{"id":13214,"date":"2025-03-17T10:26:01","date_gmt":"2025-03-17T07:26:01","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13214"},"modified":"2025-03-17T16:46:21","modified_gmt":"2025-03-17T13:46:21","slug":"bybit-hack-lessons-how-to-do-self-custody-properly","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/13214\/","title":{"rendered":"Bybit sald\u0131r\u0131s\u0131ndan \u00e7\u0131kar\u0131lacak dersler: Kripto para nas\u0131l g\u00fcvenli bir \u015fekilde saklan\u0131r?"},"content":{"rendered":"<p>21 \u015eubat, tarihinin en b\u00fcy\u00fck soygununu ya\u015fad\u0131\u011f\u0131 i\u00e7in, kripto piyasas\u0131 i\u00e7in karanl\u0131k bir g\u00fcnd\u00fc. Sald\u0131rganlar d\u00fcnyan\u0131n en b\u00fcy\u00fck ikinci kripto borsas\u0131 olan Bybit\u2019ten yakla\u015f\u0131k 1,5 milyar dolar \u00e7ald\u0131 ve uzmanlar bunun t\u00fcm zamanlar\u0131n en b\u00fcy\u00fck h\u0131rs\u0131zl\u0131\u011f\u0131 oldu\u011funu belirtti. Ne bu kay\u0131p ne de pani\u011fe kap\u0131lan yat\u0131r\u0131mc\u0131lar\u0131n 5 milyar dolar daha \u00e7ekmesi Bybit i\u00e7in \u00f6l\u00fcmc\u00fcl olmasa da, olay modern kripto ekosistemindeki temel kusurlar\u0131n alt\u0131n\u0131 \u00e7iziyor ve s\u0131radan kullan\u0131c\u0131lar i\u00e7in baz\u0131 de\u011ferli dersler sunuyor.<\/p>\n<h2>Bybit nas\u0131l soyuldu?<\/h2>\n<p>T\u00fcm b\u00fcy\u00fck kripto borsalar\u0131 gibi Bybit de saklanan kripto paralar\u0131 \u00e7ok katmanl\u0131 korumayla g\u00fcvence alt\u0131na al\u0131r. Fonlar\u0131n \u00e7o\u011fu, \u00e7evrimi\u00e7i sistemlerle ba\u011flant\u0131s\u0131 kesilmi\u015f <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/five-threats-hardware-crypto-wallets\/11425\/\" target=\"_blank\" rel=\"noopener\">so\u011fuk c\u00fczdanlarda<\/a> saklan\u0131r. Mevcut varl\u0131klara para y\u00fcklenmesi gerekti\u011finde, gerekli mebla\u011f manuel olarak so\u011fuk c\u00fczdandan s\u0131cak c\u00fczdana ta\u015f\u0131n\u0131r ve i\u015flem ayn\u0131 anda birka\u00e7 \u00e7al\u0131\u015fan taraf\u0131ndan imzalan\u0131r. Bunun i\u00e7in Bybit, Safe{Wallet}\u2019\u0131n \u00e7oklu imza (multisig) \u00e7\u00f6z\u00fcm\u00fcn\u00fc kullan\u0131r ve i\u015fleme dahil olan her \u00e7al\u0131\u015fan <a href=\"https:\/\/www.certik.com\/resources\/blog\/bybit-incident-technical-analysis\" target=\"_blank\" rel=\"nofollow noopener\">\u00f6zel bir Donan\u0131m C\u00fczdan\u0131 kripto anahtar\u0131n\u0131<\/a> kullanarak i\u015flemi imzalar.<\/p>\n<p>Sald\u0131rganlar sistemi detayl\u0131 bir \u015fekilde incelemi\u015f ve ba\u011f\u0131ms\u0131z ara\u015ft\u0131rmac\u0131lara g\u00f6re bir Safe{Wallet} geli\u015ftirici makinesini ele ge\u00e7irmi\u015flerdi. Muhtemelen, Safe{Wallet} web uygulama sayfalar\u0131n\u0131 g\u00f6r\u00fcnt\u00fclemek i\u00e7in kodda k\u00f6t\u00fc ama\u00e7l\u0131 de\u011fi\u015fiklikler yap\u0131lm\u0131\u015ft\u0131.\u00a0Kendi soru\u015fturmalar\u0131n\u0131 y\u00fcr\u00fcten Safe{Wallet} sahipleri, iki ba\u011f\u0131ms\u0131z bilgi g\u00fcvenli\u011fi \u015firketinin bulgular\u0131n\u0131 reddederek altyap\u0131lar\u0131n\u0131n sald\u0131r\u0131ya u\u011framad\u0131\u011f\u0131 konusunda \u0131srarc\u0131 oldular.