{"id":14033,"date":"2025-12-02T23:21:40","date_gmt":"2025-12-02T20:21:40","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14033"},"modified":"2025-12-02T23:21:40","modified_gmt":"2025-12-02T20:21:40","slug":"pixnapping-cve-2025-48561","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/pixnapping-cve-2025-48561\/14033\/","title":{"rendered":"Pixnapping g\u00fcvenlik a\u00e7\u0131\u011f\u0131: Android telefonunuzun engellenemez ekran g\u00f6r\u00fcnt\u00fcleri"},"content":{"rendered":"<p>Android, doland\u0131r\u0131c\u0131lar\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 kullanarak para, parola ve kullan\u0131c\u0131lar\u0131n \u00f6zel bilgilerini \u00e7almas\u0131n\u0131 \u00f6nlemek i\u00e7in uygulama k\u0131s\u0131tlamalar\u0131n\u0131 s\u00fcrekli olarak s\u0131k\u0131la\u015ft\u0131rmaktad\u0131r. Ancak, <a href=\"https:\/\/www.pixnapping.com\/pixnapping.pdf\" target=\"_blank\" rel=\"noopener nofollow\">dubbed Pixnapping<\/a> olarak adland\u0131r\u0131lan yeni bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131, Android\u2019in t\u00fcm koruma katmanlar\u0131n\u0131 atlatarak sald\u0131rganlar\u0131n ekrandan g\u00f6r\u00fcnt\u00fc piksellerini fark edilmeden okumas\u0131na, yani ekran g\u00f6r\u00fcnt\u00fcs\u00fc almas\u0131na olanak tan\u0131yor. Hi\u00e7bir izni olmayan k\u00f6t\u00fc ama\u00e7l\u0131 bir uygulama; parolalar\u0131, banka hesap bakiyelerini, tek kullan\u0131ml\u0131k \u015fifreleri ve sahibinin ekranda g\u00f6rd\u00fc\u011f\u00fc di\u011fer her \u015feyi g\u00f6rebilir. Neyse ki, Pixnapping \u015fu anda tamamen ara\u015ft\u0131rma ama\u00e7l\u0131 bir proje ve hen\u00fcz tehdit akt\u00f6rleri taraf\u0131ndan aktif olarak kullan\u0131lm\u0131yor. Umut edilen, sald\u0131r\u0131 kodu ger\u00e7ek d\u00fcnyadaki k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara entegre edilmeden \u00f6nce, Google\u2019\u0131n bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 tamamen d\u00fczeltmesidir. \u015eu anda, Pixnapping g\u00fcvenlik a\u00e7\u0131\u011f\u0131 (<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-48561\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2025-48561<\/a>) muhtemelen en g\u00fcncel Android s\u00fcr\u00fcmlerini \u00e7al\u0131\u015ft\u0131ranlar da dahil olmak \u00fczere t\u00fcm modern Android ak\u0131ll\u0131 telefonlar\u0131 etkiliyor.<\/p>\n<h2>Ekran g\u00f6r\u00fcnt\u00fcleri, medya projeksiyonu ve ekran okuma neden tehlikelidir?<\/h2>\n<p>Ke\u015ffetti\u011fimiz <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">SparkCat OCR h\u0131rs\u0131z\u0131<\/a> \u00f6rne\u011finde g\u00f6r\u00fcld\u00fc\u011f\u00fc gibi, tehdit akt\u00f6rleri g\u00f6r\u00fcnt\u00fc i\u015fleme konusunda zaten uzmanla\u015fm\u0131\u015f durumdalar. Ak\u0131ll\u0131 telefondaki bir g\u00f6r\u00fcnt\u00fc de\u011ferli bir bilgi i\u00e7eriyorsa, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bunu alg\u0131layabilir, do\u011frudan telefonda optik karakter tan\u0131ma i\u015flemi ger\u00e7ekle\u015ftirebilir ve ard\u0131ndan \u00e7\u0131kar\u0131lan verileri sald\u0131rgan\u0131n sunucusuna aktarabilir. SparkCat, App Store dahil olmak \u00fczere resmi uygulama