{"id":13490,"date":"2025-06-27T17:58:33","date_gmt":"2025-06-27T14:58:33","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13490"},"modified":"2025-06-27T17:58:33","modified_gmt":"2025-06-27T14:58:33","slug":"ios-android-stealer-sparkkitty","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-stealer-sparkkitty\/13490\/","title":{"rendered":"Kedi foto\u011fraflar\u0131n\u0131z tehlikede: Yeni SparkKitty Truva at\u0131n\u0131n olu\u015fturdu\u011fu tehdit"},"content":{"rendered":"<p>Foto\u011fraflar\u0131n\u0131z, kelimenin tam anlam\u0131yla, \u00f6zel hayat\u0131n\u0131z\u0131n anahtarlar\u0131d\u0131r. Galeriniz; gelecek planlar\u0131n\u0131z\u0131, finansal s\u0131rlar\u0131n\u0131z\u0131, kedi resimlerinizi ve hatta bazen kimseyle payla\u015fmayaca\u011f\u0131n\u0131z \u015feyleri bar\u0131nd\u0131r\u0131r. Ancak bu g\u00f6rselleri korumay\u0131 ger\u00e7ekten ne s\u0131kl\u0131kla akl\u0131n\u0131za getiriyorsunuz? <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">SparkCat \u00e7apraz platform h\u0131rs\u0131z\u0131n\u0131<\/a> duydu\u011funuzdan beri bu konu \u00fczerinde normalden daha s\u0131k d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcn\u00fcz\u00fc umuyoruz.<\/p>\n<p>\u015eimdi bu Trojan\u2019\u0131n SparkKitty ad\u0131n\u0131 verdi\u011fimiz k\u00fc\u00e7\u00fck karde\u015fini ke\u015ffettik. Ancak sevimli ad\u0131n\u0131n sizi yan\u0131ltmas\u0131na izin vermeyin; bu casus da t\u0131pk\u0131 a\u011fabeyi gibi kurbanlar\u0131n\u0131n ak\u0131ll\u0131 telefonlar\u0131ndan foto\u011fraf \u00e7al\u0131yor. Peki bu tehdidi benzersiz k\u0131lan nedir ve hem Android hem de iPhone kullan\u0131c\u0131lar\u0131 neden dikkat kesilmeli?<\/p>\n<h2>SparkKitty cihazlara nas\u0131l giriyor?<\/h2>\n<p>H\u0131rs\u0131z iki yolla bula\u015f\u0131yor: (i) Do\u011fal yollarla; yani internetin evcille\u015fmemi\u015f k\u0131s\u0131mlar\u0131nda; ve (ii) App Store ve Google Play gibi resmi uygulama ma\u011fazalar\u0131 arac\u0131l\u0131\u011f\u0131yla. Bunu biraz a\u00e7al\u0131m.<\/p>\n<h3>Resmi uygulama ma\u011fazalar\u0131<\/h3>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, Apple\u2019\u0131n App Store\u2019unda, kripto para birimi oranlar\u0131n\u0131 ve al\u0131m sat\u0131m sinyallerini izlemek i\u00e7in tasarlanm\u0131\u015f <strong>\u5e01<\/strong><strong>coin<\/strong> uygulamas\u0131n\u0131n i\u00e7inde gizleniyordu. Bu \u015f\u00fcpheli casusluk etkinli\u011finin uygulamaya nas\u0131l s\u0131zd\u0131\u011f\u0131ndan tam olarak emin de\u011filiz. Bir <a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-what-are-they-and-how-to-manage-the-risk\/52852\/\" target=\"_blank\" rel=\"noopener nofollow\">tedarik zinciri ihlali<\/a> ya\u015fanm\u0131\u015f ve geli\u015ftiricilerin kendileri, biz onlar\u0131 bilgilendirene kadar, SparkKitty\u2019den haberdar olmam\u0131\u015f olabilir. Ancak ikinci bir olas\u0131l\u0131k daha var; geli\u015ftiriciler h\u0131rs\u0131z\u0131 kas\u0131tl\u0131 olarak uygulaman\u0131n i\u00e7ine yerle\u015ftirmi\u015f olabilir. Durum ne olursa olsun, App Store\u2019a gizlice giren bir Truva at\u0131n\u0131 ikinci kez g\u00f6r\u00fcyoruz ve Apple\u2019\u0131 bu konuda uyard\u0131k. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">SparkCat<\/a> ilk \u00f6rnekti.