{"id":13420,"date":"2025-06-05T22:44:43","date_gmt":"2025-06-05T19:44:43","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13420"},"modified":"2025-06-05T22:44:43","modified_gmt":"2025-06-05T19:44:43","slug":"data-theft-during-charging-choicejacking-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/data-theft-during-charging-choicejacking-protection\/13420\/","title":{"rendered":"Ak\u0131ll\u0131 telefon \u015farj\u0131 s\u0131ras\u0131nda veri h\u0131rs\u0131zl\u0131\u011f\u0131"},"content":{"rendered":"<p>Telefonunuzu toplu ta\u015f\u0131ma ara\u00e7lar\u0131nda, bir klinikte, havaalan\u0131nda vb. halka a\u00e7\u0131k bir \u015farj portundan \u015farj ederken foto\u011fraflar\u0131n\u0131z ve di\u011fer verileriniz ak\u0131ll\u0131 telefonunuzdan indirilebilir veya silinebilir mi? \u00dcreticilerin g\u00fcvenlik \u00f6nlemlerine ra\u011fmen, bazen bu m\u00fcmk\u00fcn olabilir.<\/p>\n<p>Hackerlar bu t\u00fcr sald\u0131r\u0131lar\u0131 <a href=\"https:\/\/krebsonsecurity.com\/2011\/08\/beware-of-juice-jacking\/\" target=\"_blank\" rel=\"nofollow noopener\">ilk kez 2011 y\u0131l\u0131nda<\/a> ortaya \u00e7\u0131kard\u0131. Masum g\u00f6r\u00fcnen bir USB \u015farj portu sadece elektrik sa\u011flamakla kalmayan gizli bir bilgisayarsa, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Media_Transfer_Protocol\" target=\"_blank\" rel=\"nofollow noopener\">Medya Aktar\u0131m Protokol\u00fc<\/a> (MTP) veya <a href=\"https:\/\/en.wikipedia.org\/wiki\/Picture_Transfer_Protocol\" target=\"_blank\" rel=\"nofollow noopener\">Resim Aktar\u0131m Protokol\u00fc<\/a> (PTP) kullanarak veri aktar\u0131m modunda ak\u0131ll\u0131 telefonunuza ba\u011flanabiliyor ve cihazdan veri \u00e7ekebiliyordu. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Juice_jacking\" target=\"_blank\" rel=\"nofollow noopener\">Juice-jacking<\/a> olarak \u00fcnlenen bu sald\u0131r\u0131ya kar\u015f\u0131 hem Google hem de Apple h\u0131zl\u0131 bir \u015fekilde bir koruma geli\u015ftirdi ve bir ak\u0131ll\u0131 telefon MTP\/PTP destekleyen bir cihaza ba\u011fland\u0131\u011f\u0131nda, kullan\u0131c\u0131ya veri aktar\u0131m\u0131na izin verip vermeyece\u011fini veya sadece \u015farj edip etmeyece\u011fini sormaya ba\u015flad\u0131. Uzun y\u0131llar boyunca, bu basit \u00f6nlem sorunu \u00e7\u00f6zm\u00fc\u015f gibi g\u00f6r\u00fcn\u00fcyordu\u2026 ta ki Avusturya\u2019n\u0131n Styria b\u00f6lgesinde bulunan Graz Teknoloji \u00dcniversitesi\u2019nden ara\u015ft\u0131rmac\u0131lar\u0131n bu \u00f6nlemi a\u015fman\u0131n bir yolunu ke\u015ffettikleri 2025 y\u0131l\u0131na kadar.<\/p>\n<h2>ChoiceJacking sald\u0131r\u0131s\u0131<\/h2>\n<p>ChoiceJacking sald\u0131r\u0131lar\u0131 olarak adland\u0131r\u0131lan <a href=\"https:\/\/graz.elsevierpure.com\/files\/89650227\/Final_Paper_Usenix.pdf\" target=\"_blank\" rel=\"nofollow noopener\">yeni sald\u0131r\u0131larda<\/a>, \u015farj istasyonu k\u0131l\u0131\u011f\u0131na girmi\u015f k\u00f6t\u00fc niyetli bir cihaz, kurban\u0131n s\u00f6zde veri aktar\u0131m modunda ba\u011flanmak istedi\u011fini kendi kendine onaylar. \u00dcreticiye ve i\u015fletim sistemi s\u00fcr\u00fcm\u00fcne ba\u011fl\u0131 olarak, sald\u0131r\u0131n\u0131n \u00fc\u00e7 \u00e7e\u015fidi vard\u0131r. Her bir varyant USB protokol\u00fcndeki belirli bir s\u0131n\u0131rlamay\u0131 a\u015fmak i\u00e7in farkl\u0131 bir yol bulur zira bir cihaz ayn\u0131 anda hem ana bilgisayar modunda (bilgisayar olarak) hem de \u00e7evresel ayg\u0131t modunda (\u00f6rne\u011fin, fare veya klavye olarak) \u00e7al\u0131\u015famaz.