<\/p>\n<p>Peki ne oldu? Bir s\u0131cak c\u00fczdana 7 milyon dolarl\u0131k rutin bir y\u00fckleme s\u0131ras\u0131nda, Bybit \u00e7al\u0131\u015fanlar\u0131 bilgisayar ekranlar\u0131nda tam olarak bu miktar\u0131 ve s\u0131cak c\u00fczdan adresiyle e\u015fle\u015fen al\u0131c\u0131n\u0131n adresini g\u00f6rd\u00fcler. Ancak imzalanmak \u00fczere ba\u015fka veriler g\u00f6nderildi! D\u00fczenli transferler i\u00e7in al\u0131c\u0131n\u0131n adresi Donan\u0131m C\u00fczdan\u0131 cihaz\u0131n\u0131n ekran\u0131ndan kontrol edilebilir (ve edilmelidir!) ancak multisig i\u015flemlerini imzalarken bu bilgi g\u00f6sterilmedi\u011finden Bybit \u00e7al\u0131\u015fanlar\u0131 esasen k\u00f6r bir transfer ger\u00e7ekle\u015ftirmi\u015f oldular.<\/p>\n<p>Sonu\u00e7 olarak, Bybit\u2019in so\u011fuk c\u00fczdanlar\u0131ndan birinin t\u00fcm i\u00e7eri\u011fini birka\u00e7 y\u00fcz sahte c\u00fczdana ta\u015f\u0131yan k\u00f6t\u00fc niyetli bir ak\u0131ll\u0131 s\u00f6zle\u015fmeye, istemeden ye\u015fil \u0131\u015f\u0131k yakt\u0131lar. Bybit c\u00fczdan\u0131ndan para \u00e7ekme i\u015flemi tamamlan\u0131r tamamlanmaz, Safe{Wallet} web sitesindeki kodun zarars\u0131z s\u00fcr\u00fcme geri d\u00f6nd\u00fc\u011f\u00fc g\u00f6r\u00fcl\u00fcyor. Sald\u0131rganlar \u015fu anda \u00e7al\u0131nt\u0131 Ethereum\u2019u \u201ckatmanla\u015ft\u0131rmakla\u201d me\u015fguller, yani aklamak amac\u0131yla par\u00e7a par\u00e7a transfer ediyorlar.<\/p>\n<p>G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re, Bybit ve m\u00fc\u015fterileri hedefli bir <a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-what-are-they-and-how-to-manage-the-risk\/52852\/\" target=\"_blank\" rel=\"noopener nofollow\">tedarik zinciri sald\u0131r\u0131s\u0131n\u0131n<\/a> kurban\u0131 oldular.<\/p>\n<h2>Bybit vakas\u0131 tek seferlik bir olay de\u011fil<\/h2>\n<p>FBI, TraderTraitor kod adl\u0131 Kuzey Koreli bir grubun fail oldu\u011funu <a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/fbi-says-north-korea-was-responsible-15-billion-bybit-hack-2025-02-27\/\" target=\"_blank\" rel=\"nofollow noopener\">resmen a\u00e7\u0131klad\u0131<\/a>. Bilgi g\u00fcvenli\u011fi \u00e7evrelerinde bu grup <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-108a\" target=\"_blank\" rel=\"nofollow noopener\">Lazarus, APT38 ya da BlueNoroff olarak da bilinmektedir<\/a>. Grubun alametifarikas\u0131; c\u00fczdan geli\u015ftiricilerini hacklemek, kripto borsalar\u0131n\u0131 soymak, s\u0131radan kullan\u0131c\u0131lardan \u00e7almak ve hatta <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-play-tanks-and-catch-backdoor\/12940\/\" target=\"_blank\" rel=\"noopener\">sahte oyna-kazan oyunlar\u0131 geli\u015ftirmek<\/a> gibi kripto para alan\u0131nda \u0131srarl\u0131, sofistike ve s\u00fcrekli sald\u0131r\u0131lard\u0131r.<\/p>\n<p>Bybit bask\u0131n\u0131ndan \u00f6nce grubun rekoru, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/sky-mavis-crypto-heist\/10887\/\" target=\"_blank\" rel=\"noopener\">Axie Infinity<\/a> oyunu i\u00e7in olu\u015fturulan Ronin Networks blok zincirinden <em>540 milyon dolar \u00e7al\u0131nmas\u0131yd\u0131<\/em>. Bu 2022 sald\u0131r\u0131s\u0131nda, bilgisayar korsanlar\u0131 vir\u00fcsl\u00fc bir PDF dosyas\u0131ndaki sahte bir i\u015f teklifini kullanarak oyunun geli\u015ftiricilerinden birinin bilgisayar\u0131na vir\u00fcs bula\u015ft\u0131rd\u0131. Bu sosyal m\u00fchendislik tekni\u011fi g\u00fcn\u00fcm\u00fczde de <a href=\"https:\/\/securelist.com\/lazarus-new-malware\/115059\/\" target=\"_blank\" rel=\"noopener\">grubun cephaneli\u011finde yer almaya devam etmektedir<\/a>.