{"id":13569,"date":"2025-07-25T17:25:42","date_gmt":"2025-07-25T14:25:42","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13569"},"modified":"2025-07-25T17:25:42","modified_gmt":"2025-07-25T14:25:42","slug":"save-your-home-router-from-apt-residential-proxy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/save-your-home-router-from-apt-residential-proxy\/13569\/","title":{"rendered":"Y\u00f6nlendiriciniz gizlice yabanc\u0131 istihbarat i\u00e7in mi \u00e7al\u0131\u015f\u0131yor?"},"content":{"rendered":"<p>Yak\u0131n zamanda ortaya \u00e7\u0131kan <a href=\"https:\/\/www.greynoise.io\/blog\/stealthy-backdoor-campaign-affecting-asus-routers\" target=\"_blank\" rel=\"nofollow noopener\">binlerce ASUS ev y\u00f6nlendiricisinin hacklenmesi<\/a>; evinizdeki Wi-Fi eri\u015fim noktas\u0131n\u0131n sadece siz (ve muhtemelen <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-wifi-from-neighbors\/9444\/\" target=\"_blank\" rel=\"noopener\">kom\u015fular\u0131n\u0131z<\/a>) taraf\u0131ndan kullan\u0131lmakla kalmad\u0131\u011f\u0131n\u0131, ayn\u0131 zamanda siber su\u00e7lular\u0131n ve hatta hedefe y\u00f6nelik casusluk sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftiren devlet destekli bilgisayar korsanlar\u0131n\u0131n da g\u00f6zdesi oldu\u011funu g\u00f6steriyor. K\u00f6t\u00fc \u015f\u00f6hretli APT31 grubuyla ba\u011flant\u0131l\u0131 oldu\u011fu tahmin edilen bu yeni sald\u0131r\u0131 halen devam ediyor. Onu \u00f6zellikle tehlikeli yapan \u015fey, gizli do\u011fas\u0131 ve ona kar\u015f\u0131 savunma yapmak i\u00e7in gereken al\u0131\u015f\u0131lmad\u0131k yakla\u015f\u0131md\u0131r. Bu nedenle k\u00f6t\u00fc niyetli akt\u00f6rlerin neden y\u00f6nlendiricileri hedef ald\u0131\u011f\u0131n\u0131 ve kendinizi bu hacker hilelerinden nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 anlamak \u00e7ok \u00f6nemlidir.<\/p>\n<h2>G\u00fcvenli\u011fi ihlal edilmi\u015f y\u00f6nlendiriciler nas\u0131l istismar edilir?<\/h2>\n<ul>\n<li><strong>Konut proxy\u2019si:<\/strong> Bilgisayar korsanlar\u0131 b\u00fcy\u00fck \u015firketleri veya devlet kurumlar\u0131n\u0131 hedef ald\u0131\u011f\u0131nda, sald\u0131r\u0131lar genellikle g\u00fcvenli a\u011fa eri\u015fmeye \u00e7al\u0131\u015fan ola\u011fand\u0131\u015f\u0131 IP adresleri taraf\u0131ndan tespit edilir. Bir \u015firket bir \u00fclkede faaliyet g\u00f6sterirken bir \u00e7al\u0131\u015fan\u0131n aniden ba\u015fka bir \u00fclkeden \u015firket a\u011f\u0131na giri\u015f yapmas\u0131 olduk\u00e7a \u015f\u00fcphe uyand\u0131r\u0131c\u0131d\u0131r. Bilinen VPN sunucu adreslerinden yap\u0131lan giri\u015fler de ayn\u0131 derecede \u015f\u00fcphelidir. Siber su\u00e7lular faaliyetlerini maskelemek i\u00e7in ama\u00e7lad\u0131klar\u0131 hedefe yak\u0131n bir \u00fclkede <a href=\"https:\/\/www.kaspersky.com\/blog\/residential-proxies-risks-and-mitigation\/50991\/\" target=\"_blank\" rel=\"noopener nofollow\">ve hatta bazen belirli bir \u015fehirde<\/a> bulunan hacklenmi\u015f y\u00f6nlendiricileri kullan\u0131rlar. T\u00fcm isteklerini y\u00f6nlendiriciniz arac\u0131l\u0131\u011f\u0131yla iletirler, y\u00f6nlendiriciniz de verileri hedef bilgisayara iletir. \u0130zleme sistemlerine g\u00f6re bu, normal bir \u00e7al\u0131\u015fan\u0131n i\u015f kaynaklar\u0131na evden eri\u015fmesi gibi g\u00f6r\u00fcn\u00fcr ve herhangi bir \u015f\u00fcphe uyand\u0131racak bir \u015fey de\u011fildir.