{"id":13404,"date":"2025-06-03T15:32:18","date_gmt":"2025-06-03T12:32:18","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13404"},"modified":"2025-06-03T15:32:18","modified_gmt":"2025-06-03T12:32:18","slug":"microsoft-365-purchase-email-scam","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/microsoft-365-purchase-email-scam\/13404\/","title":{"rendered":"Doland\u0131r\u0131c\u0131lar sald\u0131r\u0131 d\u00fczenlemek i\u00e7in Microsoft i\u015f bildirimlerini kullan\u0131yor"},"content":{"rendered":"<p>Bir e-posta sald\u0131r\u0131s\u0131n\u0131n ba\u015far\u0131l\u0131 olmas\u0131 i\u00e7in siber su\u00e7lular\u0131n yapmas\u0131 gereken ilk \u015fey, mesajlar\u0131n\u0131 potansiyel kurbanlar\u0131n kar\u015f\u0131s\u0131na \u00e7\u0131karmakt\u0131r. Yak\u0131n tarihli bir <a href=\"https:\/\/www.kaspersky.com\/blog\/getshared-scam-emails\/53288\/\" target=\"_blank\" rel=\"noopener nofollow\">g\u00f6nderide<\/a>, doland\u0131r\u0131c\u0131lar\u0131n b\u00fcy\u00fck dosyalar\u0131 payla\u015fmak i\u00e7in tamamen yasal bir hizmet olan GetShared\u2019den gelen bildirimlerden nas\u0131l yararland\u0131klar\u0131n\u0131 ele alm\u0131\u015ft\u0131k. Bug\u00fcn, k\u00f6t\u00fc ama\u00e7l\u0131 e-postalar\u0131 iletmenin ba\u015fka bir y\u00f6ntemini inceleyece\u011fiz. Bu doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n arkas\u0131ndaki ki\u015filerin, Microsoft 365\u2019in yeni kurumsal abonelerine g\u00f6nderdi\u011fi ger\u00e7ek te\u015fekk\u00fcr mesajlar\u0131na, \u00f6zel metinler eklemeyi \u00f6\u011frendikleri ortaya \u00e7\u0131kt\u0131.<\/p>\n<h2>\u0130\u00e7inde k\u00f6t\u00fc bir s\u00fcrpriz bulunan ger\u00e7ek bir Microsoft e-postas\u0131<\/h2>\n<p>Sald\u0131r\u0131, Microsoft\u2019un al\u0131c\u0131ya <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/business\/microsoft-365-apps-for-business\" target=\"_blank\" rel=\"nofollow noopener\">Microsoft 365 Apps for Business<\/a> aboneli\u011fi sat\u0131n ald\u0131\u011f\u0131 i\u00e7in te\u015fekk\u00fcr etti\u011fi ger\u00e7ek bir e-posta ile ba\u015fl\u0131yor. E-posta asl\u0131nda Redmond teknoloji devinin yasal adresinden geliyor: microsoft-noreply@microsoft.com. Daha g\u00fcvenilir bir itibara sahip bir e-posta adresi hayal etmek zor olurdu, bu nedenle mesaj herhangi bir e-posta sunucusu filtresini kolayca ge\u00e7iyor.<\/p>\n<p>Bir kez daha a\u00e7\u0131kl\u0131\u011fa kavu\u015ftural\u0131m: Bu, Microsoft\u2019tan gelen ger\u00e7ek bir e-posta. \u0130\u00e7erik tipik bir sat\u0131n alma onay\u0131 ile ayn\u0131. A\u015fa\u011f\u0131daki ekran g\u00f6r\u00fcnt\u00fcs\u00fcnde \u015firket, al\u0131c\u0131ya toplam 587,95 $ de\u011ferinde 55 Microsoft 365 Apps for Business aboneli\u011fi sat\u0131n ald\u0131\u011f\u0131 i\u00e7in te\u015fekk\u00fcr ediyor.<\/p>\n<div id=\"attachment_13408\" style=\"width: 941px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/06\/03135250\/microsoft-365-purchase-email-scam-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13408\" class=\"size-full wp-image-13408\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/06\/03135250\/microsoft-365-purchase-email-scam-1.png\" alt=\"Orijinal Microsoft bildirimlerinden yararlanan doland\u0131r\u0131c\u0131l\u0131k\" width=\"931\" height=\"726\"><\/a><p id=\"caption-attachment-13408\" class=\"wp-caption-text\">Sald\u0131rganlar\u0131n mesajlar\u0131n\u0131 Fatura bilgileri b\u00f6l\u00fcm\u00fcne ekledikleri bir Microsoft i\u015f bildirimi \u00f6rne\u011fi<\/p><\/div>\n<p>Doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n \u00f6z\u00fc, sald\u0131rganlar\u0131n Fatura bilgileri b\u00f6l\u00fcm\u00fcne ekledikleri metinde yatmakta. Bu b\u00f6l\u00fcmde genellikle abone \u015firketin ad\u0131 ve fatura adresi yer al\u0131yor. Ancak, doland\u0131r\u0131c\u0131lar bu bilgileri kendi telefon numaralar\u0131yla de\u011fi\u015ftiriyor ve al\u0131c\u0131y\u0131 herhangi bir yard\u0131ma ihtiya\u00e7 duymalar\u0131 halinde Microsoft\u2019u aramaya te\u015fvik eden bir not ekliyorlar. \u201cSat\u0131n al\u0131nan\u201d abonelik t\u00fcrleri, doland\u0131r\u0131c\u0131lar\u0131n \u015firket \u00e7al\u0131\u015fanlar\u0131n\u0131 hedef ald\u0131\u011f\u0131n\u0131 g\u00f6steriyor.