<\/p>\n<div id=\"attachment_13494\" style=\"width: 483px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/06\/27172701\/ios-android-stealer-sparkkitty-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13494\" class=\"wp-image-13494 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/06\/27172701\/ios-android-stealer-sparkkitty-01-473x1024.jpg\" alt=\"App Store'da vir\u00fcsl\u00fc uygulama\" width=\"473\" height=\"1024\"><\/a><p id=\"caption-attachment-13494\" class=\"wp-caption-text\">App Store\u2019da vir\u00fcsl\u00fc uygulama<\/p><\/div>\n<p>Google Play\u2019de durum biraz daha farkl\u0131: K\u00f6t\u00fc ama\u00e7l\u0131 uygulamalar d\u00fczenli olarak ortaya \u00e7\u0131k\u0131yor ve bu tehditleri Kaspersky Daily\u2019de <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/google-play\/\" target=\"_blank\" rel=\"noopener\">s\u0131k s\u0131k inceliyoruz<\/a>. Bu kez, kripto de\u011fi\u015fim \u00f6zellikleri i\u00e7eren bir mesajla\u015fma uygulamas\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 etkinlik tespit ettik. Bu, 10.000\u2019den fazla kez indirilen pop\u00fcler bir uygulamayd\u0131 ve ara\u015ft\u0131rma s\u0131ras\u0131nda Google Play\u2019den kald\u0131r\u0131ld\u0131.<\/p>\n<h3>\u0130nternet ortam\u0131ndaki \u015f\u00fcpheli ba\u011flant\u0131lar<\/h3>\n<p>Sald\u0131rganlar bu kez k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 do\u011fal ortamda yayma konusunda \u00e7ok daha yarat\u0131c\u0131 davrand\u0131lar. Bir keresinde, \u015f\u00fcpheli ba\u011flant\u0131lar\u0131n rutin bir incelemesi s\u0131ras\u0131nda (biz t\u0131kl\u0131yoruz, b\u00f6ylece sizin t\u0131klaman\u0131za gerek kalm\u0131yor!) uzmanlar\u0131m\u0131z Android i\u00e7in bir TikTok modu da\u011f\u0131tan birka\u00e7 benzer sayfa ortaya \u00e7\u0131kard\u0131. Bu modun yapt\u0131\u011f\u0131 ana \u015feylerden biri ek kod \u00e7a\u011f\u0131rmakt\u0131. \u201c\u015e\u00fcpheli g\u00f6r\u00fcn\u00fcyor\u201d diye d\u00fc\u015f\u00fcnd\u00fck ve hakl\u0131 \u00e7\u0131kt\u0131k. Kod, uygulama i\u00e7inde d\u00fc\u011fme olarak g\u00f6r\u00fcnt\u00fclenen ve kullan\u0131c\u0131lar\u0131 \u00e7e\u015fitli \u00fcr\u00fcnler satan TikToki Mall adl\u0131 \u00e7evrimi\u00e7i bir ma\u011fazaya y\u00f6nlendiren ba\u011flant\u0131lar i\u00e7eriyordu. Ne yaz\u0131k ki, ma\u011fazan\u0131n yasal m\u0131 yoksa b\u00fcy\u00fck bir tuzak m\u0131 oldu\u011funu belirleyemedik, ancak ilgin\u00e7 bir ger\u00e7ek g\u00f6ze \u00e7arp\u0131yordu: TikToki Mall kripto para \u00f6demelerini kabul ediyordu ve herhangi bir \u00fcr\u00fcne kaydolmak ve \u00f6deme yapmak i\u00e7in bir davet koduna ihtiyac\u0131n\u0131z vard\u0131. Bu a\u015famada ba\u015fka herhangi bir \u015f\u00fcpheli faaliyete rastlamad\u0131k ve SparkKitty ya da di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n izine rastlamad\u0131k.<\/p>\n<p>Bu y\u00fczden farkl\u0131 bir yakla\u015f\u0131m izlemeye ve bu \u015f\u00fcpheli ba\u011flant\u0131lara bir iPhone\u2019dan dokundu\u011fumuzda neler olaca\u011f\u0131n\u0131 g\u00f6rmeye karar verdik. Bu bizi App Store\u2019u and\u0131ran bir sayfaya y\u00f6nlendirdi ve hemen \u201cTikTok uygulamas\u0131n\u0131\u201d indirmemiz istendi.<\/p>\n<blockquote><p>iOS, kullan\u0131c\u0131lar\u0131n \u00fc\u00e7\u00fcnc\u00fc taraf kaynaklardan uygulama indirmesine ve \u00e7al\u0131\u015ft\u0131rmas\u0131na izin vermez. Ancak Apple, Apple Geli\u015ftirici Program\u0131\u2019n\u0131n her \u00fcyesine s\u00f6zde provizyon profilleri sa\u011flamaktad\u0131r. Bunlar, beta s\u00fcr\u00fcmleri veya \u015firket i\u00e7i kullan\u0131m i\u00e7in geli\u015ftirilen uygulamalar gibi, App Store\u2019da bulunmayan \u00f6zel uygulamalar\u0131n kullan\u0131c\u0131 cihazlar\u0131na y\u00fcklenmesine olanak tan\u0131r. Sald\u0131rganlar, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m i\u00e7eren uygulamalar\u0131 da\u011f\u0131tmak i\u00e7in bu profillerden yararlan\u0131r.