<\/li>\n<li><strong>Komut ve kontrol sunucusu:<\/strong> Sald\u0131rganlar, hedef bilgisayarlar\u0131n indirmesi i\u00e7in g\u00fcvenli\u011fi ihlal edilmi\u015f cihazda k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bar\u0131nd\u0131rabilir. Ya da tam tersine, a\u011fdan do\u011frudan y\u00f6nlendiricinize veri s\u0131zd\u0131rabilirler.<\/li>\n<li><strong>Rakipler i\u00e7in bal k\u00fcp\u00fc:<\/strong> Bir y\u00f6nlendirici, di\u011fer hacker gruplar\u0131 taraf\u0131ndan kullan\u0131lan teknikleri incelemek i\u00e7in yem (bal k\u00fcp\u00fc) olarak kullan\u0131labilir.<\/li>\n<li><strong>Madencilik te\u00e7hizat\u0131:<\/strong> Kripto madencili\u011fi i\u00e7in herhangi bir i\u015flemcili cihaz kullan\u0131labilir. Madencilik i\u00e7in bir y\u00f6nlendirici kullanmak \u00e7ok verimli de\u011fildir, ancak bir siber su\u00e7lu elektrik veya ekipman i\u00e7in \u00f6deme yapmad\u0131\u011f\u0131ndan, yine de onlar i\u00e7in i\u015fe yarar.<\/li>\n<li><strong>Trafik manip\u00fclasyon arac\u0131. <\/strong>G\u00fcvenli\u011fi ihlal edilmi\u015f bir y\u00f6nlendirici internet ba\u011flant\u0131lar\u0131n\u0131n i\u00e7eri\u011fini ele ge\u00e7irebilir ve de\u011fi\u015ftirebilir. Bu, sald\u0131rganlar\u0131n ev a\u011f\u0131na ba\u011fl\u0131 herhangi bir cihaz\u0131 hedef almas\u0131na olanak tan\u0131r. Bu tekni\u011fin uygulama alan\u0131, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/router-malware\/10767\/\" target=\"_blank\" rel=\"noopener\">parolalar\u0131n \u00e7al\u0131nmas\u0131ndan web sayfalar\u0131na reklam enjekte edilmesine kadar<\/a>, olduk\u00e7a geni\u015ftir.<\/li>\n<li><strong>DDoS botu:<\/strong> Y\u00f6nlendiriciler, bebek monit\u00f6rleri, ak\u0131ll\u0131 hoparl\u00f6rler ve hatta ak\u0131ll\u0131 su \u0131s\u0131t\u0131c\u0131lar\u0131 dahil olmak \u00fczere t\u00fcm ev cihazlar\u0131 bir botnet a\u011f\u0131na ba\u011flanabilir ve bu cihazlardan milyonlarca e\u015fzamanl\u0131 istek g\u00f6ndererek herhangi bir \u00e7evrimi\u00e7i hizmete a\u015f\u0131r\u0131 y\u00fckleme yapabilir.<\/li>\n<\/ul>\n<p>Bu se\u00e7enekler \u00e7e\u015fitli sald\u0131rgan gruplar\u0131n\u0131n ilgisini \u00e7ekmektedir. Madencilik, reklam enjeksiyonu ve DDoS sald\u0131r\u0131lar\u0131 genellikle finansal ama\u00e7l\u0131 siber su\u00e7lular\u0131n ilgisini \u00e7ekerken, konut IP adreslerinden ba\u015flat\u0131lan hedefli sald\u0131r\u0131lar genellikle fidye yaz\u0131l\u0131m\u0131 \u00e7eteleri veya ger\u00e7ek casusluk faaliyetlerinde bulunan gruplar taraf\u0131ndan ger\u00e7ekle\u015ftirilir. Bu, casus romanlar\u0131ndan \u00e7\u0131km\u0131\u015f gibi gelebilir, ancak o kadar yayg\u0131nd\u0131r ki, ABD Siber G\u00fcvenlik ve Altyap\u0131 G\u00fcvenli\u011fi Ajans\u0131 (<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2024-01\/SbD-Alert-Security-Design-Improvements-for-SOHO-Device-Manufacturers.pdf\" target=\"_blank\" rel=\"nofollow noopener\">CISA<\/a>) ve <a href=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250507\" target=\"_blank\" rel=\"nofollow noopener\">FBI<\/a>, \u00e7e\u015fitli zamanlarda bu konuda bir\u00e7ok uyar\u0131 yay\u0131nlam\u0131\u015ft\u0131r. Casuslar, do\u011falar\u0131 gere\u011fi son derece gizli \u00e7al\u0131\u015f\u0131r, bu nedenle y\u00f6nlendirici sahipleri, cihazlar\u0131n\u0131n ama\u00e7 d\u0131\u015f\u0131 kullan\u0131ld\u0131\u011f\u0131n\u0131 nadiren fark ederler.