<\/p>\n<p><strong>\u0130lk y\u00f6ntem<\/strong> en karma\u015f\u0131k olan\u0131d\u0131r ancak hem iOS hem de Android\u2019de \u00e7al\u0131\u015f\u0131r. Bir mikrobilgisayar \u015farj istasyonu olarak gizlenmi\u015ftir. Bu mikrobilgisayar bir ak\u0131ll\u0131 telefona USB klavye, USB ana bilgisayar (bilgisayar) ve Bluetooth klavye olarak ba\u011flanabilir.<\/p>\n<p>Ak\u0131ll\u0131 telefon tak\u0131ld\u0131\u011f\u0131nda, k\u00f6t\u00fc niyetli istasyon bir USB klavyeyi taklit eder ve Bluetooth\u2019u a\u00e7mak ve bir Bluetooth cihaz\u0131na ba\u011flanmak i\u00e7in komutlar g\u00f6nderir; ayn\u0131 k\u00f6t\u00fc niyetli bilgisayar, bundan b\u00f6yle bir Bluetooth klavyesini taklit eder. Daha sonra sistem USB \u00fczerinden yeniden ba\u011flan\u0131r ve art\u0131k bir bilgisayar gibi davranmaya ba\u015flar. Ak\u0131ll\u0131 telefon kullan\u0131c\u0131ya veri aktar\u0131m\u0131na izin verip vermeyece\u011fini sorar ve k\u00f6t\u00fc niyetli cihaz bir Bluetooth \u201ctu\u015f vuru\u015fu\u201d arac\u0131l\u0131\u011f\u0131yla talebi onaylar.<\/p>\n<p><strong>\u0130kinci y\u00f6ntem<\/strong> yaln\u0131zca Android\u2019de \u00e7al\u0131\u015f\u0131r ve Bluetooth gerektirmez. K\u00f6t\u00fc niyetli \u015farj cihaz\u0131 bir USB klavye gibi davranarak ak\u0131ll\u0131 telefonu tu\u015f vuru\u015flar\u0131yla doldurur ve giri\u015f arabelle\u011fini doldurur. \u0130\u015fletim sistemi bu anlams\u0131z girdiyi i\u015flemekle me\u015fgulken, \u015farj cihaz\u0131n\u0131n ba\u011flant\u0131s\u0131 kesilir ve yeniden \u2013 bu kez bir bilgisayar olarak \u2013 ba\u011flan\u0131r. Ekranda hangi modda ba\u011flan\u0131laca\u011f\u0131n\u0131 soran bir uyar\u0131 mesaj\u0131 g\u00f6r\u00fcnt\u00fclenir ve tam o anda klavye giri\u015f arabelle\u011finin son k\u0131sm\u0131 oynat\u0131l\u0131r. Bu k\u0131s\u0131mda, veri aktar\u0131m modunda (MTP, PTP veya hatta <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Android_Debug_Bridge\" target=\"_blank\" rel=\"nofollow noopener\">ADB<\/a> hata ay\u0131klama modu) ba\u011flant\u0131y\u0131 onaylayan bir tu\u015f vuru\u015fu dizisi bulunur.<\/p>\n<p><strong>\u00dc\u00e7\u00fcnc\u00fc y\u00f6ntem<\/strong> (yine Android\u2019e \u00f6zel) test edilen t\u00fcm ak\u0131ll\u0131 telefonlar\u0131n Android A\u00e7\u0131k Eri\u015fim Protokol\u00fcn\u00fc (AOAP) yanl\u0131\u015f uygulad\u0131\u011f\u0131 ger\u00e7e\u011finden yararlan\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 cihaz hemen bir bilgisayar olarak ba\u011flan\u0131r ve onay ekran\u0131 g\u00f6r\u00fcnt\u00fclendi\u011finde, AOAP arac\u0131l\u0131\u011f\u0131yla gerekli tu\u015f vuru\u015f olaylar\u0131n\u0131 g\u00f6nderir. Protokole g\u00f6re, USB ana bilgisayar ve AOAP modlar\u0131nda e\u015fzamanl\u0131 \u00e7al\u0131\u015fma yasakt\u0131r, ancak pratikte bu k\u0131s\u0131tlama genellikle g\u00f6z ard\u0131 edilir.<\/p>\n<h2>Hangi cihazlar USB ChoiceJacking\u2019e kar\u015f\u0131 korunur?<\/h2>\n<p>Apple ve Google, bu sald\u0131r\u0131 y\u00f6ntemlerini s\u0131ras\u0131yla iOS\/iPadOS 18.4 ve Android 15\u2019te engelledi. Art\u0131k, USB veri aktar\u0131m\u0131n\u0131 onaylamak i\u00e7in <em>Evet<\/em>\u2018e basmak yeterli de\u011fildir, biyometrik kimlik do\u011frulamas\u0131n\u0131 ge\u00e7meniz veya bir parola girmeniz gerekir. Maalesef, Android\u2019de i\u015fletim sistemi s\u00fcr\u00fcm\u00fc tek ba\u015f\u0131na ak\u0131ll\u0131 telefonunuzun g\u00fcvenli\u011fini garanti etmez. \u00d6rne\u011fin, One UI 7 kabu\u011funu \u00e7al\u0131\u015ft\u0131ran Samsung cihazlar, Android 15\u2019e g\u00fcncellendikten sonra bile kimlik do\u011frulama istemez.