. Bu g\u00fcncellemeler, orijinal Apple ve Google web sitelerini \u00e7ok inand\u0131r\u0131c\u0131 bir \u015fekilde taklit eden k\u00f6t\u00fc ama\u00e7l\u0131 sayfalardan indiriliyor.<\/p>\n<div id=\"attachment_11935\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/12\/15230742\/macos-users-cyberthreats-2023-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11935\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/12\/15230742\/macos-users-cyberthreats-2023-02.jpg\" alt=\"\u0130\u00e7inde h\u0131rs\u0131z Trojan bulunan sahte Safari taray\u0131c\u0131 g\u00fcncellemeleri\" width=\"1600\" height=\"1198\" class=\"size-full wp-image-11935\"><\/a><p id=\"caption-attachment-11935\" class=\"wp-caption-text\">Asl\u0131nda Atomic h\u0131rs\u0131z\u0131n\u0131 i\u00e7eren sahte Safari taray\u0131c\u0131 g\u00fcncellemeleri i\u00e7eren bir site. <a target=\"_blank\" rel=\"nofollow noopener\">Kaynak<\/a><\/p><\/div>\n<p>Atomic Trojan\u0131 bir sistemde \u00e7al\u0131\u015fmaya ba\u015flad\u0131\u011f\u0131nda, kurban\u0131n bilgisayar\u0131ndan \u015fu bilgileri \u00e7almaya \u00e7al\u0131\u015f\u0131r:<\/p>\n<ul>\n<li>tan\u0131mlama bilgileri<\/li>\n<li>taray\u0131c\u0131da saklanan oturum a\u00e7ma bilgileri, parolalar ve banka kart\u0131 bilgileri<\/li>\n<li>macOS parola depolama sisteminden (<a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/tr.wikipedia.org\/wiki\/Anahtar_Zinciri_(yaz%C4%B1l%C4%B1m)\">Anahtar Zinciri<\/a>) parolalar<\/li>\n<li>sabit s\u00fcr\u00fcc\u00fcde depolanan dosyalar<\/li>\n<li>50\u2019den fazla pop\u00fcler kripto para birimi uzant\u0131s\u0131ndan depolanan veriler<\/li>\n<\/ul>\n<h2>macOS\u2019te s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131<\/h2>\n<p>Ne yaz\u0131k ki, herhangi bir \u015f\u00fcpheli dosya indirmeseniz, bilinmeyen kaynaklardan gelen ekleri a\u00e7maktan ka\u00e7\u0131nsan\u0131z ve genellikle \u015f\u00fcpheli herhangi bir \u015feye t\u0131klamaktan ka\u00e7\u0131nsan\u0131z bile, bunlar g\u00fcvenli\u011finizi garanti etmez. Herhangi bir yaz\u0131l\u0131m\u0131n, sald\u0131rganlar\u0131n bir cihaza vir\u00fcs bula\u015ft\u0131rmak i\u00e7in kullanabilece\u011fi ve \u00e7ok az aktif kullan\u0131c\u0131 eylemi gerektiren veya hi\u00e7 gerektirmeyen g\u00fcvenlik a\u00e7\u0131klar\u0131na her zaman sahip oldu\u011funu unutmamak \u00f6nemlidir. macOS i\u015fletim sistemi de bu kural\u0131n bir istisnas\u0131 de\u011fildir.<\/p>\n<p>K\u0131sa bir s\u00fcre \u00f6nce Safari taray\u0131c\u0131s\u0131nda iki s\u0131f\u0131r g\u00fcn a\u00e7\u0131\u011f\u0131 <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/apple\/apple-fixes-two-new-ios-zero-days-in-emergency-updates\/\">ke\u015ffedildi<\/a> ve <a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/support.apple.com\/tr-tr\/HT214031\">Apple\u2019\u0131n duyurusuna<\/a> g\u00f6re, bunlar ke\u015ffedildikleri s\u0131rada siber su\u00e7lular bunlar\u0131 zaten kullan\u0131yorlard\u0131. Sald\u0131rganlar, kurban\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 bir web sayfas\u0131na \u00e7ekerek, herhangi bir ek kullan\u0131c\u0131 eylemi olmaks\u0131z\u0131n cihazlar\u0131na vir\u00fcs bula\u015ft\u0131rabilir ve b\u00f6ylece cihaz\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irerek cihazdan veri \u00e7alabilir. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131 Safari taray\u0131c\u0131s\u0131n\u0131 kullanan t\u00fcm cihazlar i\u00e7in ge\u00e7erli olup hem iOS\/iPadOS kullan\u0131c\u0131lar\u0131 hem de Mac sahipleri i\u00e7in tehdit olu\u015fturur.<\/p>\n<p>Bu yayg\u0131n bir senaryodur: Apple\u2019\u0131n i\u015fletim sistemleri bir\u00e7ok bile\u015feni payla\u015ft\u0131\u011f\u0131ndan, g\u00fcvenlik a\u00e7\u0131klar\u0131 genellikle \u015firketin i\u015fletim sistemlerinden yaln\u0131zca biri i\u00e7in de\u011fil, hepsi i\u00e7in ge\u00e7erlidir. Dolay\u0131s\u0131yla bu, Mac\u2019lerin iPhone\u2019un pop\u00fclaritesi taraf\u0131ndan ihanete u\u011frad\u0131\u011f\u0131 bir durumdur: iOS kullan\u0131c\u0131lar\u0131 birincil hedeflerdir, ancak bu g\u00fcvenlik a\u00e7\u0131klar\u0131 macOS\u2019a sald\u0131rmak i\u00e7in de kolayca kullan\u0131labilir.