<\/p>\n<h2>Y\u00f6nlendiriciler nas\u0131l hacklenir?<\/h2>\n<p>Bir y\u00f6nlendiriciyi hacklemenin en yayg\u0131n iki yolu, y\u00f6netim arabirimine deneme yan\u0131lma yoluyla parola k\u0131rmak ve donan\u0131m yaz\u0131l\u0131m\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 k\u00f6t\u00fcye kullanmakt\u0131r. \u0130lk senaryoda sald\u0131rganlar, y\u00f6nlendiriciyi fabrika ayarlar\u0131 ve varsay\u0131lan <strong>admin<\/strong> parolas\u0131yla b\u0131rakan veya parolay\u0131 <strong>123456<\/strong> gibi hat\u0131rlamas\u0131 ve tahmin etmesi kolay bir parolayla de\u011fi\u015ftiren sahiplerden yararlan\u0131r. Sald\u0131rganlar parolay\u0131 k\u0131rd\u0131ktan sonra kontrol paneline t\u0131pk\u0131 sahibi gibi giri\u015f yapabilirler.<\/p>\n<p>\u0130kinci senaryoda, sald\u0131rganlar \u00fcreticisini ve modelini belirlemek i\u00e7in y\u00f6nlendiriciyi uzaktan ara\u015ft\u0131r\u0131r, ard\u0131ndan cihaz\u0131n kontrol\u00fcn\u00fc ele ge\u00e7irmek i\u00e7in bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tek tek dener.<\/p>\n<p>Tipik olarak, ba\u015far\u0131l\u0131 bir sald\u0131r\u0131dan sonra, istedikleri i\u015flevleri yerine getirmek i\u00e7in y\u00f6nlendiriciye gizli k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklerler. \u0130nternetiniz yava\u015flad\u0131\u011f\u0131nda, y\u00f6nlendiricinizin CPU\u2019su fazla mesai yapt\u0131\u011f\u0131nda veya hatta <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/router-malware\/10767\/\" target=\"_blank\" rel=\"noopener\">y\u00f6nlendirici a\u015f\u0131r\u0131 \u0131s\u0131nmaya ba\u015flad\u0131\u011f\u0131nda<\/a> bir \u015feylerin yanl\u0131\u015f gitti\u011fini fark edebilirsiniz. Fabrika ayarlar\u0131na d\u00f6nme veya \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemesi genellikle tehdidi ortadan kald\u0131r\u0131r. Ancak ASUS y\u00f6nlendiricilere y\u00f6nelik son sald\u0131r\u0131lar farkl\u0131 bir hikayeydi.<\/p>\n<h2>ASUS sald\u0131r\u0131lar\u0131n\u0131 farkl\u0131 k\u0131lan nedir ve nas\u0131l fark edilir?<\/h2>\n<p>Bu sald\u0131r\u0131yla ilgili en \u00f6nemli \u015fey, basit bir \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemesiyle d\u00fczeltilemeyecek olmas\u0131d\u0131r. Sald\u0131rganlar, d\u00fczenli yeniden ba\u015flatmalar ve \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemeleri boyunca devam eden y\u00f6netici eri\u015fimine sahip gizli bir arka kap\u0131 kurarlar.<\/p>\n<p>Sald\u0131r\u0131y\u0131 ba\u015flatmak i\u00e7in sald\u0131rgan yukar\u0131da a\u00e7\u0131klanan her iki tekni\u011fi de kullan\u0131r. Y\u00f6netici parolas\u0131n\u0131 deneme yan\u0131lma ile zorlamak ba\u015far\u0131s\u0131z olursa, sald\u0131rganlar kimlik do\u011frulamay\u0131 tamamen atlamak i\u00e7in iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlan\u0131r.<\/p>\n<p>Bu noktadan sonra sald\u0131r\u0131 daha karma\u015f\u0131k hale gelir. Sald\u0131rganlar, y\u00f6nlendiricinin yerle\u015fik SSH uzaktan y\u00f6netim \u00f6zelli\u011fini etkinle\u015ftirmek i\u00e7in ba\u015fka bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 kullan\u0131r. Daha sonra ayarlara, cihaza ba\u011flanmalar\u0131n\u0131 ve cihaz\u0131 kontrol etmelerini sa\u011flayacak olan kendi kriptografik anahtarlar\u0131n\u0131 eklerler.