{"id":13963,"date":"2025-11-11T19:20:42","date_gmt":"2025-11-11T16:20:42","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13963"},"modified":"2025-11-11T19:20:42","modified_gmt":"2025-11-11T16:20:42","slug":"bluenoroff-ghostcall-ghosthire-lazarus","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/13963\/","title":{"rendered":"GhostCall ve GhostHire: Kripto varl\u0131klar\u0131n\u0131 avlamak"},"content":{"rendered":"<p>Kaspersky Global Ara\u015ft\u0131rma ve Analiz Ekibi (GReAT) uzmanlar\u0131, Security Analyst Summit 2025\u2019te Lazarus\u2019un bir alt grubu oldu\u011funu d\u00fc\u015f\u00fcnd\u00fc\u011f\u00fcm\u00fcz BlueNoroff APT grubunun faaliyetleri hakk\u0131nda konu\u015ftu. \u00d6zellikle, kripto end\u00fcstrisindeki geli\u015ftiricileri ve y\u00f6neticileri hedef alan GhostCall ve GhostHire sald\u0131r\u0131 kampanyalar\u0131n\u0131 ayr\u0131nt\u0131larla a\u00e7\u0131klad\u0131lar.<\/p>\n<p>BlueNoroff akt\u00f6rleri \u00f6ncelikle finansal kazan\u00e7la ilgileniyor ve \u015fimdilerde blockchain ile \u00e7al\u0131\u015fan kurulu\u015flar\u0131n \u00e7al\u0131\u015fanlar\u0131na sald\u0131rmay\u0131 tercih ediyor. Hedefler \u00f6zenle se\u00e7iliyor: Sald\u0131rganlar her sald\u0131r\u0131 i\u00e7in son derece titiz bir haz\u0131rl\u0131k yap\u0131yor. GhostCall ve GhostHire sald\u0131r\u0131 kampanyalar\u0131 birbirlerinden \u00e7ok farkl\u0131, olsalar da ortak bir y\u00f6netim altyap\u0131s\u0131na dayanmaktalar. Bu nedenle uzmanlar\u0131m\u0131z bunlar\u0131 tek bir raporda birle\u015ftirdiler.<\/p>\n<h2>GhostCall kampanyas\u0131<\/h2>\n<p>GhostCall sald\u0131r\u0131 kampanyas\u0131, esas olarak \u00e7e\u015fitli kurulu\u015flar\u0131n y\u00f6neticilerini hedef almakta. Sald\u0131rganlar, kripto para birimlerini, kimlik bilgilerini ve gizli bilgileri \u00e7almak i\u00e7in tasarlanm\u0131\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla kurbanlar\u0131n bilgisayarlar\u0131na girmeye \u00e7al\u0131\u015f\u0131yorlar. GhostCall operat\u00f6rlerinin ilgilendi\u011fi ana platform macOS. Bunun muhtemel sebebi Apple cihazlar\u0131n\u0131n modern \u015firketlerin y\u00f6netimleri aras\u0131nda \u00f6zellikle pop\u00fcler olmas\u0131.<\/p>\n<p>GhostCall sald\u0131r\u0131lar\u0131 olduk\u00e7a sofistike bir sosyal m\u00fchendislikle ba\u015fl\u0131yor: Sald\u0131rganlar yat\u0131r\u0131mc\u0131 gibi davran\u0131yorlar (bazen ger\u00e7ek giri\u015fimcilerin \u00e7al\u0131nan hesaplar\u0131n\u0131 ve hatta onlarla yap\u0131lan ger\u00e7ek video g\u00f6r\u00fc\u015fmelerinin par\u00e7alar\u0131n\u0131 kullan\u0131yorlar) ve ortakl\u0131k veya yat\u0131r\u0131m hakk\u0131nda g\u00f6r\u00fc\u015fmek \u00fczere bir toplant\u0131 ayarlamaya \u00e7al\u0131\u015f\u0131yorlar. Ama\u00e7, kurban\u0131 Microsoft Teams veya Zoom\u2019u taklit eden bir web sitesine \u00e7ekmek. Kurban toplant\u0131 linkine t\u0131klad\u0131\u011f\u0131nda kendisini standart bir tuzak bekliyor: Web sitesi, istemciyi g\u00fcncelleme veya baz\u0131 teknik sorunlar\u0131 giderme gereklili\u011fi hakk\u0131nda bir bildirim g\u00f6steriyor. Bunu yapmak i\u00e7in, kurbandan bir dosyay\u0131 indirip \u00e7al\u0131\u015ft\u0131rmas\u0131 isteniyor ve bu da bilgisayara vir\u00fcs bula\u015fmas\u0131na neden oluyor.<\/p>\n<p>\u00c7e\u015fitli bula\u015fma zincirleri hakk\u0131ndaki ayr\u0131nt\u0131lar\u0131 (bu sald\u0131r\u0131 kampanyas\u0131nda en az yedi tane var ve bunlar\u0131n d\u00f6rd\u00fc uzmanlar\u0131m\u0131z taraf\u0131ndan daha \u00f6nce g\u00f6r\u00fclmemi\u015fti) ve ihlal g\u00f6stergelerini <a href=\"https:\/\/securelist.com\/bluenoroff-apt-campaigns-ghostcall-and-ghosthire\/117842\/\" target=\"_blank\" rel=\"noopener\">Securelist web sitesindeki blog yaz\u0131s\u0131nda<\/a> bulabilirsiniz.<\/p>\n<h2>GhostHire sald\u0131r\u0131 kampanyas\u0131<\/h2>\n<p>GhostHire, blok zinciri ile \u00e7al\u0131\u015fan geli\u015ftiricileri hedefleyen sald\u0131r\u0131 kampanyas\u0131. Ama\u00e7 ayn\u0131: Bilgisayarlar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla enfekte etmek. Ancak y\u00f6ntem farkl\u0131. Burada sald\u0131rganlar, kurbanlar\u0131 uygun \u015fartlarda i\u015f teklifleriyle cezbediyorlar. M\u00fczakereler s\u0131ras\u0131nda, geli\u015ftiriciye bir Telegram botunun adresini veriyorlar. Bu bot, kurbana bir test g\u00f6revi i\u00e7eren GitHub ba\u011flant\u0131s\u0131n\u0131 sa\u011fl\u0131yor veya bir ar\u015fivde indirmeyi teklif ediyor. Geli\u015ftiricinin bunu d\u00fc\u015f\u00fcnmek i\u00e7in zaman bulmas\u0131n\u0131 \u00f6nlemek i\u00e7in, g\u00f6revin son teslim tarihi olduk\u00e7a s\u0131k\u0131. Test ger\u00e7ekle\u015ftirilirken, kurban\u0131n bilgisayar\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015f\u0131yor.