{"id":13539,"date":"2025-07-21T15:57:33","date_gmt":"2025-07-21T12:57:33","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13539"},"modified":"2025-07-21T15:57:33","modified_gmt":"2025-07-21T12:57:33","slug":"what-are-sms-blasters-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/13539\/","title":{"rendered":"Kendinizi toplu SMS doland\u0131r\u0131c\u0131l\u0131klar\u0131ndan nas\u0131l korursunuz?"},"content":{"rendered":"<p>Bankalardan, teslimat hizmetlerinden veya belediye kurumlar\u0131ndan geliyormu\u015f gibi davranan sahte k\u0131sa mesajlar, doland\u0131r\u0131c\u0131lar\u0131n insanlar\u0131 finansal bilgilerini ve parolalar\u0131n\u0131 a\u00e7\u0131klamalar\u0131 i\u00e7in kand\u0131rmak i\u00e7in tercih ettikleri taktiktir. Bu t\u00fcr kimlik av\u0131 genellikle \u201csmishing\u201d (\u201cSMS phishing\u201d, yani SMS ile kimlik av\u0131) olarak adland\u0131r\u0131l\u0131r. Neredeyse her operat\u00f6r tehlikeli metin mesajlar\u0131n\u0131 filtrelerken ve yaln\u0131zca bir k\u0131sm\u0131 al\u0131c\u0131lara ula\u015f\u0131rken, doland\u0131r\u0131c\u0131lar yeni bir y\u00f6ntem buldular. Ge\u00e7ti\u011fimiz y\u0131l, <a href=\"https:\/\/www.theguardian.com\/money\/2025\/jun\/24\/police-sms-scams-blaster-texts-smishing\" target=\"_blank\" rel=\"nofollow noopener\">Birle\u015fik Krall\u0131k<\/a>, <a href=\"https:\/\/www.1news.co.nz\/2024\/10\/03\/sms-blaster-found-for-first-time-in-nz-alleged-scammer-arrested\/\" target=\"_blank\" rel=\"nofollow noopener\">Tayland<\/a> ve <a href=\"https:\/\/commsrisk.com\/bangkok-police-arrest-hong-kong-smishing-scammers-carrying-an-imsi-catcher-backpack-through-shopping-malls\/\" target=\"_blank\" rel=\"nofollow noopener\">Yeni Zelanda<\/a>\u2018da, operat\u00f6r a\u011flar\u0131n\u0131 baypas ederek do\u011frudan kurbanlar\u0131n telefonlar\u0131na mesaj g\u00f6nderen su\u00e7lular tutukland\u0131. \u201cToplu SMS doland\u0131r\u0131c\u0131l\u0131\u011f\u0131\u201d olarak bilinen bu y\u00f6ntemi gelin yak\u0131ndan inceleyelim.<\/p>\n<h2>Toplu SMS doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 nedir?<\/h2>\n<p>Bir SMS blaster, h\u00fccresel baz istasyonu gibi davran\u0131r. Ortalama eski bir bilgisayar kulesi b\u00fcy\u00fckl\u00fc\u011f\u00fcndedir ve i\u00e7i antenlerle doludur. Doland\u0131r\u0131c\u0131lar\u0131n genellikle bir araban\u0131n bagaj\u0131na veya hatta bir s\u0131rt \u00e7antas\u0131na zulalad\u0131klar\u0131 bu \u201cblaster\u201d etkinle\u015ftirildi\u011finde, en iyi sinyale sahip en g\u00fc\u00e7l\u00fc baz istasyonu olarak g\u00f6r\u00fcnd\u00fc\u011f\u00fc i\u00e7in yak\u0131ndaki t\u00fcm telefonlar\u0131n kendisine ba\u011flanmas\u0131n\u0131 ister. Bir telefon ba\u011fland\u0131\u011f\u0131nda, sahte bir SMS al\u0131r. Blaster modeline ve sinyal al\u0131m ko\u015fullar\u0131na ba\u011fl\u0131 olarak SMS yay\u0131n menzili yakla\u015f\u0131k 500 ila 2000 metre aras\u0131ndad\u0131r. Bu nedenle su\u00e7lular al\u0131\u015fveri\u015f merkezleri ya da turizm ve i\u015f merkezleri gibi kalabal\u0131k alanlarda operasyon yapmay\u0131 tercih ederler; bilinen t\u00fcm sald\u0131r\u0131lar\u0131n kaydedildi\u011fi yerler buralard\u0131r. Dahas\u0131, doland\u0131r\u0131c\u0131lar\u0131n kulland\u0131\u011f\u0131 teknoloji onlara her t\u00fcrl\u00fc kolayl\u0131\u011f\u0131 sa\u011flar: Mesajlar i\u00e7in \u00f6deme yapmazlar, herhangi bir g\u00f6ndericiyi taklit edebilirler ve herhangi bir ba\u011flant\u0131 eklemekte \u00f6zg\u00fcrd\u00fcrler; kurbanlar\u0131n telefon numaralar\u0131n\u0131 bilmelerine bile gerek yoktur zira sahte baz istasyonuna ba\u011flanan herhangi bir telefon mesaj\u0131 alacakt\u0131r.