<\/p>\n<p>\u00c7ok az ev kullan\u0131c\u0131s\u0131 SSH kullanarak y\u00f6nlendiricilerini y\u00f6netir veya y\u00f6netici anahtarlar\u0131n\u0131n listelendi\u011fi ayarlar b\u00f6l\u00fcm\u00fcn\u00fc kontrol eder, bu nedenle bu eri\u015fim tekni\u011fi y\u0131llarca fark edilmeyebilir.<\/p>\n<p>Bu sald\u0131r\u0131da istismar edilen \u00fc\u00e7 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da o zamandan beri sat\u0131c\u0131 taraf\u0131ndan yamalanm\u0131\u015ft\u0131r. Ancak, y\u00f6nlendiriciniz daha \u00f6nce ele ge\u00e7irilmi\u015fse, ayg\u0131t yaz\u0131l\u0131m\u0131n\u0131 g\u00fcncellemek arka kap\u0131y\u0131 kald\u0131rmayacakt\u0131r. Y\u00f6nlendiricinizin ayarlar\u0131n\u0131 a\u00e7man\u0131z ve 53282 numaral\u0131 portu dinleyen bir SSH sunucusunun etkin olup olmad\u0131\u011f\u0131n\u0131 kontrol etmeniz gerekir. E\u011fer \u00f6yleyse, SSH sunucusunu devre d\u0131\u015f\u0131 b\u0131rak\u0131n ve \u015fu karakterlerle ba\u015flayan y\u00f6netici SSH anahtar\u0131n\u0131 silin<\/p>\n<p><strong><em>AAAAB3NzaC1yc2EA<\/em><\/strong><\/p>\n<p>T\u00fcm bunlar\u0131 nas\u0131l yapaca\u011f\u0131n\u0131zdan emin de\u011filseniz, daha k\u00f6kl\u00fc bir \u00e7\u00f6z\u00fcm var: Fabrika ayarlar\u0131na geri d\u00f6nme.<\/p>\n<h2>Sadece ASUS de\u011fil<\/h2>\n<p>ASUS sald\u0131r\u0131s\u0131n\u0131 ke\u015ffeden ara\u015ft\u0131rmac\u0131lar, bunun video g\u00f6zetim sistemleri, NAS kutular\u0131 ve ofis VPN sunucular\u0131 da dahil olmak \u00fczere yakla\u015f\u0131k 60 t\u00fcr ev ve ofis cihaz\u0131n\u0131 vuran <a href=\"https:\/\/blog.sekoia.io\/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse\/\" target=\"_blank\" rel=\"nofollow noopener\">daha geni\u015f bir sald\u0131r\u0131 kampanyas\u0131n\u0131n<\/a> par\u00e7as\u0131 oldu\u011funa inan\u0131yor. Etkilenen cihazlar aras\u0131nda D-Link DIR-850L S, Cisco RV042, Araknis Networks AN-300-RT-4L2W, Linksys LRT224 ve baz\u0131 QNAP cihazlar\u0131 bulunmaktad\u0131r. Bunlara y\u00f6nelik sald\u0131r\u0131lar biraz farkl\u0131 \u015fekilde ortaya \u00e7\u0131ksa da ayn\u0131 genel \u00f6zellikleri payla\u015fmaktad\u0131r; g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma, kontrol\u00fc ele ge\u00e7irmek i\u00e7in yerle\u015fik cihaz i\u015flevlerini kullanma ve gizlili\u011fi koruma. Ara\u015ft\u0131rmac\u0131lar\u0131n de\u011ferlendirmelerine g\u00f6re, ele ge\u00e7irilen cihazlar trafi\u011fi yeniden y\u00f6nlendirmek ve rakip tehdit akt\u00f6rleri taraf\u0131ndan kullan\u0131lan sald\u0131r\u0131 tekniklerini izlemek i\u00e7in kullan\u0131l\u0131yor. Bu sald\u0131r\u0131lar \u201ciyi kaynaklara sahip ve son derece yetenekli\u201d bir bilgisayar korsanl\u0131\u011f\u0131 grubuna atfedilmekte. Bununla birlikte, benzer teknikler d\u00fcnyan\u0131n d\u00f6rt bir yan\u0131ndaki hedefli sald\u0131r\u0131 gruplar\u0131 taraf\u0131ndan benimsenmi\u015f. Bu nedenle, orta b\u00fcy\u00fckl\u00fckteki herhangi bir \u00fclkenin ev tipi y\u00f6nlendiricileri art\u0131k onlar i\u00e7in cazip bir hedef haline gelmi\u015f durumda.<\/p>\n<h2>\u00d6nemli noktalar ve ipu\u00e7lar\u0131<\/h2>\n<p>ASUS ev y\u00f6nlendiricilerine y\u00f6nelik sald\u0131r\u0131, hedefli izinsiz giri\u015flerin klasik belirtilerini g\u00f6stermektedir: S\u0131zma, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kullanmadan ele ge\u00e7irme ve g\u00fcvenlik a\u00e7\u0131\u011f\u0131 yamaland\u0131ktan ve \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellendikten sonra bile a\u00e7\u0131k kalan kal\u0131c\u0131 eri\u015fim kanallar\u0131n\u0131n olu\u015fturulmas\u0131. Peki, bir ev kullan\u0131c\u0131s\u0131 bu t\u00fcr sald\u0131rganlara kar\u015f\u0131 korunmak i\u00e7in ne yapabilir?