<\/p>\n<p>Apple\u2019\u0131n i\u015fletim sistemlerinde 2023 y\u0131l\u0131nda sald\u0131rganlar taraf\u0131ndan aktif olarak kullan\u0131ld\u0131\u011f\u0131 bilinen toplam 19 s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ke\u015ffedilmi\u015ftir. Bunlardan 17\u2019si macOS kullan\u0131c\u0131lar\u0131n\u0131 etkiledi; bir d\u00fczineden fazlas\u0131 y\u00fcksek riskli stat\u00fcde ve biri de kritik olarak s\u0131n\u0131fland\u0131r\u0131ld\u0131.<\/p>\n<div id=\"attachment_11936\" style=\"width: 2304px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/12\/15230747\/macos-users-cyberthreats-2023-03.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-11936\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2023\/12\/15230747\/macos-users-cyberthreats-2023-03.png\" alt=\"iOS ve macOS'ta s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131: CVE-2023-42917, CVE-2023-42916, CVE-2023-42824, CVE-2023-41993, CVE-2023-41992, CVE-2023-41991, CVE-2023-41064, CVE-2023-41061, CVE-2023-38606, CVE-2023-37450, CVE-2023-32439, CVE-2023-32435, CVE-2023-32434, CVE-2023-32409, CVE-2023-32373, CVE-2023-28204, CVE-2023-28206, CVE-2023-28205, CVE-2023-23529 \" width=\"2294\" height=\"1606\" class=\"size-full wp-image-11936\"><\/a><p id=\"caption-attachment-11936\" class=\"wp-caption-text\">macOS, iOS ve iPadOS\u2019te 2023 y\u0131l\u0131nda ke\u015ffedilen ve siber su\u00e7lular taraf\u0131ndan aktif olarak kullan\u0131lan s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131klar\u0131<\/p><\/div>\n<h2>Di\u011fer tehditler ve Mac\u2019inizi nas\u0131l koruyaca\u011f\u0131n\u0131z<\/h2>\n<p>Unutulmamas\u0131 gereken \u015fey, i\u015fletim sistemine ba\u011fl\u0131 olmayan ancak k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlardan daha az tehlikeli olmayan \u00e7ok say\u0131da siber tehdit oldu\u011fudur. \u00d6zellikle a\u015fa\u011f\u0131daki tehditlere kar\u015f\u0131 dikkatli olun:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-yourself-from-phishing\/10132\/\" rel=\"noopener\">Kimlik av\u0131<\/a> <strong>ve sahte web siteleri.<\/strong> Kimlik av\u0131 e-postalar\u0131 ve web siteleri hem Windows kullan\u0131c\u0131lar\u0131 hem de Mac sahipleri i\u00e7in ayn\u0131 \u015fekilde \u00e7al\u0131\u015f\u0131r. Ne yaz\u0131k ki, t\u00fcm sahte e-postalar ve web siteleri kolayca tan\u0131namaz. Bu nedenle deneyimli kullan\u0131c\u0131lar bile oturum a\u00e7ma kimlik bilgilerinin \u00e7al\u0131nmas\u0131 riskiyle kar\u015f\u0131 kar\u015f\u0131ya kal\u0131rlar.<\/li>\n<li><strong>Web skimmer\u2019lar<\/strong><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/illicit-code-on-legitimate-sites\/11612\/\" rel=\"noopener\">gibi \u00fczere web tehditleri<\/a><strong>.<\/strong> K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar yaln\u0131zca kullan\u0131c\u0131n\u0131n cihaz\u0131na de\u011fil, ayn\u0131 zamanda ileti\u015fim kurdu\u011fu sunucuya da bula\u015fabilir. \u00d6rne\u011fin, sald\u0131rganlar genellikle k\u00f6t\u00fc korunan web sitelerini, \u00f6zellikle de \u00e7evrimi\u00e7i ma\u011fazalar\u0131 hackler ve bunlara web skimmer\u2019lar\u0131 y\u00fckler. Bu k\u00fc\u00e7\u00fck yaz\u0131l\u0131m mod\u00fclleri, ziyaret\u00e7iler taraf\u0131ndan girilen banka kart\u0131 verilerini yakalamak ve \u00e7almak i\u00e7in tasarlanm\u0131\u015ft\u0131r.<\/li>\n<li><strong>K\u00f6t\u00fc ama\u00e7l\u0131<\/strong> <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/dangers-of-browser-extensions\/11016\/\" rel=\"noopener\"><strong>taray\u0131c\u0131 uzant\u0131lar\u0131<\/strong><\/a><strong>.<\/strong> Bu k\u00fc\u00e7\u00fck yaz\u0131l\u0131m mod\u00fclleri do\u011frudan taray\u0131c\u0131ya y\u00fcklenir ve taray\u0131c\u0131 i\u00e7inde \u00e7al\u0131\u015f\u0131r, bu nedenle kullan\u0131lan i\u015fletim sistemine ba\u011fl\u0131 de\u011fildir. G\u00f6r\u00fcn\u00fc\u015fte zarars\u0131z olmalar\u0131na ra\u011fmen, uzant\u0131lar \u00e7ok \u015fey yapabilir: ziyaret edilen t\u00fcm sayfalar\u0131n i\u00e7eri\u011fini okuyabilir, kullan\u0131c\u0131 taraf\u0131ndan girilen bilgileri (\u015fifreler, kart numaralar\u0131, kripto c\u00fczdanlar\u0131n\u0131n anahtarlar\u0131) g\u00f6rebilir ve hatta g\u00f6r\u00fcnt\u00fclenen sayfa i\u00e7eri\u011fini de\u011fi\u015ftirebilir.