<\/p>\n<h2>Toplu SMS doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/h2>\n<p>Toplu SMS doland\u0131r\u0131c\u0131l\u0131\u011f\u0131, 2G (GSM) ileti\u015fim standard\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydalan\u0131r. G\u00fcn\u00fcm\u00fczde 2G \u00e7o\u011funlukla uzak ve n\u00fcfus yo\u011funlu\u011fu az olan b\u00f6lgelerde kullan\u0131lsa da, t\u00fcm telefonlar hala bu teknolojiyi desteklemektedir. Blaster ilk olarak modern 4G\/5G a\u011flar\u0131 \u00fczerinden teknik bir sinyal g\u00f6nderir. Herhangi bir telefon veya ak\u0131ll\u0131 telefon bu sinyali ald\u0131\u011f\u0131nda, 2G a\u011f\u0131na ge\u00e7meye \u00e7al\u0131\u015f\u0131r. Blaster, ayn\u0131 anda, sahte 2G baz istasyonu sinyalleri yay\u0131nlar. Kurban\u0131n ak\u0131ll\u0131 telefonu, bunlar\u0131 me\u015fru ta\u015f\u0131y\u0131c\u0131 sinyalleri olarak tan\u0131r ve ba\u011flan\u0131r. Ak\u0131ll\u0131 telefon ve baz istasyonunun ba\u011flant\u0131 s\u0131ras\u0131nda her zaman kar\u015f\u0131l\u0131kl\u0131 bir kriptografik kontrol ger\u00e7ekle\u015ftirdi\u011fi 3G, 4G ve 5G standartlar\u0131n\u0131n aksine, bu \u00f6zellik 2G\u2019de yaln\u0131zca iste\u011fe ba\u011fl\u0131yd\u0131. Bu bo\u015fluk, bir SMS blaster\u2019\u0131n herhangi bir ta\u015f\u0131y\u0131c\u0131y\u0131 taklit etmesine olanak tan\u0131r. Ba\u011fland\u0131ktan sonra, bir ak\u0131ll\u0131 telefona herhangi bir metin mesaj\u0131 g\u00f6nderebilir. SMS\u2019i ilettikten sonra sahte baz istasyonunun ba\u011flant\u0131s\u0131 kesilir ve ak\u0131ll\u0131 telefon yasal operat\u00f6r\u00fcyle normal 4G\/5G a\u011f\u0131na geri d\u00f6ner.<\/p>\n<p>Belki de \u015fa\u015f\u0131rt\u0131c\u0131 bir \u015fekilde, bu teknoloji yeni de\u011fil. Blaster\u2019lara benzer \u015fekilde, <a href=\"https:\/\/sls.eff.org\/technologies\/cell-site-simulators-imsi-catchers\" target=\"_blank\" rel=\"nofollow noopener\">IMSI yakalay\u0131c\u0131lar<\/a>, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stingray_phone_tracker\" target=\"_blank\" rel=\"nofollow noopener\">StingRays<\/a> veya h\u00fccre sitesi sim\u00fclat\u00f6rleri olarak bilinen cihazlar, kolluk kuvvetleri ve istihbarat kurumlar\u0131 taraf\u0131ndan ilgi \u00e7ekici etkinliklere kat\u0131lan ki\u015filer hakk\u0131nda veri toplamak i\u00e7in kullan\u0131lm\u0131\u015ft\u0131r. Ancak su\u00e7lular bu teknoloji i\u00e7in yeni bir kullan\u0131m alan\u0131 bulmu\u015f durumda.<\/p>\n<h2>SMS blaster\u2019lara kar\u015f\u0131 savunma<\/h2>\n<p>Ak\u0131ll\u0131 telefonunuzda 2G a\u011f ba\u011flant\u0131s\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rakarak sahte metin mesajlar\u0131n\u0131 engelleyebilirsiniz, ancak bu iki ucu keskin bir k\u0131l\u0131\u00e7t\u0131r. Sinyalin zay\u0131f oldu\u011fu bir b\u00f6lgede veya b\u00fcy\u00fck \u015fehirlerden uzakta ya\u015f\u0131yorsan\u0131z, telefonunuz hala ara s\u0131ra 2G kullanabilir. Bu nedenle bir\u00e7ok operat\u00f6r eski teknolojiyi tamamen ortadan kald\u0131rmam\u0131\u015ft\u0131r.