<\/p>\n<ul>\n<li><strong>Y\u00f6nlendirici se\u00e7iminiz \u00f6nemlidir.<\/strong> Sa\u011flay\u0131c\u0131n\u0131z\u0131n size kiralad\u0131\u011f\u0131 standart y\u00f6nlendiriciyle yetinmeyin ve her zaman en ucuz se\u00e7ene\u011fi tercih etmeyin. Elektronik ma\u011fazalar\u0131ndaki se\u00e7eneklere g\u00f6z at\u0131n ve son bir veya iki y\u0131l i\u00e7inde piyasaya s\u00fcr\u00fclen bir model se\u00e7in, b\u00f6ylece gelecek y\u0131llarda \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemelerini almay\u0131 garantileyebilirsiniz. G\u00fcvenli\u011fi ciddiye alan bir \u00fcretici se\u00e7meye \u00e7al\u0131\u015f\u0131n. Ortada m\u00fckemmel se\u00e7enekler olmad\u0131\u011f\u0131 i\u00e7in bu zor bir i\u015ftir. Genellikle \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemelerinin s\u0131kl\u0131\u011f\u0131n\u0131 ve \u00fcreticinin belirtti\u011fi destek s\u00fcresini bir k\u0131lavuz olarak kullanabilirsiniz. <a href=\"https:\/\/routersecurity.org\/RouterNews.php\" target=\"_blank\" rel=\"nofollow noopener\">Router Security<\/a> gibi sitelerde en son y\u00f6nlendirici g\u00fcvenli\u011fi haberlerini bulabilirsiniz, ancak orada \u201ciyi hikayeler\u201d bulmay\u0131 beklemeyin; buras\u0131 daha \u00e7ok \u201canti-kahramanlar\u0131\u201d bulmak i\u00e7in kullan\u0131\u015fl\u0131d\u0131r.<\/li>\n<li><strong>Cihaz\u0131n\u0131z\u0131n ayg\u0131t yaz\u0131l\u0131m\u0131n\u0131 d\u00fczenli olarak g\u00fcncelleyin.<\/strong> Y\u00f6nlendiriciniz otomatik g\u00fcncelleme \u00f6zelli\u011fi sunuyorsa, en iyisi bunu etkinle\u015ftirmektir, b\u00f6ylece manuel g\u00fcncellemeler veya geride kalma konusunda endi\u015felenmenize gerek kalmaz. Yine de y\u0131lda birka\u00e7 kez y\u00f6nlendiricinizin durumunu, ayarlar\u0131n\u0131 ve \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 s\u00fcr\u00fcm\u00fcn\u00fc kontrol etmek iyi bir fikirdir. 12-18 ay i\u00e7inde bir \u00fcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellemesi almad\u0131ysan\u0131z, y\u00f6nlendiricinizi daha yeni bir modelle de\u011fi\u015ftirmeyi d\u00fc\u015f\u00fcnmenin zaman\u0131 gelmi\u015f olabilir.<\/li>\n<li><strong>Y\u00f6nlendiricinizdeki t\u00fcm gereksiz hizmetleri devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/strong> T\u00fcm ayarlar\u0131 g\u00f6zden ge\u00e7irin ve kullanmad\u0131\u011f\u0131n\u0131z \u00f6zellikleri veya ekstralar\u0131 kapat\u0131n.<\/li>\n<li>T\u00fcm y\u00f6netim kanallar\u0131 (SSH, HTTPS, Telnet ve di\u011fer her \u015fey) arac\u0131l\u0131\u011f\u0131yla y\u00f6nlendiricinize internetten (WAN) <strong>y\u00f6netici eri\u015fimini devre d\u0131\u015f\u0131 b\u0131rak\u0131n<\/strong>.<\/li>\n<li><strong>Mobil y\u00f6nlendirici y\u00f6netim uygulamalar\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/strong> Her ne kadar kullan\u0131\u015fl\u0131 olsa da, bu uygulamalar bir dizi yeni riski de beraberinde getirmektedir. Zira ak\u0131ll\u0131 telefonunuz ve y\u00f6nlendiricinize ek olarak, muhtemelen \u00f6zel bir bulut hizmeti de s\u00f6z konusu olacakt\u0131r. Bu nedenle, bu y\u00f6netim y\u00f6ntemini devre d\u0131\u015f\u0131 b\u0131rakmak ve kullanmaktan ka\u00e7\u0131nmak en iyisidir.