<\/p>\n<p>Grup, 2024 May\u0131s\u2019\u0131nda <a href=\"https:\/\/thenewscrypto.com\/fbi-links-308-million-dmm-bitcoin-hack-to-north-korean-hacker-group\/\" target=\"_blank\" rel=\"nofollow noopener\">Japon kripto borsas\u0131 DMM Bitcoin\u2019den 300 milyon dolar\u0131n \u00fczerinde<\/a> bir vurgun yapt\u0131 ve bunun sonucunda DMM Bitcoin iflas etti. Bundan \u00f6nce, 2020 y\u0131l\u0131nda, <a href=\"https:\/\/www.chainalysis.com\/blog\/lazarus-group-kucoin-exchange-hack\/\" target=\"_blank\" rel=\"nofollow noopener\">KuCoin kripto borsas\u0131ndan 275 milyon dolardan fazla para hortumlanm\u0131\u015f<\/a> ve bunun nedeni olarak bir s\u0131cak c\u00fczdan i\u00e7in \u201cs\u0131zd\u0131r\u0131lm\u0131\u015f bir \u00f6zel anahtar\u201d g\u00f6sterilmi\u015fti.<\/p>\n<p>Lazarus on y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcredir kripto para h\u0131rs\u0131zl\u0131\u011f\u0131 taktiklerini geli\u015ftiriyor. 2018 y\u0131l\u0131nda, <a href=\"https:\/\/securelist.com\/operation-applejeus\/87553\/\" target=\"_blank\" rel=\"noopener\">AppleJeus Operasyonu<\/a>\u2018nun bir par\u00e7as\u0131 olarak Truva at\u0131 haline getirilmi\u015f bir kripto para al\u0131m sat\u0131m uygulamas\u0131 kullan\u0131larak bankalara ve kripto borsalar\u0131na y\u00f6nelik bir dizi sald\u0131r\u0131 hakk\u0131nda yazm\u0131\u015ft\u0131k. Elliptic\u2019teki uzmanlar, Kuzey Kore ba\u011flant\u0131l\u0131 akt\u00f6rlerin toplam su\u00e7 gelirlerinin yakla\u015f\u0131k 6 milyar dolar oldu\u011funu <a href=\"https:\/\/www.elliptic.co\/blog\/bybit-hack-largest-in-history\" target=\"_blank\" rel=\"nofollow noopener\">tahmin ediyor<\/a>.<\/p>\n<h2>Kripto yat\u0131r\u0131mc\u0131lar\u0131 ne yapmal\u0131?<\/h2>\n<p>Bybit \u00f6rne\u011finde, m\u00fc\u015fteriler \u015fansl\u0131yd\u0131: borsa, ortaya \u00e7\u0131kan para \u00e7ekme talepleri dalgas\u0131na h\u0131zl\u0131 bir \u015fekilde hizmet sundu ve kay\u0131plar\u0131 kendi fonlar\u0131ndan telafi etme s\u00f6z\u00fc verdi. Bybit faaliyetlerine devam etmektedir, bu nedenle m\u00fc\u015fterilerin herhangi bir i\u015flem yapmas\u0131na gerek yoktur.<\/p>\n<p>Ancak bu sald\u0131r\u0131, blok zinciri sistemleri \u00fczerinden akan fonlar\u0131 g\u00fcvence alt\u0131na alman\u0131n ne kadar zor oldu\u011funu ve bir i\u015flemi iptal etmek ya da para iadesi yapmak i\u00e7in ne kadar az \u015fey yap\u0131labilece\u011fini bir kez daha g\u00f6sterdi. Sald\u0131r\u0131n\u0131n e\u015fi benzeri g\u00f6r\u00fclmemi\u015f \u00f6l\u00e7e\u011fi g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, bir\u00e7ok ki\u015fi Ethereum blok zincirinin sald\u0131r\u0131 \u00f6ncesi durumuna geri d\u00f6nd\u00fcr\u00fclmesi \u00e7a\u011fr\u0131s\u0131nda bulundu, ancak Ethereum geli\u015ftiricileri bunu <a href=\"https:\/\/cointelegraph.com\/news\/ethereum-rollback-debate-technically-intractable-eth-core-developer\" target=\"_blank\" rel=\"nofollow noopener\">\u201cteknik olarak zor\u201d olarak de\u011ferlendiriyor<\/a>. Bu arada Bybit, kripto borsalar\u0131 ve etik ara\u015ft\u0131rmac\u0131lar i\u00e7in kurtar\u0131lan fonlar\u0131n %10\u2019u oran\u0131nda <a href=\"https:\/\/markets.businessinsider.com\/news\/stocks\/bybit-launches-recovery-bounty-program-with-rewards-up-to-10-of-stolen-funds-1034394717\" target=\"_blank\" rel=\"nofollow noopener\">bir \u00f6d\u00fcl program\u0131 a\u00e7\u0131klad\u0131<\/a>, ancak \u015fu ana kadar sadece 43 milyon dolarl\u0131k bir k\u0131sm\u0131 hayata ge\u00e7irildi.