ma\u011fazalar\u0131na s\u0131zmay\u0131 ba\u015fard\u0131\u011f\u0131 i\u00e7in \u00f6zellikle dikkat \u00e7ekicidir. K\u00f6t\u00fc niyetli bir Pixnapping \u00f6zellikli uygulaman\u0131n, \u00f6zellikle de sald\u0131r\u0131 i\u00e7in hi\u00e7bir \u00f6zel izin gerekmedi\u011fi d\u00fc\u015f\u00fcn\u00fcl\u00fcrse, bu hileyi taklit etmesi zor olmayacakt\u0131r. Yasal ve kullan\u0131\u015fl\u0131 bir \u00f6zellik sunuyor gibi g\u00f6r\u00fcnen bir uygulama; ayn\u0131 anda ve sessizce tek kullan\u0131ml\u0131k <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/types-of-two-factor-authentication\/11585\/\" target=\"_blank\" rel=\"noopener\">\u00e7ok fakt\u00f6rl\u00fc kimlik do\u011frulama<\/a> kodlar\u0131n\u0131, kripto c\u00fczdan parolalar\u0131n\u0131 ve di\u011fer bilgileri doland\u0131r\u0131c\u0131lara g\u00f6nderebilir.<\/p>\n<p>K\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan kullan\u0131lan bir ba\u015fka pop\u00fcler taktik ise, gerekli verileri g\u00f6sterildi\u011fi gibi ger\u00e7ek zamanl\u0131 olarak g\u00f6r\u00fcnt\u00fclemektir. Bu sosyal m\u00fchendislik yakla\u015f\u0131m\u0131nda, kurban bir mesajla\u015fma uygulamas\u0131 arac\u0131l\u0131\u011f\u0131yla ileti\u015fime ge\u00e7ilir ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/message-boards-video-call-scam\/13028\/\" target=\"_blank\" rel=\"noopener\">\u00e7e\u015fitli bahanelerle ekran payla\u015f\u0131m\u0131n\u0131 etkinle\u015ftirmeye ikna edilir<\/a>.<\/p>\n<h2>Pixnapping sald\u0131r\u0131s\u0131n\u0131n anatomisi<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar, taray\u0131c\u0131lardan ve ARM telefon grafik i\u015flem birimlerinden (GPU) piksel \u00e7almak i\u00e7in daha \u00f6nce bilinen y\u00f6ntemleri birle\u015ftirerek di\u011fer uygulamalardaki i\u00e7eri\u011fin ekran g\u00f6r\u00fcnt\u00fcs\u00fcn\u00fc alabildiler. Sald\u0131r\u0131 uygulamas\u0131, hedef bilgilerin \u00fczerine sessizce yar\u0131 saydam pencereler yerle\u015ftirir ve ard\u0131ndan video sisteminin bu katmanl\u0131 pencerelerin piksellerini nihai bir g\u00f6r\u00fcnt\u00fcde nas\u0131l birle\u015ftirdi\u011fini \u00f6l\u00e7er.<\/p>\n<p>2013 y\u0131l\u0131nda ara\u015ft\u0131rmac\u0131lar, bir web sitesinin kendi penceresinin bir k\u0131sm\u0131nda ba\u015fka bir web sitesini y\u00fcklemesine (<a href=\"https:\/\/media.blackhat.com\/us-13\/US-13-Stone-Pixel-Perfect-Timing-Attacks-with-HTML5-WP.pdf\" target=\"_blank\" rel=\"noopener nofollow\">iframe arac\u0131l\u0131\u011f\u0131yla<\/a>) ve g\u00f6r\u00fcnt\u00fc katmanlama ve d\u00f6n\u00fc\u015ft\u00fcrme gibi yasal i\u015flemler ger\u00e7ekle\u015ftirerek di\u011fer sitede neyin \u00e7izildi\u011fini veya yaz\u0131ld\u0131\u011f\u0131n\u0131 tam olarak tahmin etmesine olanak tan\u0131yan bir sald\u0131r\u0131y\u0131 tan\u0131mlad\u0131lar. Modern taray\u0131c\u0131lar bu \u00f6zel sald\u0131r\u0131y\u0131 hafifletmi\u015f olsa da, bir grup ABD\u2019li ara\u015ft\u0131rmac\u0131 ayn\u0131 temel prensibi Android\u2019e nas\u0131l uygulayabileceklerini buldu.