<\/p>\n<p>Bu nedenle, Android 15\u2019e g\u00fcncelleme yapan Android kullan\u0131c\u0131lar\u0131n\u0131n ak\u0131ll\u0131 telefonlar\u0131n\u0131 kabloyla g\u00fcvenilir bir bilgisayara ba\u011flayarak parola veya biyometrik do\u011frulama gerekip gerekmedi\u011fini kontrol etmeleri \u00f6nerilir. De\u011filse, halka a\u00e7\u0131k \u015farj istasyonlar\u0131ndan uzak durun.<\/p>\n<h2>Bu ne kadar ciddi ve kendinizi nas\u0131l koruyabilirsiniz?<\/h2>\n<p>Kolluk kuvvetleri zaman zaman USB veri h\u0131rs\u0131zl\u0131\u011f\u0131 sald\u0131r\u0131lar\u0131 konusunda uyar\u0131da bulunsa da (<a href=\"https:\/\/www.cbsnews.com\/newyork\/news\/fbi-warns-of-the-dangers-of-using-public-usb-ports-due-to-hackers\/\" target=\"_blank\" rel=\"nofollow noopener\">1<\/a>, <a href=\"https:\/\/www.sussexexpress.co.uk\/news\/crime\/tourists-warned-not-to-use-public-usb-charging-ports-4746983\" target=\"_blank\" rel=\"nofollow noopener\">2<\/a>), ger\u00e7ek hayatta bu t\u00fcr sald\u0131r\u0131lar hi\u00e7 kamuoyuna a\u00e7\u0131klanmam\u0131\u015ft\u0131r. Bu, bunlar\u0131n hi\u00e7 meydana gelmedi\u011fi anlam\u0131na gelmez, ancak a\u00e7\u0131k\u00e7a yayg\u0131n bir tehdit olmad\u0131\u011f\u0131 anlam\u0131na gelir.<\/p>\n<p>Bu t\u00fcr sald\u0131r\u0131lardan endi\u015fe duyuyorsan\u0131z, cihazlar\u0131n\u0131z\u0131 yaln\u0131zca kendi g\u00fcvenilir \u015farj cihaz\u0131n\u0131z veya g\u00fc\u00e7 bankas\u0131 ile \u015farj etmeli veya veri aktar\u0131m\u0131n\u0131 engelleyen ve kablodan yaln\u0131zca g\u00fc\u00e7 ak\u0131\u015f\u0131na izin veren bir USB <a href=\"https:\/\/www.walmart.com\/c\/kp\/data-blocker\" target=\"_blank\" rel=\"nofollow noopener\">veri engelleyici<\/a> kullanmal\u0131s\u0131n\u0131z. \u201cUSB Kondom\u201d olarak da adland\u0131r\u0131lan bu adapt\u00f6rler olduk\u00e7a etkilidir, ancak <a href=\"https:\/\/tr.wikipedia.org\/wiki\/H%C4%B1zl%C4%B1_%C5%9Farj\" target=\"_blank\" rel=\"nofollow noopener\">H\u0131zl\u0131 \u015earj<\/a> modu i\u00e7in gerekli veri sinyallerini de engelledi\u011fi i\u00e7in yeni ak\u0131ll\u0131 telefonlarda \u015farj\u0131 yava\u015flatabilir. Alternatif olarak, ucuz bir \u015farj kablosu (veri aktar\u0131m\u0131 yapamayan) kullanabilirsiniz, ancak \u00f6nce g\u00fcvenilir bir bilgisayarda test ederek ekranda veri aktar\u0131m\u0131 uyar\u0131s\u0131 g\u00f6r\u00fcnmedi\u011finden emin olmal\u0131s\u0131n\u0131z. Ard\u0131ndan bu kabloyu her yere yan\u0131n\u0131zda ta\u015f\u0131mal\u0131 ve H\u0131zl\u0131 \u015earj \u00f6zelli\u011finin kullan\u0131lamayaca\u011f\u0131n\u0131 unutmamal\u0131s\u0131n\u0131z.<\/p>\n<p>En \u00f6nemli ve yayg\u0131n olarak kullan\u0131labilen koruma y\u00f6ntemi, Android veya iOS\u2019un en son s\u00fcr\u00fcmlerine g\u00fcncelleme yapmakt\u0131r.<\/p>\n<p>Eski bir i\u015fletim sistemine sahipseniz, engelleyiciniz yoksa ve acil olarak en yak\u0131n USB \u015farj cihaz\u0131n\u0131 kullanman\u0131z gerekiyorsa, cihaz\u0131n\u0131z\u0131 \u015farj ederken dikkatli olun. Telefonu ba\u011flad\u0131\u011f\u0131n\u0131zda, ekrana dikkat edin; \u015farj etmeye ba\u015flamaz ve ba\u011flant\u0131 t\u00fcr\u00fcn\u00fc se\u00e7menizi isterse, <em>Sadece \u015farj<\/em> se\u00e7ene\u011fini tercih edin. Verileriniz konusunda ger\u00e7ekten endi\u015feleniyorsan\u0131z, fi\u015fi \u00e7ekip daha az \u201cak\u0131ll\u0131\u201d bir ba\u011flant\u0131 noktas\u0131 araman\u0131z daha iyi olacakt\u0131r.