<\/p>\n<p>Doland\u0131r\u0131c\u0131lar, \u00e7al\u0131\u015fanlar\u0131n ortak bir korkusunu hedef al\u0131yorlar: Pahal\u0131, gereksiz bir al\u0131\u015fveri\u015f yapman\u0131n i\u015f yerinde sorun yaratabilmesi. Bu durumda sorunu e-posta ile \u00e7\u00f6zmek bir se\u00e7enek olmad\u0131\u011f\u0131ndan (mesaj cevaps\u0131z bir adresten geliyor), kurban\u0131n, kendisine verilen telefon numaras\u0131n\u0131 aramaktan ba\u015fka se\u00e7enek kalm\u0131yor.<\/p>\n<h2>\u00c7a\u011fr\u0131lara kim cevap veriyor ve sonra ne oluyor?<\/h2>\n<p>E\u011fer kurban yemi yutar ve s\u00f6zde sat\u0131n ald\u0131\u011f\u0131 abonelikler hakk\u0131nda bilgi almak i\u00e7in aramaya karar verirse, doland\u0131r\u0131c\u0131lar <a href=\"https:\/\/www.kaspersky.com\/blog\/social-engineering-tricks\/48539\/\" target=\"_blank\" rel=\"noopener nofollow\">sosyal m\u00fchendislik<\/a> hilelerine ba\u015fvuruyor.<\/p>\n<p>Benzer bir e-posta alan ve numaray\u0131 arayan bir Reddit kullan\u0131c\u0131s\u0131 <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/1f477c8\/comment\/llo7b87\/\" target=\"_blank\" rel=\"nofollow noopener\">deneyimlerini payla\u015ft\u0131<\/a>. Ma\u011fdura g\u00f6re, aramay\u0131 yan\u0131tlayan ki\u015fi baz\u0131 destek yaz\u0131l\u0131mlar\u0131n\u0131 y\u00fcklemekte \u0131srar etti ve bir EXE dosyas\u0131 g\u00f6nderdi. Sonraki konu\u015fma, dosyada bir t\u00fcr <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/remote-access-trojan-rat\/\" target=\"_blank\" rel=\"nofollow noopener\">RAT<\/a> bulundu\u011funu g\u00f6steriyor.<\/p>\n<p>Ma\u011fdur, doland\u0131r\u0131c\u0131 banka hesab\u0131na para iadesi s\u00f6z\u00fc verene kadar yanl\u0131\u015f bir \u015fey oldu\u011fundan \u015f\u00fcphelenmedi. Kurban\u0131n banka bilgilerine eri\u015fememeleri gerekti\u011fi i\u00e7in bu bir tehlike i\u015faretiydi. Doland\u0131r\u0131c\u0131, i\u015flemin ger\u00e7ekle\u015fip ger\u00e7ekle\u015fmedi\u011fini kontrol etmek i\u00e7in kurbandan \u00e7evrimi\u00e7i banka hesab\u0131nda oturum a\u00e7mas\u0131n\u0131 istemeye devam etti.<\/p>\n<p>Kurban, bilgisayar\u0131na y\u00fcklenen yaz\u0131l\u0131m\u0131n, sald\u0131rganlar\u0131n oturum a\u00e7ma kimlik bilgilerini ele ge\u00e7irmesine olanak tan\u0131yan k\u00f6t\u00fc ama\u00e7l\u0131 bir yaz\u0131l\u0131m oldu\u011funa kanaat getirip tehlikeyi yeterince erken fark etti ve telefonu kapatt\u0131. Ayn\u0131 konu ba\u015fl\u0131\u011f\u0131 i\u00e7inde, ba\u015fka Reddit kullan\u0131c\u0131lar\u0131 da \u00e7e\u015fitli ileti\u015fim bilgilerini i\u00e7eren <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/1f477c8\/real_microsoft_365_subscription_order_email_fake\/\" target=\"_blank\" rel=\"nofollow noopener\">benzer e-postalar<\/a> bildirmi\u015fler.<\/p>\n<h2><strong>Doland\u0131r\u0131c\u0131lar ger\u00e7ek bir Microsoft adresinden nas\u0131l kimlik av\u0131 e-postalar\u0131 g\u00f6nderir?<\/strong><\/h2>\n<p>Sald\u0131rganlar\u0131n kurbanlar\u0131na Microsoft bildirimleri g\u00f6ndermeyi tam olarak nas\u0131l ba\u015fard\u0131klar\u0131 hala bir muamma. En makul <a href=\"https:\/\/www.reddit.com\/r\/msp\/comments\/1f477c8\/comment\/lkjuj6s\/\" target=\"_blank\" rel=\"nofollow noopener\">a\u00e7\u0131klama<\/a>, doland\u0131r\u0131c\u0131l\u0131k eylemini ger\u00e7ekle\u015ftirenlerin Microsoft 365\u2019e eri\u015fmek i\u00e7in \u00e7al\u0131nt\u0131 kimlik bilgileri ya da deneme s\u00fcr\u00fcmleri kulland\u0131\u011f\u0131n\u0131 \u00f6ne s\u00fcren bir ba\u015fka Reddit kullan\u0131c\u0131s\u0131ndan geldi: BCC kullanarak veya bir abonelik sat\u0131n al\u0131rken kurban\u0131n e-posta adresini girerek, yukar\u0131daki ekran g\u00f6r\u00fcnt\u00fcs\u00fcnde g\u00f6sterilene benzer mesajlar g\u00f6nderebilirler.