<\/p>\n<p>Y\u0131llard\u0131r 2G simgesini (sinyal g\u00fcc\u00fc g\u00f6stergenizin yan\u0131nda bir \u201cE\u201d veya \u201cG\u201d) g\u00f6rmediyseniz, bu se\u00e7ene\u011fi de\u011ferlendirmek isteyebilirsiniz. S\u00fcr\u00fcm 12 veya daha yeni s\u00fcr\u00fcmleri \u00e7al\u0131\u015ft\u0131ran Android telefonlar <a href=\"https:\/\/security.googleblog.com\/2024\/08\/keeping-your-android-device-safe-from.html\" target=\"_blank\" rel=\"nofollow noopener\">2G\u2019yi devre d\u0131\u015f\u0131 b\u0131rakma<\/a> olana\u011f\u0131 sunar, ancak her sat\u0131c\u0131 bu se\u00e7ene\u011fi g\u00f6r\u00fcn\u00fcr ve eri\u015filebilir k\u0131lmaz. Android 16, ak\u0131ll\u0131 telefonunuzun sahte bir 2G kulesine ba\u011fl\u0131 olmas\u0131 durumunda sizi uyaran <a href=\"https:\/\/www.androidauthority.com\/android-16-mobile-network-security-3571497\/\" target=\"_blank\" rel=\"nofollow noopener\">bildirimler sunar<\/a>, ancak donan\u0131m s\u0131n\u0131rlamalar\u0131 nedeniyle bunlar yaln\u0131zca belirli yeni ak\u0131ll\u0131 telefonlarda \u00e7al\u0131\u015f\u0131r.<\/p>\n<p>iOS\u2019ta benzer bir se\u00e7enek yoktur, ancak Kilitleme Modunu etkinle\u015ftirerek 2G\u2019yi etkili bir \u015fekilde devre d\u0131\u015f\u0131 b\u0131rakabilirsiniz. Ne yaz\u0131k ki, bu sadece 2G\u2019yi kapatmaktan \u00e7ok daha fazlas\u0131n\u0131 yaparak maksimum g\u00fcvenlik ad\u0131na <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/apple-lockdown-mode\/10905\/\" target=\"_blank\" rel=\"noopener\">bir\u00e7ok iPhone i\u015flevini \u00f6nemli \u00f6l\u00e7\u00fcde k\u0131s\u0131tlar<\/a> (\u00e7o\u011fu ki\u015fi bunun bir iPhone\u2019u pratik olarak kullan\u0131lamaz hale getirdi\u011fini s\u00f6yleyebilir).<\/p>\n<p>Telefonunuzun i\u015flevselli\u011finden \u00f6d\u00fcn vermemek ve kendinizi tehlikeli metin mesajlar\u0131ndan korumak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">kapsaml\u0131 bir ak\u0131ll\u0131 telefon g\u00fcvenlik sistemi<\/a>\u00a0kullanabilirsiniz. Toplu SMS\u2019ler telefonunuza g\u00f6nderilmeye devam edecek, ancak iki koruma katman\u0131 sayesinde zarar vermeyecektir. Sistem, h\u00fccresel a\u011fdan ba\u011f\u0131ms\u0131z olarak k\u00f6t\u00fc ama\u00e7l\u0131 mesajlar\u0131 tan\u0131mlar ve SMS spam\u2019lerini engeller (yaln\u0131zca Android cihazlarda), kimlik av\u0131 korumas\u0131 ise tehlikeli web sitelerine gitmenizi engeller (t\u00fcm ak\u0131ll\u0131 telefonlarda).<\/p>\n<p>Teknik \u00f6nlemlerin \u00f6tesinde, dikkatli olmak ve genel \u00f6nlemler almak sahte k\u0131sa mesajlarla m\u00fccadelede \u00e7ok \u00f6nemlidir. Ba\u011flant\u0131lara dokunmak yerine, bankac\u0131l\u0131k uygulaman\u0131zda veya teslimat hizmeti web sitenizde do\u011frudan yer i\u015faretlerinizden, ak\u0131ll\u0131 telefonunuzun ana ekran\u0131ndan veya adresi taray\u0131c\u0131n\u0131za manuel olarak yazarak oturum a\u00e7\u0131n.<\/p>\n<blockquote><p>Doland\u0131r\u0131c\u0131lar ak\u0131ll\u0131 telefonunuza s\u0131zmaya \u00e7al\u0131\u015fmak i\u00e7in ba\u015fka hangi hileleri kullan\u0131yor?