<\/p><\/blockquote>\n<p>Kurulum s\u00fcreci normal prosed\u00fcrden biraz farkl\u0131yd\u0131. Tipik olarak, App Store\u2019da yaln\u0131zca bir kez <strong>Y\u00fckle<\/strong>\u2018ye dokunman\u0131z gerekir, ancak bu durumda, sahte TikTok\u2019u y\u00fcklemek; bir geli\u015ftirici sa\u011flama profili indirmek ve y\u00fcklemek gibi, ek ad\u0131mlar gerektiriyordu.<\/p>\n<div id=\"attachment_13495\" style=\"width: 3385px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/06\/27172829\/ios-android-stealer-sparkkitty-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-13495\" class=\"size-full wp-image-13495\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/06\/27172829\/ios-android-stealer-sparkkitty-02.jpg\" alt=\"iPhone'a bilinmeyen bir kaynaktan uygulama y\u00fckleme\" width=\"3375\" height=\"2436\"><\/a><p id=\"caption-attachment-13495\" class=\"wp-caption-text\">iPhone\u2019a bilinmeyen bir kaynaktan uygulama y\u00fckleme<\/p><\/div>\n<p>Do\u011fal olarak, TikTok\u2019un bu s\u00fcr\u00fcm\u00fcnde komik videolar yoktu; bu, Android s\u00fcr\u00fcm\u00fcne benzer ba\u015fka bir ma\u011fazayd\u0131. G\u00f6r\u00fcn\u00fc\u015fte zarars\u0131z olsa da, iOS s\u00fcr\u00fcm\u00fc her ba\u015flat\u0131ld\u0131\u011f\u0131nda kullan\u0131c\u0131n\u0131n galerisine eri\u015fim talep ediyordu ve as\u0131l sorun da buydu. Bu, vir\u00fcsl\u00fc telefonun galerisindeki g\u00f6rselleri cihaz bilgileriyle birlikte sald\u0131rganlara g\u00f6nderen k\u00f6t\u00fc ama\u00e7l\u0131 bir mod\u00fcl ke\u015ffetmemizi sa\u011flad\u0131. Di\u011fer Android uygulamalar\u0131nda da izlerini bulduk. Hikayenin teknik detaylar\u0131 i\u00e7in <a href=\"https:\/\/securelist.com\/sparkkitty-ios-android-malware\/116793\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019teki haberimizin tamam\u0131na g\u00f6z atabilirsiniz<\/a>.<\/p>\n<h2>Kimler risk alt\u0131nda?<\/h2>\n<p>Verilerimiz, bu kampanyan\u0131n \u00f6ncelikle G\u00fcneydo\u011fu Asya ve \u00c7in\u2019deki kullan\u0131c\u0131lar\u0131 hedefledi\u011fini g\u00f6steriyor. Ancak bu, SparkKitty\u2019nin pen\u00e7elerinin ba\u015fka \u00fclkelere uzanamayaca\u011f\u0131 anlam\u0131na gelmiyor. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m en az\u0131ndan 2024\u2019\u00fcn ba\u015flar\u0131ndan beri yay\u0131l\u0131yor ve son bir bu\u00e7uk y\u0131l i\u00e7inde sald\u0131rganlar muhtemelen operasyonlar\u0131n\u0131 di\u011fer \u00fclkelere ve k\u0131talara yaymay\u0131 d\u00fc\u015f\u00fcnd\u00fcler. Onlar\u0131 durduracak hi\u00e7bir \u015fey yok. Dahas\u0131, endi\u015felenmeniz gereken sadece TikTok modu de\u011fil; \u00e7e\u015fitli kumar ve yeti\u015fkin oyunlar\u0131nda ve hatta kripto ile ilgili uygulamalarda da k\u00f6t\u00fc ama\u00e7l\u0131 etkinliklere rastlad\u0131k.<\/p>\n<p>Bu sald\u0131rganlar\u0131n sadece tatil foto\u011fraflar\u0131n\u0131za hayranl\u0131kla bakmakla ilgilendiklerini d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z, bir daha d\u00fc\u015f\u00fcn\u00fcn. SparkKitty, anl\u0131k g\u00f6r\u00fcnt\u00fclerinizin her birini komut ve kontrol sunucusuna y\u00fckler. Bu g\u00f6r\u00fcnt\u00fcler, kripto c\u00fczdan tohum ifadeleri gibi hassas bilgilerin ekran g\u00f6r\u00fcnt\u00fclerini kolayca i\u00e7erebilir ve bu k\u00f6t\u00fc akt\u00f6rlerin kripto para biriminizi \u00e7almas\u0131na olanak sa\u011flayabilir.<\/p>\n<h2>Kendinizi SparkKitty\u2019den nas\u0131l koruyabilirsiniz?