<\/li>\n<li>Hem y\u00f6nlendirici y\u00f6netimi hem de Wi-Fi eri\u015fimi i\u00e7in <strong>varsay\u0131lan parolalar\u0131 de\u011fi\u015ftirin<\/strong>. Bu parolalar ayn\u0131 olmamal\u0131d\u0131r. Her biri uzun olmal\u0131 ve belirgin kelimeler veya say\u0131lardan olu\u015fmamal\u0131d\u0131r. Y\u00f6nlendiriciniz izin veriyorsa, <strong>admin<\/strong> kullan\u0131c\u0131 ad\u0131n\u0131 benzersiz bir adla de\u011fi\u015ftirin.<\/li>\n<li><strong>Ev a\u011f\u0131n\u0131z i\u00e7in kapsaml\u0131 koruma kullan\u0131n.<\/strong> \u00d6rne\u011fin <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>, savunmas\u0131z cihazlar ve zay\u0131f parola gibi yayg\u0131n sorunlar\u0131 izleyen bir <a href=\"https:\/\/support.kaspersky.com\/tr\/kaspersky-for-windows\/21.21\/138204\" target=\"_blank\" rel=\"noopener\">ak\u0131ll\u0131 ev koruma mod\u00fcl\u00fc<\/a> ile birlikte gelir. Ak\u0131ll\u0131 ev monit\u00f6r\u00fcn\u00fcz a\u011f\u0131n\u0131zda zay\u0131f noktalar veya daha \u00f6nce tan\u0131mlamad\u0131\u011f\u0131n\u0131z yeni bir cihaz tespit ederse, sizi uyaracak ve a\u011f\u0131n\u0131z\u0131n g\u00fcvenli\u011fini sa\u011flamak i\u00e7in \u00f6nerilerde bulunacakt\u0131r.<\/li>\n<li><strong>Y\u00f6nlendiricinizin yap\u0131land\u0131rmas\u0131n\u0131n her sayfas\u0131n\u0131 kontrol edin.<\/strong> A\u015fa\u011f\u0131daki \u015f\u00fcpheli i\u015faretleri aray\u0131n: (1) Ev a\u011f\u0131n\u0131zdaki veya internetteki bilinmeyen cihazlara port y\u00f6nlendirme, (2) Olu\u015fturmad\u0131\u011f\u0131n\u0131z yeni kullan\u0131c\u0131 hesaplar\u0131 ve (3) Bilinmeyen SSH anahtarlar\u0131 veya di\u011fer oturum a\u00e7ma kimlik bilgileri. Buna benzer bir \u015fey bulursan\u0131z, kullan\u0131c\u0131 ad\u0131 veya port adresi gibi ke\u015ffetti\u011finiz \u015f\u00fcpheli bilgilerle birlikte y\u00f6nlendirici modelinizi \u00e7evrimi\u00e7i olarak aray\u0131n. Y\u00f6nlendiricinizin belgelenmi\u015f bir sistem \u00f6zelli\u011fi olarak ke\u015ffetti\u011finiz sorunla ilgili herhangi bir ibare bulamazsan\u0131z, bu verileri kald\u0131r\u0131n.<\/li>\n<li><strong><a href=\"https:\/\/t.me\/+hfDEDRUTiLJlOGE8\" target=\"_blank\" rel=\"noopener nofollow\">Telegram kanal\u0131m\u0131za abone olun<\/a> <\/strong>ve t\u00fcm siber g\u00fcvenlik haberlerinden haberdar olun.<\/li>\n<\/ul>\n<blockquote><p>Ak\u0131ll\u0131 ev cihazlar\u0131n\u0131z\u0131 se\u00e7me, kurma ve koruma konusunda daha fazla ipucu ve evinizdeki elektronik cihazlar\u0131 hedef alan di\u011fer hacker tehditleri hakk\u0131nda bilgi almak i\u00e7in a\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131za g\u00f6z atabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/smart-home-zigbee-thread-matter-advice\/47343\/\" target=\"_blank\" rel=\"noopener nofollow\">Ak\u0131ll\u0131 evinizi nas\u0131l planlars\u0131n\u0131z ve halihaz\u0131rda sahip oldu\u011funuz cihazlardan en iyi \u015fekilde nas\u0131l yararlan\u0131rs\u0131n\u0131z?