<\/p>\n<p>Alternatif bir teori ise; doland\u0131r\u0131c\u0131lar\u0131n aktif bir Microsoft 365 aboneli\u011fi olan bir hesaba eri\u015fim sa\u011flad\u0131klar\u0131 ve ard\u0131ndan hedef kullan\u0131c\u0131y\u0131 al\u0131c\u0131 olarak belirterek fatura bilgilerini yeniden g\u00f6nderme \u00f6zelli\u011fini kulland\u0131klar\u0131.<\/p>\n<p>Hangisi do\u011fru olursa olsun, sald\u0131rganlar\u0131n amac\u0131, Microsoft bildiriminin de\u011fi\u015ftirebilecekleri tek k\u0131sm\u0131 olan fatura bilgilerini kendi telefon numaralar\u0131yla de\u011fi\u015ftirmektir.<\/p>\n<h2>Bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 kendinizi nas\u0131l koruyabilirsiniz?<\/h2>\n<p>K\u00f6t\u00fc niyetli ki\u015filer, kimlik av\u0131 faaliyetleri ve doland\u0131r\u0131c\u0131l\u0131k i\u00e7in kullanmak \u00fczere iyi bilinen, tamamen yasal hizmetlerde yeni bo\u015fluklar bulmaya devam ediyor. Bu nedenle, bir kurulu\u015fu g\u00fcvende tutmak i\u00e7in yaln\u0131zca teknik korumalara de\u011fil, ayn\u0131 zamanda idari kontrollere de ihtiyac\u0131n\u0131z vard\u0131r. \u0130\u015fte \u00f6nerimiz:<\/p>\n<ul>\n<li>\u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 potansiyel tehditleri erken tespit edebilecekleri \u015fekilde e\u011fitin. Bu s\u00fcre\u00e7 <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> gibi bir e-\u00f6\u011frenme arac\u0131 ile otomatikle\u015ftirilebilir.<\/li>\n<li>Casus yaz\u0131l\u0131mlar\u0131, uzaktan eri\u015fim Truva atlar\u0131n\u0131 ve di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 savu\u015fturmak i\u00e7in her kurumsal cihaz\u0131n\u0131za <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/endpoint-detection-response-edr?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">sa\u011flam bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> y\u00fckleyin.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Bu yaz\u0131m\u0131zda, sald\u0131rganlar\u0131n ger\u00e7ek bir Microsoft e-posta adresinden e-posta g\u00f6nderdi\u011fi karma bir e-posta ve telefon doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131 inceliyoruz.<\/p>\n","protected":false},"author":2598,"featured_media":13405,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1253,612,1921,1274,1074,38,2784,2160,901,537],"class_list":{"0":"post-13404","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-bildirimler","10":"tag-dolandiricilik","11":"tag-e-posta","12":"tag-is","13":"tag-kimlik-avi","14":"tag-microsoft","15":"tag-microsoft-365","16":"tag-office-365","17":"tag-riskler","18":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/microsoft-365-purchase-email-scam\/13404\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/microsoft-365-purchase-email-scam\/28898\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/24122\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/12466\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/microsoft-365-purchase-email-scam\/29000\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/28163\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/microsoft-365-purchase-email-scam\/30982\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/microsoft-365-purchase-email-scam\/29692\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/microsoft-365-purchase-email-scam\/39571\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/microsoft-365-purchase-email-scam\/53493\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/microsoft-365-purchase-email-scam\/23863\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/microsoft-365-purchase-email-scam\/32238\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/microsoft-365-purchase-email-scam\/29164\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/microsoft-365-purchase-email-scam\/34939\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/microsoft-365-purchase-email-scam\/34570\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13404"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13404\/revisions"}],"predecessor-version":[{"id":13412,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13404\/revisions\/13412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13405"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}