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 uygulama \u00f6nce hedef uygulamaya bir sistem \u00e7a\u011fr\u0131s\u0131 g\u00f6nderir. Android\u2019de bu <a href=\"https:\/\/en.wikipedia.org\/wiki\/Intent_(Android)\" target=\"_blank\" rel=\"noopener nofollow\">Intent<\/a> (niyet) olarak bilinir. Intentler genellikle sadece basit uygulama ba\u015flatmay\u0131 de\u011fil, ayn\u0131 zamanda belirli bir URL i\u00e7in taray\u0131c\u0131y\u0131 veya belirli bir ki\u015finin sohbeti i\u00e7in mesajla\u015fma uygulamas\u0131n\u0131 hemen a\u00e7mak gibi i\u015flemleri de m\u00fcmk\u00fcn k\u0131lar. Sald\u0131r\u0131 yapan uygulama, hedef uygulaman\u0131n hassas bilgileri i\u00e7eren ekran\u0131 g\u00f6r\u00fcnt\u00fclemesini zorlamak i\u00e7in tasarlanm\u0131\u015f bir Intent g\u00f6nderir. \u00d6zel gizli ba\u015flatma bayraklar\u0131 kullanan uygulama daha sonra kendine bir ba\u015flatma niyeti g\u00f6nderir. Bu \u00f6zel eylem kombinasyonu, kurban uygulaman\u0131n ekranda hi\u00e7 g\u00f6r\u00fcnmemesine ra\u011fmen, arka planda sald\u0131rgan taraf\u0131ndan arad\u0131\u011f\u0131 bilgileri yine de kendi penceresinde i\u015fler.<\/p>\n<p>Sald\u0131r\u0131n\u0131n ikinci a\u015famas\u0131nda, k\u00f6t\u00fc ama\u00e7l\u0131 uygulama kurban uygulaman\u0131n gizli penceresinin \u00fczerine bir dizi yar\u0131 saydam pencere yerle\u015ftirir ve bu pencerelerin her biri alt\u0131ndaki i\u00e7eri\u011fi kaplar ve bulan\u0131kla\u015ft\u0131r\u0131r. Bu karma\u015f\u0131k d\u00fczenleme kullan\u0131c\u0131ya g\u00f6r\u00fcnmez kal\u0131r, ancak Android, kullan\u0131c\u0131 bunu \u00f6n plana getirirse bu pencere kombinasyonunun nas\u0131l g\u00f6r\u00fcnmesi gerekti\u011fini \u00f6zenle hesaplar.<\/p>\n<p>Sald\u0131r\u0131 uygulamas\u0131 yaln\u0131zca kendi yar\u0131 saydam pencerelerinden pikselleri do\u011frudan okuyabilir; kurban uygulaman\u0131n ekran i\u00e7eri\u011fini i\u00e7eren nihai birle\u015ftirilmi\u015f g\u00f6r\u00fcnt\u00fcye sald\u0131rgan do\u011frudan eri\u015femez. Bu k\u0131s\u0131tlamay\u0131 a\u015fmak i\u00e7in ara\u015ft\u0131rmac\u0131lar iki ustaca hile kullan\u0131r: (i) \u00c7al\u0131nacak belirli piksel, hedef pikselin tam \u00fczerinde tek bir \u015feffaf noktaya sahiptir, \u00e7o\u011funlukla opak bir pencere ile kurban uygulaman\u0131n \u00fczerine yerle\u015ftirilerek \u00e7evresinden izole edilir; (ii) Ard\u0131ndan, bu kombinasyonun \u00fczerine, yo\u011fun bulan\u0131kl\u0131k \u00f6zelli\u011fi etkinle\u015ftirilmi\u015f bir pencereden olu\u015fan bir b\u00fcy\u00fctme katman\u0131 yerle\u015ftirilir.<\/p>\n<div id=\"attachment_14036\" style=\"width: 647px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/02231418\/pixnapping-cve-2025-48561-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14036\" class=\"size-full wp-image-14036\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/02231418\/pixnapping-cve-2025-48561-01.png\" alt=\"Pixnapping g\u00fcvenlik a\u00e7\u0131\u011f\u0131 nas\u0131l \u00e7al\u0131\u015f\u0131r?