<\/p>\n<p>Bu durum, baz\u0131 <a href=\"https:\/\/cointelegraph.com\/news\/bybit-hack-security-execs-weigh-in\" target=\"_blank\" rel=\"nofollow noopener\">kripto sekt\u00f6r\u00fc uzmanlar\u0131n\u0131n<\/a>, hack olay\u0131n\u0131n ana sonucunun <a href=\"https:\/\/x.com\/StaniKulechov\/status\/1892974833828331702\" target=\"_blank\" rel=\"nofollow noopener\">kripto varl\u0131klar\u0131n\u0131n ki\u015fisel olarak saklanmas\u0131nda<\/a> bir art\u0131\u015f olaca\u011f\u0131 y\u00f6n\u00fcnde spek\u00fclasyon yapmas\u0131na neden oldu.<\/p>\n<p><strong>Ki\u015fisel saklama<\/strong>, g\u00fcvenli saklama sorumlulu\u011funu uzmanlar\u0131n omuzlar\u0131ndan al\u0131p sizin omuzlar\u0131n\u0131za y\u00fckler. Bu nedenle, yaln\u0131zca t\u00fcm g\u00fcvenlik \u00f6nlemlerine hakim olma ve bunlar\u0131 her g\u00fcn s\u0131k\u0131 bir \u015fekilde takip etme yeteneklerinize tam olarak g\u00fcveniyorsan\u0131z bu yolu izleyin. Kripto c\u00fczdan\u0131 olmayan s\u0131radan kullan\u0131c\u0131lar\u0131n \u00f6zellikle kendilerini hedef alan sofistike bir sald\u0131r\u0131yla kar\u015f\u0131la\u015fma ihtimalinin d\u00fc\u015f\u00fck oldu\u011funu ancak genel kitlesel sald\u0131r\u0131lar\u0131n savu\u015fturulmas\u0131n\u0131n da daha kolay oldu\u011funu unutmay\u0131n.<\/p>\n<p>Peki, kripto paralar\u0131n g\u00fcvenli bir \u015fekilde saklanmas\u0131 i\u00e7in neye ihtiyac\u0131n\u0131z var?<\/p>\n<ul>\n<li><strong>Ekranl\u0131 bir donan\u0131m c\u00fczdan\u0131 sat\u0131n al\u0131n.<\/strong> Kripto varl\u0131klar\u0131n\u0131z\u0131 koruman\u0131n en etkili yolu budur. \u00d6nce biraz ara\u015ft\u0131rma yap\u0131n ve bir c\u00fczdan\u0131 sayg\u0131n bir sat\u0131c\u0131dan ald\u0131\u011f\u0131n\u0131zdan emin olun. \u00d6zellikle de do\u011frudan bir sat\u0131c\u0131dan al\u0131n; asla ikinci el olarak ya da bir pazar yerinden almay\u0131n. Bu durumda, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fake-trezor-hardware-crypto-wallet\/11437\/\" target=\"_blank\" rel=\"noopener\">\u00f6nceden hacklenmi\u015f bir c\u00fczdan<\/a> b\u00fct\u00fcn paran\u0131z\u0131 silip s\u00fcp\u00fcrebilir. Transferleri imzalamak i\u00e7in c\u00fczdan kullan\u0131rken, al\u0131c\u0131n\u0131n adresini hem bilgisayar ekran\u0131nda hem de c\u00fczdan ekran\u0131nda kontrol ederek <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/what-is-a-crypto-wallet-drainer\/12037\/\" target=\"_blank\" rel=\"noopener\">k\u00f6t\u00fc niyetli bir ak\u0131ll\u0131 s\u00f6zle\u015fme<\/a> veya panodaki kripto c\u00fczdan adreslerini de\u011fi\u015ftiren bir <a href=\"https:\/\/securelist.com\/copy-paste-heist-clipboard-injector-targeting-cryptowallets\/109186\/\" target=\"_blank\" rel=\"noopener\">k\u0131rp\u0131c\u0131 Truva at\u0131<\/a> taraf\u0131ndan de\u011fi\u015ftirilme ihtimalini ortadan kald\u0131r\u0131n.