<\/li>\n<li><strong>Trafi\u011fe m\u00fcdahale ve<\/strong> <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" rel=\"noopener\">ortadaki adam<\/a> <strong>(MITM) sald\u0131r\u0131lar\u0131. <\/strong>\u00c7o\u011fu modern web sitesi \u015fifreli ba\u011flant\u0131lar (HTTPS) kullan\u0131r, ancak yine de bazen veri al\u0131\u015fveri\u015fine m\u00fcdahale edilebilecek HTTP sitelerine rastlayabilirsiniz. Siber su\u00e7lular bu t\u00fcr engellemeleri MITM sald\u0131r\u0131lar\u0131 ba\u015flatmak i\u00e7in kullanarak kullan\u0131c\u0131lara me\u015fru sayfalar yerine sahte veya vir\u00fcsl\u00fc sayfalar sunarlar.<\/li>\n<\/ul>\n<p>Cihaz\u0131n\u0131z\u0131, \u00e7evrimi\u00e7i hizmet hesaplar\u0131n\u0131z\u0131 ve en \u00f6nemlisi i\u00e7erdikleri de\u011ferli bilgileri korumak i\u00e7in hem Mac bilgisayarlarda hem de iPhone\/iPad\u2019lerde <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-protection-for-financial-security\/11869\/\" rel=\"noopener\">kapsaml\u0131 koruma<\/a> kullanmak \u00e7ok \u00f6nemlidir. Bu t\u00fcr bir koruma, <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> \u00f6rne\u011fin, etkinli\u011fi ba\u011f\u0131ms\u0131z test laboratuvarlar\u0131ndan al\u0131nan \u00e7ok say\u0131da \u00f6d\u00fclle onaylanm\u0131\u015f olan bizim gibi \u00e7\u00f6z\u00fcmler, t\u00fcm tehditlere kar\u015f\u0131 koruma sa\u011flayabilmelidir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Mac&#8217;ler sahiplerinin sand\u0131\u011f\u0131 kadar g\u00fcvenli mi? MacOS kullan\u0131c\u0131lar\u0131n\u0131 hedef alan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla ilgili birka\u00e7 yeni haber.<\/p>\n","protected":false},"author":2706,"featured_media":11933,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[2691,14,493,2692,744,790,1564,2629,1831,1454,1170,1525,561,537],"class_list":{"0":"post-11932","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-0gunler","9":"tag-apple","10":"tag-apt","11":"tag-bluenoroff","12":"tag-guvenlik","13":"tag-guvenlik-aciklari","14":"tag-hesaplar","15":"tag-hirsizlar","16":"tag-kripto-paralar","17":"tag-lazarus","18":"tag-macos","19":"tag-parolalar","20":"tag-sifreler","21":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/macos-users-cyberthreats-2023\/11932\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/macos-users-cyberthreats-2023\/26761\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/22175\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/11289\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/29512\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/macos-users-cyberthreats-2023\/27029\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/26912\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/macos-users-cyberthreats-2023\/29483\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/macos-users-cyberthreats-2023\/28315\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/macos-users-cyberthreats-2023\/36683\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/macos-users-cyberthreats-2023\/50018\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/macos-users-cyberthreats-2023\/21320\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/macos-users-cyberthreats-2023\/22094\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/macos-users-cyberthreats-2023\/30758\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/macos-users-cyberthreats-2023\/35433\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/macos-users-cyberthreats-2023\/28953\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/macos-users-cyberthreats-2023\/27273\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/macos-users-cyberthreats-2023\/33045\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/macos-users-cyberthreats-2023\/32668\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=11932"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11932\/revisions"}],"predecessor-version":[{"id":11938,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/11932\/revisions\/11938"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/11933"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=11932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=11932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=11932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}