\" width=\"637\" height=\"417\"><\/a><p id=\"caption-attachment-14036\" class=\"wp-caption-text\">Pixnapping g\u00fcvenlik a\u00e7\u0131\u011f\u0131 nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/p><\/div>\n<p>Ortaya \u00e7\u0131kan kar\u0131\u015f\u0131kl\u0131\u011f\u0131 \u00e7\u00f6zmek ve en altta bulunan pikselin de\u011ferini belirlemek i\u00e7in ara\u015ft\u0131rmac\u0131lar, ba\u015fka bir bilinen g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan <a href=\"https:\/\/www.hertzbleed.com\/gpu.zip\/\" target=\"_blank\" rel=\"noopener nofollow\">GPU.zip<\/a>\u2018i kulland\u0131lar (bu bir dosya ba\u011flant\u0131s\u0131 gibi g\u00f6r\u00fcnebilir, ancak asl\u0131nda bir ara\u015ft\u0131rma makalesini g\u00f6steren siteye y\u00f6nlendirir). Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, t\u00fcm modern ak\u0131ll\u0131 telefonlar\u0131n i\u015flemciden GPU\u2019ya g\u00f6nderilen t\u00fcm g\u00f6r\u00fcnt\u00fclerin verilerini s\u0131k\u0131\u015ft\u0131rmas\u0131 ger\u00e7e\u011fine dayanmaktad\u0131r. Bu s\u0131k\u0131\u015ft\u0131rma kay\u0131ps\u0131zd\u0131r (ZIP dosyas\u0131 gibi), ancak paketleme ve a\u00e7ma h\u0131z\u0131 iletilen bilgilere ba\u011fl\u0131 olarak de\u011fi\u015fir. GPU.zip, sald\u0131rgan\u0131n bilgileri s\u0131k\u0131\u015ft\u0131rmak i\u00e7in gereken s\u00fcreyi \u00f6l\u00e7mesine olanak tan\u0131r. Bu i\u015flemlerin zamanlamas\u0131n\u0131 belirleyerek, sald\u0131rgan hangi verilerin aktar\u0131ld\u0131\u011f\u0131n\u0131 tahmin edebilir. GPU.zip yard\u0131m\u0131yla, kurban uygulaman\u0131n penceresinden izole edilmi\u015f, bulan\u0131kla\u015ft\u0131r\u0131lm\u0131\u015f ve b\u00fcy\u00fct\u00fclm\u00fc\u015f tek bir piksel, sald\u0131ran uygulama taraf\u0131ndan ba\u015far\u0131yla okunabilir.<\/p>\n<p>Anlaml\u0131 bir \u015feyi \u00e7almak, her noktaya ayr\u0131 ayr\u0131 uygulanmas\u0131 gerekti\u011finden, t\u00fcm piksel \u00e7alma s\u00fcrecini y\u00fczlerce kez tekrarlamak gerektirir. Ancak, bu k\u0131sa bir s\u00fcre i\u00e7inde tamamen m\u00fcmk\u00fcnd\u00fcr. Sald\u0131r\u0131n\u0131n <a href=\"https:\/\/www.pixnapping.com\/demo.mp4\" target=\"_blank\" rel=\"noopener nofollow\">video g\u00f6steriminde<\/a>, Google Authenticator\u2019dan al\u0131nan alt\u0131 basamakl\u0131 kod, hala ge\u00e7erliyken sadece 22 saniye i\u00e7inde ba\u015far\u0131yla \u00e7\u0131kar\u0131ld\u0131.<\/p>\n<h2>Android ekran gizlili\u011fini nas\u0131l korur?<\/h2>\n<p>Google m\u00fchendisleri, \u00e7e\u015fitli gizlilik sald\u0131r\u0131lar\u0131yla m\u00fccadele konusunda yakla\u015f\u0131k yirmi y\u0131ll\u0131k deneyime sahiptir. Bu deneyim, ekran g\u00f6r\u00fcnt\u00fclerinin ve videolar\u0131n yasad\u0131\u015f\u0131 olarak yakalanmas\u0131na kar\u015f\u0131 \u00e7ok katmanl\u0131 bir savunma sistemi olu\u015fturulmas\u0131na yol a\u00e7m\u0131\u015ft\u0131r. Bu \u00f6nlemlerin tam listesi birka\u00e7 sayfay\u0131 kaplayaca\u011f\u0131ndan, sadece baz\u0131 \u00f6nemli korumalar\u0131 listeliyoruz:<\/p>\n<ul>\n<li>FLAG_SECURE pencere bayra\u011f\u0131, i\u015fletim sisteminin, i\u00e7eri\u011fin ekran g\u00f6r\u00fcnt\u00fclerini almas\u0131n\u0131 engeller.<\/li>\n<li>Medya yans\u0131tma ara\u00e7lar\u0131na eri\u015fim (ekran i\u00e7eri\u011fini medya ak\u0131\u015f\u0131 olarak yakalama), kullan\u0131c\u0131n\u0131n a\u00e7\u0131k onay\u0131n\u0131 gerektirir ve yaln\u0131zca g\u00f6r\u00fcn\u00fcr ve etkin bir uygulama taraf\u0131ndan ger\u00e7ekle\u015ftirilebilir.