<\/li>\n<li><strong>C\u00fczdan tohum c\u00fcmlelerini asla elektronik ortamda saklamay\u0131n.<\/strong> Bunun i\u00e7in bilgisayar\u0131n\u0131zdaki dosyalar\u0131 ve galerinizdeki foto\u011fraflar\u0131 kullanmay\u0131 unutun; <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">modern Truva atlar\u0131 Google Play ve App Store\u2019a s\u0131zmay\u0131 ve ak\u0131ll\u0131 telefonunuzda depolanan foto\u011fraflardaki verileri tan\u0131may\u0131 \u00f6\u011frendi<\/a>. Sadece bir kasan\u0131n i\u00e7inde veya fiziksel olarak g\u00fcvenli ba\u015fka bir yerde tutulan ve hem yetkisiz eri\u015fimden hem de do\u011fal afetlerden korunan ka\u011f\u0131t kay\u0131tlar (veya tercih ederseniz metal grav\u00fcrler) yeterli olacakt\u0131r. Birden fazla depolama yeri d\u00fc\u015f\u00fcnebilir ve tohum c\u00fcmlenizi par\u00e7alara b\u00f6lebilirsiniz.<\/li>\n<li><strong>T\u00fcm <span style=\"text-decoration: line-through;\">yumurtalar\u0131n\u0131z\u0131<\/span> kripto paralar\u0131n\u0131z\u0131 tek bir sepete koymay\u0131n.<\/strong> B\u00fcy\u00fck miktarlarda veya farkl\u0131 t\u00fcrlerde kripto varl\u0131k sahipleri i\u00e7in birden fazla c\u00fczdan kullanmak mant\u0131kl\u0131d\u0131r. \u0130\u015flemsel ihtiya\u00e7lar i\u00e7in k\u00fc\u00e7\u00fck miktarlar bir kripto borsas\u0131nda saklanabilirken b\u00fcy\u00fck miktarlar, birka\u00e7 donan\u0131m kripto c\u00fczdan\u0131 aras\u0131nda b\u00f6l\u00fcnebilir.<\/li>\n<li><strong>\u00d6zel bir bilgisayar kullan\u0131n.<\/strong> M\u00fcmk\u00fcnse bir bilgisayar\u0131 kripto para i\u015flemleri i\u00e7in ay\u0131r\u0131n. Fiziksel olarak eri\u015fimi k\u0131s\u0131tlay\u0131n (\u00f6rne\u011fin, kasaya, kilitli bir dolaba veya kilitli bir odaya koyun), disk \u015fifreleme ve parola giri\u015fi kullan\u0131n ve kendi parolalar\u0131 olan, ana bilgisayar\u0131n\u0131zdakilerden farkl\u0131, ayr\u0131 bir hesaba sahip olun. <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">G\u00fcvenilir koruma<\/a>\u00a0y\u00fckleyin ve \u201ckripto-bilgisayar\u0131n\u0131zda\u201d maksimum g\u00fcvenlik ayarlar\u0131n\u0131 etkinle\u015ftirin. Bu bilgisayar\u0131 yaln\u0131zca i\u015flem yapmak i\u00e7in internete ba\u011flay\u0131n ve yaln\u0131zca c\u00fczdan i\u015flemleri i\u00e7in kullan\u0131n. Oyun oynamak, kripto haberlerini okumak ve arkada\u015flar\u0131n\u0131zla sohbet etmek i\u00e7in ba\u015fka bir cihaz kullanabilirsiniz.<\/li>\n<li>Bir bilgisayar tahsis etmek pratik veya ekonomik de\u011filse, <strong>ana bilgisayar\u0131n\u0131zda kat\u0131 dijital hijyen sa\u011flay\u0131n<\/strong>. Kripto i\u015flemleri i\u00e7in d\u00fc\u015f\u00fck ayr\u0131cal\u0131klara sahip (y\u00f6netici olmayan) ayr\u0131 bir hesap ve i\u015f, sohbet ve oyunlar i\u00e7in yine y\u00f6netici olmayan ba\u015fka bir hesap olu\u015fturun. Sistem yaz\u0131l\u0131m\u0131n\u0131 g\u00fcncellemek veya bilgisayar\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde yeniden yap\u0131land\u0131rmak d\u0131\u015f\u0131nda y\u00f6netici modunda \u00e7al\u0131\u015fmaya hi\u00e7 gerek yoktur. Yaln\u0131zca c\u00fczdanlarla i\u015flem yapmak i\u00e7in \u00f6zel \u201ckripto hesab\u0131n\u0131zda\u201d oturum a\u00e7\u0131n ve hemen ard\u0131ndan oturumu kapat\u0131n. Yabanc\u0131lar\u0131n bilgisayara eri\u015fimine izin vermeyin ve y\u00f6netici parolalar\u0131n\u0131 kimseyle payla\u015fmay\u0131n.