<\/p>\n<p>GhostHire sald\u0131r\u0131 kampanyas\u0131nda sald\u0131rganlar taraf\u0131ndan kullan\u0131lan ara\u00e7lar ve bunlar\u0131n ihlal g\u00f6stergelerini de <a href=\"https:\/\/securelist.com\/bluenoroff-apt-campaigns-ghostcall-and-ghosthire\/117842\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a> blogundaki yaz\u0131da bulabilirsiniz.<\/p>\n<h2>GhostCall ve GhostHire sald\u0131r\u0131lar\u0131ndan kendinizi nas\u0131l koruyabilirsiniz?<\/h2>\n<p>GhostCall ve GhostHire belirli geli\u015ftiricileri ve \u015firket y\u00f6neticilerini hedef alsa da, sald\u0131rganlar \u00f6ncelikle \u00e7al\u0131\u015fan altyap\u0131yla ilgilenmektedirler. Bu nedenle, bu sald\u0131r\u0131lara kar\u015f\u0131 koruma g\u00f6revi, kurumsal BT g\u00fcvenlik uzmanlar\u0131n\u0131n sorumlulu\u011fundad\u0131r. Bu noktada \u015firketler i\u00e7in iki \u00f6nerimiz var:<\/p>\n<p>\u0130lki, modern sald\u0131rganlar\u0131n kulland\u0131\u011f\u0131 hileler hakk\u0131nda t\u00fcm \u015firket \u00e7al\u0131\u015fanlar\u0131n\u0131n fark\u0131ndal\u0131\u011f\u0131n\u0131 d\u00fczenli olarak art\u0131rmakt\u0131r. \u0130lgili e\u011fitim, geli\u015ftiriciler ve y\u00f6neticiler dahil olmak \u00fczere belirli uzmanlar\u0131n i\u015flerinin niteli\u011fini dikkate almal\u0131d\u0131r. Bu t\u00fcr e\u011fitimler, <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> gibi \u00f6zel bir \u00e7evrimi\u00e7i platform kullan\u0131larak d\u00fczenlenebilir.<\/p>\n<p>\u0130kincisi, \u00e7al\u0131\u015fanlar\u0131n d\u0131\u015f d\u00fcnya ile ileti\u015fim kurmak i\u00e7in kulland\u0131klar\u0131 t\u00fcm kurumsal cihazlarda <a href=\"https:\/\/www.kaspersky.com.tr\/next?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____99cf0f930d9987ff\" target=\"_blank\" rel=\"noopener\">modern g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> kullanmakt\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"next-optimum\">\n","protected":false},"excerpt":{"rendered":"<p>BlueNoroff APT grubu taraf\u0131ndan y\u00fcr\u00fct\u00fclen iki sald\u0131r\u0131 kampanyas\u0131, kripto sekt\u00f6r\u00fcndeki geli\u015ftiricileri ve y\u00f6neticileri hedef al\u0131yor.<\/p>\n","protected":false},"author":2706,"featured_media":13964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[493,728,1454,1660,2819],"class_list":{"0":"post-13963","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-apt","11":"tag-kotu-amacli-yazilim","12":"tag-lazarus","13":"tag-sosyal-muhendislik","14":"tag-thesas2025"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/13963\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/29776\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/24848\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/12966\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/29665\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/28705\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/31593\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/30256\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/40803\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/54681\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/23351\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/32878\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/bluenoroff-ghostcall-ghosthire-lazarus\/29894\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/35611\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/bluenoroff-ghostcall-ghosthire-lazarus\/35235\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13963"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13963\/revisions"}],"predecessor-version":[{"id":13966,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13963\/revisions\/13966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13964"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}