<\/h2>\n<p>Bu Truva at\u0131 bir\u00e7ok \u015fekilde yay\u0131l\u0131r ve kendinizi her birinden korumak zorlu bir m\u00fccadeledir. \u201cUygulamalar\u0131 yaln\u0131zca resmi kaynaklardan indirin\u201d alt\u0131n kural\u0131 hala ge\u00e7erli olsa da, bu h\u0131rs\u0131z\u0131n izlerini hem Google Play\u2019de hem de App Store\u2019da bulduk ki buralar uygulamalar\u0131n s\u00f6zde incelendi\u011fi ve %100 g\u00fcvenli oldu\u011fu yerlerdir. Peki bu konuda ne yapabilirsiniz?<\/p>\n<p>Ak\u0131ll\u0131 telefonunuzun galerisini g\u00fcvence alt\u0131na almaya odaklanman\u0131z\u0131 \u00f6neririz. Do\u011fal olarak, en kusursuz y\u00f6ntem hassas bilgilerin foto\u011fraflar\u0131n\u0131 \u00e7ekmemek veya ekran g\u00f6r\u00fcnt\u00fclerini almamakt\u0131r, ancak g\u00fcn\u00fcm\u00fczde bu neredeyse imkans\u0131zd\u0131r. Ancak bunun bir \u00e7\u00f6z\u00fcm\u00fc var: De\u011ferli foto\u011fraflar\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">g\u00fcvenli bir kasada<\/a> saklamak. <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> ile, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-international-password-day-2024\/12275\/\" target=\"_blank\" rel=\"noopener\">yaln\u0131zca sizin bildi\u011finiz<\/a> ana parolay\u0131 girdikten sonra korumal\u0131, \u00f6nemli foto\u011fraflar\u0131 g\u00f6r\u00fcnt\u00fcleyebilir ve g\u00f6nderebilirsiniz. Korunan i\u00e7eri\u011fin sadece tek bir cihazla s\u0131n\u0131rl\u0131 olmad\u0131\u011f\u0131n\u0131 unutmay\u0131n. Parola y\u00f6neticisi, bilgileri ak\u0131ll\u0131 telefonlar ve bilgisayarlar aras\u0131nda senkronize edebilir. Buna banka kart\u0131 verileri, iki fakt\u00f6rl\u00fc kimlik do\u011frulama tokenlar\u0131 ve foto\u011fraflar\u0131n\u0131z da dahil olmak \u00fczere <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0uygulamas\u0131nda saklamay\u0131 se\u00e7ti\u011finiz her \u015fey dahildir.<\/p>\n<p>Ak\u0131ll\u0131 telefonunuzda, ke\u015ffetti\u011fimiz vir\u00fcsl\u00fc uygulamalardan herhangi birinin olup olmad\u0131\u011f\u0131n\u0131 kontrol etmeniz de \u00e7ok \u00f6nemlidir; geni\u015fletilmi\u015f listeye <a href=\"https:\/\/securelist.com\/sparkkitty-ios-android-malware\/116793\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019ten ula\u015fabilirsiniz<\/a>. Android i\u00e7in, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 sizin i\u00e7in bulan ve kald\u0131ran <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a> bu konuda yard\u0131mc\u0131 olabilir. iPhone\u2019da, iOS\u2019un kapal\u0131 mimarisi nedeniyle, <a href=\"https:\/\/www.kaspersky.com.tr\/home-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcm\u00fcz<\/a>\u00a0\u00f6nceden y\u00fcklenmi\u015f vir\u00fcsl\u00fc uygulamalar\u0131 tarayamaz ve silemez, ancak sald\u0131rganlar\u0131n sunucular\u0131na veri g\u00f6nderme giri\u015fimlerini \u00f6nler ve sizi bu konuda uyar\u0131r.<\/p>\n<p>Ayr\u0131ca <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> veya <a href=\"https:\/\/www.kaspersky.com.tr\/plus?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> aboneli\u011fini tercih ederseniz, g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcn\u00fczle birlikte <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0aboneli\u011fine de sahip olursunuz.<\/p>\n<p>En son siber tehditlerden haberdar olmak i\u00e7in <a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">Telegram kanal\u0131m\u0131z\u0131<\/a>\u00a0takip edin ve foto\u011fraflar\u0131n\u0131z\u0131 g\u00fcvenli bir \u015fekilde saklad\u0131\u011f\u0131n\u0131zdan emin olun.