<\/li>\n<li><strong>Kripto c\u00fczdan yaz\u0131l\u0131m\u0131 se\u00e7erken dikkatli olun.<\/strong> Yaz\u0131l\u0131m\u0131n a\u00e7\u0131klamas\u0131n\u0131 dikkatlice inceleyin, uygulaman\u0131n uzun s\u00fcredir piyasada oldu\u011fundan emin olun ve resmi web sitesinden indirdi\u011finizi ve da\u011f\u0131t\u0131m\u0131n dijital imzas\u0131n\u0131n web sitesine ve sat\u0131c\u0131n\u0131n ad\u0131na kar\u015f\u0131l\u0131k geldi\u011fini kontrol edin. Kripto c\u00fczdan yaz\u0131l\u0131m\u0131n\u0131 kurmadan ve \u00e7al\u0131\u015ft\u0131rmadan \u00f6nce <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">g\u00fcncel bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a>\u00a0ile bilgisayar\u0131n\u0131z\u0131 derinlemesine taray\u0131n.<\/li>\n<li><strong>G\u00fcncellemelere dikkat edin.<\/strong> Genellikle t\u00fcm yaz\u0131l\u0131mlar\u0131n hemen g\u00fcncellenmesini tavsiye etsek de, kripto para uygulamalar\u0131 s\u00f6z konusu oldu\u011funda, bu politikay\u0131 biraz de\u011fi\u015ftirmeye de\u011fer. Yeni bir s\u00fcr\u00fcm yay\u0131nland\u0131ktan sonra, y\u00fcklemeden \u00f6nce yakla\u015f\u0131k bir hafta bekleyin ve yorumlar\u0131 okuyun. Bu, toplulu\u011fa, g\u00fcncellemeye s\u0131zm\u0131\u015f olabilecek hatalar\u0131 veya Truva atlar\u0131n\u0131 yakalamak i\u00e7in zaman verecektir.<\/li>\n<li><strong>Geli\u015fmi\u015f bilgisayar g\u00fcvenli\u011fi \u00f6nlemlerini uygulay\u0131n<\/strong>. Rehberlik i\u00e7in; bilgisayar\u0131n\u0131za ve ak\u0131ll\u0131 telefonunuza <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0gibi g\u00fc\u00e7l\u00fc bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc y\u00fcklemeyi, i\u015fletim sisteminizi ve taray\u0131c\u0131lar\u0131n\u0131z\u0131 d\u00fczenli olarak g\u00fcncellemeyi ve g\u00fc\u00e7l\u00fc, benzersiz parolalar kullanmay\u0131 i\u00e7eren <strong><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/4-key-steps-to-protect-cryptocurrency-properly\/11394\/\" target=\"_blank\" rel=\"noopener\">Kripto yat\u0131r\u0131mlar\u0131n\u0131 korumak: g\u00fcvenlik i\u00e7in d\u00f6rt temel ad\u0131m<\/a><\/strong> ba\u015fl\u0131kl\u0131 yaz\u0131m\u0131z\u0131 inceleyebilirsiniz.<\/li>\n<li><strong>Kimlik av\u0131 te\u015febb\u00fcslerine kar\u015f\u0131 haz\u0131rl\u0131kl\u0131 olun.<\/strong> Kripto para doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 hem \u00e7ok y\u00f6nl\u00fc hem de sofistike olabilir, bu nedenle e-posta, mesajla\u015fma uygulamas\u0131 ve benzeri yollarla gelen beklenmedik mesajlar bir doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n ba\u015flang\u0131c\u0131 olarak g\u00f6r\u00fclmelidir. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kripto-para-birimleri\/\" target=\"_blank\" rel=\"noopener\">Blogumuzu<\/a> ve di\u011fer sayg\u0131n siber g\u00fcvenlik kaynaklar\u0131n\u0131 takip ederek en son kripto doland\u0131r\u0131c\u0131l\u0131klar\u0131ndan haberdar olun.