<\/p>\n<blockquote><p>Di\u011fer s\u0131ra d\u0131\u015f\u0131 ak\u0131ll\u0131 telefon hileleri i\u00e7in a\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131za g\u00f6z atabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/trojan-in-fake-smartphones\/13304\/\" target=\"_blank\" rel=\"noopener\">Sahte Android ak\u0131ll\u0131 telefonlara yerle\u015ftirilmi\u015f Truva at\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/bluetooth-vulnerability-android-ios-macos-linux\/11925\/\" target=\"_blank\" rel=\"noopener\">Bluetooth g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00fczerinden Android, macOS, iOS ve Linux\u2019u hacklemek<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-avoid-threats-from-budget-android-devices\/11849\/\" target=\"_blank\" rel=\"noopener\">Ucuz Android cihazlar\u0131n gizli riskleri<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/infected-apkpure\/9515\/\" target=\"_blank\" rel=\"noopener\">K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015fan Android uygulama ma\u011fazas\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/triangulation-attack-on-ios\/11476\/\" target=\"_blank\" rel=\"noopener\">\u00dc\u00e7genleme meselesi<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n","protected":false},"excerpt":{"rendered":"<p>Ak\u0131ll\u0131 telefonunuz halka a\u00e7\u0131k bir \u015farj istasyonuna tak\u0131l\u0131yken foto\u011fraflar\u0131n\u0131z g\u00f6r\u00fcnt\u00fclenebilir, \u00e7al\u0131nabilir veya silinebilir mi? G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re, evet!<\/p>\n","protected":false},"author":2722,"featured_media":13421,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[555,105,500,750,26,1220,421],"class_list":{"0":"post-13420","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-akilli-telefonlar","9":"tag-android","10":"tag-gizlilik","11":"tag-ios","12":"tag-iphone","13":"tag-seyahat","14":"tag-usb"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/data-theft-during-charging-choicejacking-protection\/13420\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/data-theft-during-charging-choicejacking-protection\/28902\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/24126\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/12462\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/data-theft-during-charging-choicejacking-protection\/29004\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/28189\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/data-theft-during-charging-choicejacking-protection\/30994\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/data-theft-during-charging-choicejacking-protection\/29710\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/data-theft-during-charging-choicejacking-protection\/39657\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/data-theft-during-charging-choicejacking-protection\/53497\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/data-theft-during-charging-choicejacking-protection\/22832\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/data-theft-during-charging-choicejacking-protection\/23867\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/data-theft-during-charging-choicejacking-protection\/32253\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/data-theft-during-charging-choicejacking-protection\/29179\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/data-theft-during-charging-choicejacking-protection\/34943\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/data-theft-during-charging-choicejacking-protection\/34574\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/usb\/","name":"USB"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13420"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13420\/revisions"}],"predecessor-version":[{"id":13423,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13420\/revisions\/13423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13421"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}