<\/p>\n<blockquote><p>Ak\u0131ll\u0131 telefonunuzu g\u00fcvende tutmak i\u00e7in dikkat etmeniz gereken di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar hakk\u0131nda bilgi edinmek i\u00e7in a\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131za g\u00f6z atabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/necro-infects-android-users\/12842\/\" target=\"_blank\" rel=\"noopener\">Necro Truva At\u0131 11 milyon Android kullan\u0131c\u0131s\u0131na nas\u0131l sald\u0131rd\u0131?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/tria-stealer-wedding-scam\/52958\/\" target=\"_blank\" rel=\"noopener nofollow\">D\u00fc\u011f\u00fcn davetiyesi k\u0131l\u0131\u011f\u0131ndaki h\u0131rs\u0131zlara dikkat edin<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/trojan-in-fake-smartphones\/13304\/\" target=\"_blank\" rel=\"noopener\">Sahte Android ak\u0131ll\u0131 telefonlara yerle\u015ftirilmi\u015f Truva at\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">SparkCat truva at\u0131 h\u0131rs\u0131z\u0131 App Store ve Google Play\u2019e s\u0131zarak foto\u011fraflardan veri \u00e7al\u0131yor<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/new-spy-for-android-smartphones-lianspy\/51923\/\" target=\"_blank\" rel=\"noopener nofollow\">LianSpy: Android i\u00e7in yeni mobil casus yaz\u0131l\u0131m<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Bu, App Store&#8217;da tespit etti\u011fimiz ikinci h\u0131rs\u0131zl\u0131k Truva At\u0131 vakas\u0131.<\/p>\n","protected":false},"author":2706,"featured_media":13491,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[105,504,612,183,2629,750,26,1105,2790,241,1986],"class_list":{"0":"post-13490","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-app-store","10":"tag-dolandiricilik","11":"tag-google-play","12":"tag-hirsizlar","13":"tag-ios","14":"tag-iphone","15":"tag-kaspersky-password-manager","16":"tag-kripto","17":"tag-trojan","18":"tag-truva-atlari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-stealer-sparkkitty\/13490\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-android-stealer-sparkkitty\/28974\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/24204\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/12530\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-android-stealer-sparkkitty\/29086\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/28263\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-android-stealer-sparkkitty\/31087\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-android-stealer-sparkkitty\/29781\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-android-stealer-sparkkitty\/39936\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-android-stealer-sparkkitty\/53675\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-android-stealer-sparkkitty\/22911\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-android-stealer-sparkkitty\/32357\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-android-stealer-sparkkitty\/29301\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-android-stealer-sparkkitty\/35014\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-android-stealer-sparkkitty\/34652\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/hirsizlar\/","name":"h\u0131rs\u0131zlar"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13490"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13490\/revisions"}],"predecessor-version":[{"id":13493,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13490\/revisions\/13493"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13491"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}