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-secure-smart-home\/47472\/\" target=\"_blank\" rel=\"noopener nofollow\">Ak\u0131ll\u0131 evinizin g\u00fcvenli\u011fini nas\u0131l sa\u011flars\u0131n\u0131z: Derinlemesine bir k\u0131lavuz<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/vulnerability-in-smart-home-control-app\/13396\/\" target=\"_blank\" rel=\"noopener\">O kadar da ak\u0131ll\u0131 olmayan ev<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/3-reasons-not-to-use-smart-locks\/11431\/\" target=\"_blank\" rel=\"noopener\">Ak\u0131ll\u0131 kilit kullanmaman\u0131z i\u00e7in \u00fc\u00e7 neden<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/router-malware\/10767\/\" target=\"_blank\" rel=\"noopener\">Y\u00f6nlendirici (Router) k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n\u0131n gizli tehditleri<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-generic\">\n","protected":false},"excerpt":{"rendered":"<p>\u0130leri d\u00fczey sald\u0131rganlar neden evinizdeki Wi-Fi eri\u015fim noktalar\u0131yla ilgileniyor ve cihazlar\u0131n\u0131z \u00fczerinde nas\u0131l kontrol sa\u011fl\u0131yorlar?<\/p>\n","protected":false},"author":2722,"featured_media":13570,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1350,1033,744,629,519,1525,1705,561,878,174,1929],"class_list":{"0":"post-13569","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-akilli-ev","9":"tag-ddos","10":"tag-guvenlik","11":"tag-iot","12":"tag-ipuclari-2","13":"tag-parolalar","14":"tag-proxy","15":"tag-sifreler","16":"tag-teknoloji","17":"tag-wi-fi","18":"tag-yonlendiriciler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/save-your-home-router-from-apt-residential-proxy\/13569\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/save-your-home-router-from-apt-residential-proxy\/29145\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/save-your-home-router-from-apt-residential-proxy\/24341\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/save-your-home-router-from-apt-residential-proxy\/29185\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/save-your-home-router-from-apt-residential-proxy\/28331\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/save-your-home-router-from-apt-residential-proxy\/31166\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/save-your-home-router-from-apt-residential-proxy\/39859\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/save-your-home-router-from-apt-residential-proxy\/53840\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/save-your-home-router-from-apt-residential-proxy\/22983\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/save-your-home-router-from-apt-residential-proxy\/24012\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/save-your-home-router-from-apt-residential-proxy\/32438\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/save-your-home-router-from-apt-residential-proxy\/29260\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/save-your-home-router-from-apt-residential-proxy\/35117\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/save-your-home-router-from-apt-residential-proxy\/34756\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/wi-fi\/","name":"wi-fi"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13569"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13569\/revisions"}],"predecessor-version":[{"id":13572,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13569\/revisions\/13572"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13570"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13569"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13569"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}