<\/li>\n<\/ul>\n<blockquote><p>Kripto doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 ve kendinizi koruman\u0131n yollar\u0131 hakk\u0131nda daha fazla bilgi i\u00e7in \u00f6zel yaz\u0131lar\u0131m\u0131z\u0131 okuyun:<\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/top-eight-crypto-scams-2023\/11549\/\" target=\"_blank\" rel=\"noopener\">Tarihteki en c\u00fcretk\u00e2r kripto h\u0131rs\u0131zl\u0131klar\u0131ndan sekizi<\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/top-5-cryptocurrency-heists\/34151\/\" target=\"_blank\" rel=\"noopener nofollow\">\u015eimdiye kadarki en b\u00fcy\u00fck 5 kripto para soygunu<\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fake-trezor-hardware-crypto-wallet\/11437\/\" target=\"_blank\" rel=\"noopener\">Vaka \u00e7al\u0131\u015fmas\u0131: sahte so\u011fuk kripto para c\u00fczdan\u0131<\/a><\/p>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/pig-butchering-crypto-investment-scam\/12150\/\" target=\"_blank\" rel=\"noopener\">Domuz kasapl\u0131\u011f\u0131: b\u00fcy\u00fck \u00f6l\u00e7ekli kripto para doland\u0131r\u0131c\u0131l\u0131\u011f\u0131<\/a><\/p>\n<p>ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kripto-para-birimleri\/\" target=\"_blank\" rel=\"noopener\">kripto para ile ilgili di\u011fer makaleler<\/a>.<\/p><\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Kripto para sahiplerinin, tarihteki en b\u00fcy\u00fck kripto soygunundan \u00e7\u0131karabilece\u011fi dersler <\/p>\n","protected":false},"author":2722,"featured_media":13215,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[374,1097,1591,612,1444,519,1074,1500,561,1611,537],"class_list":{"0":"post-13214","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bitcoin","9":"tag-blockchain","10":"tag-cryptowallet","11":"tag-dolandiricilik","12":"tag-ethereum","13":"tag-ipuclari-2","14":"tag-kimlik-avi","15":"tag-kripto-para-birimleri","16":"tag-sifreler","17":"tag-tedarik-zinciri","18":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/13214\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/28661\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/23900\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/12321\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/28778\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/27995\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/30815\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/29507\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/39186\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/53155\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/22637\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/23601\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/32010\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/bybit-hack-lessons-how-to-do-self-custody-properly\/28908\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/34728\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/34355\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/dolandiricilik\/","name":"doland\u0131r\u0131c\u0131l\u0131k"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13214"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13214\/revisions"}],"predecessor-version":[{"id":13222,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13214\/revisions\/13222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13215"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}