<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/data-theft-during-charging-choicejacking-protection\/13420\/\" target=\"_blank\" rel=\"noopener\">Ak\u0131ll\u0131 telefon \u015farj\u0131 s\u0131ras\u0131nda veri h\u0131rs\u0131zl\u0131\u011f\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/trojan-in-fake-smartphones\/13304\/\" target=\"_blank\" rel=\"noopener\">Sahte Android ak\u0131ll\u0131 telefonlara yerle\u015ftirilmi\u015f Truva at\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/samsung-exynos-vulnerabilities\/47586\/\" target=\"_blank\" rel=\"noopener nofollow\">Samsung, Google ve Vivo ak\u0131ll\u0131 telefonlar\u0131n uzaktan hacklenmesi: Sorun ve \u00e7\u00f6z\u00fcm<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/disable-mobile-app-ad-tracking\/13196\/\" target=\"_blank\" rel=\"noopener\">Ak\u0131ll\u0131 telefonlar hakk\u0131n\u0131zda nas\u0131l dosya olu\u015fturur?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/smart-speaker-tv-smartphone-eavesdropping\/11996\/\" target=\"_blank\" rel=\"noopener\">Televizyonunuz, ak\u0131ll\u0131 telefonunuz ve ak\u0131ll\u0131 hoparl\u00f6rleriniz sizi gizlice dinliyor mu?<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n","protected":false},"excerpt":{"rendered":"<p>Doland\u0131r\u0131c\u0131lar, h\u00fccresel a\u011flar\u0131 baypas eden k\u0131sa mesajlar\u0131n nas\u0131l g\u00f6nderilece\u011finin y\u00f6ntemini \u00e7\u00f6zd\u00fcler. Yasad\u0131\u015f\u0131 \u201ctoplu SMS g\u00f6nderimi\u201d nas\u0131l \u00e7al\u0131\u015f\u0131r, seyahat edenler i\u00e7in neden \u00f6nemlidir ve nas\u0131l g\u00fcvende kal\u0131n\u0131r? <\/p>\n","protected":false},"author":2722,"featured_media":13540,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[105,500,750,519,1074,2348,46,537],"class_list":{"0":"post-13539","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-gizlilik","10":"tag-ios","11":"tag-ipuclari-2","12":"tag-kimlik-avi","13":"tag-mesajlasma-programlari","14":"tag-sms","15":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/13539\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/29102\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/24308\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/12574\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/29166\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/28305\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/31141\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/29817\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/40076\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/53810\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/22960\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/23990\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/32415\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-are-sms-blasters-and-how-to-protect-yourself\/29364\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/35085\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-are-sms-blasters-and-how-to-protect-yourself\/34728\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/sms\/","name":"sms"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13539"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13539\/revisions"}],"predecessor-version":[{"id":13542,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13539\/revisions\/13542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13540"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}