<\/li>\n<li>AccessibilityService gibi y\u00f6netim hizmetlerine eri\u015fim ve di\u011fer uygulamalar\u0131n \u00fczerinde uygulama \u00f6\u011felerini g\u00f6r\u00fcnt\u00fcleme yetene\u011fi \u00fczerinde <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/android-restricted-settings\/11939\/\" target=\"_blank\" rel=\"noopener\">s\u0131k\u0131 k\u0131s\u0131tlamalar getirilmi\u015ftir<\/a>.<\/li>\n<li>Medya projeksiyonu alg\u0131land\u0131\u011f\u0131nda, tek kullan\u0131ml\u0131k parolalar ve di\u011fer gizli veriler otomatik olarak gizlenir.<\/li>\n<li>Android, uygulamalar\u0131n di\u011fer uygulamalar\u0131n verilerine eri\u015fmesini k\u0131s\u0131tlar. Ayr\u0131ca, uygulamalar ak\u0131ll\u0131 telefonda y\u00fckl\u00fc olan t\u00fcm uygulamalar\u0131n tam listesini talep edemez.<\/li>\n<\/ul>\n<p>Ne yaz\u0131k ki, Pixnapping t\u00fcm bu mevcut k\u0131s\u0131tlamalar\u0131 atlat\u0131r ve hi\u00e7bir \u00f6zel izin gerektirmez. Sald\u0131r\u0131 uygulamas\u0131n\u0131n yaln\u0131zca iki temel \u00f6zelli\u011fe ihtiyac\u0131 vard\u0131r: kendi pencerelerini g\u00f6r\u00fcnt\u00fclemek ve di\u011fer uygulamalara sistem \u00e7a\u011fr\u0131lar\u0131 (Niyetler) g\u00f6ndermek. Bunlar Android i\u015flevselli\u011finin temel yap\u0131 ta\u015flar\u0131d\u0131r, bu nedenle k\u0131s\u0131tlanmas\u0131 \u00e7ok zordur.<\/p>\n<h2>Pixnapping\u2019den hangi cihazlar etkilenir ve nas\u0131l korunulur?<\/h2>\n<p>Sald\u0131r\u0131n\u0131n uygulanabilirli\u011fi, 6-9. nesil Google Pixel cihazlar\u0131nda Android 13-16 s\u00fcr\u00fcmlerinde ve Samsung Galaxy S25\u2019te do\u011fruland\u0131. Ara\u015ft\u0131rmac\u0131lar, kullan\u0131lan t\u00fcm mekanizmalar standart oldu\u011fu i\u00e7in sald\u0131r\u0131n\u0131n di\u011fer Android cihazlarda da i\u015flevsel olaca\u011f\u0131na inan\u0131yor. Ancak, sald\u0131r\u0131n\u0131n ikinci a\u015famas\u0131n\u0131n (piksel b\u00fcy\u00fctme tekni\u011fi) uygulanmas\u0131yla ilgili baz\u0131 n\u00fcanslar olabilir.<\/p>\n<p>Google, \u015eubat ay\u0131nda sald\u0131r\u0131 hakk\u0131nda bilgilendirildikten sonra Eyl\u00fcl ay\u0131nda bir <a href=\"https:\/\/android.googlesource.com\/platform\/frameworks\/native\/+\/20465375a1d0cb71cdb891235a9f8a3fba31dbf6\" target=\"_blank\" rel=\"noopener nofollow\">yama<\/a> yay\u0131nlad\u0131. Ne yaz\u0131k ki, g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 gidermek i\u00e7in se\u00e7ilen bu y\u00f6ntemin yeterince g\u00fcvenilir olmad\u0131\u011f\u0131 ortaya \u00e7\u0131kt\u0131 ve ara\u015ft\u0131rmac\u0131lar k\u0131sa s\u00fcrede yamay\u0131 atlatman\u0131n bir yolunu buldular. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 ortadan kald\u0131rmak i\u00e7in yeni bir giri\u015fim, Google\u2019\u0131n Aral\u0131k ay\u0131 g\u00fcncellemesinde <a href=\"https:\/\/www.theregister.com\/2025\/10\/13\/android_pixnapping_attack_captures_2fa_codes\/\" target=\"_blank\" rel=\"noopener nofollow\">planlan\u0131yor<\/a>. GPU.zip ile ilgili olarak, bu \u00f6zel veri s\u0131z\u0131nt\u0131 kanal\u0131 i\u00e7in bir yama yay\u0131nlama plan\u0131 bulunmuyor. En az\u0131ndan, bu kusur 2024 y\u0131l\u0131nda kamuoyuna duyuruldu\u011fundan beri hi\u00e7bir ak\u0131ll\u0131 telefon GPU \u00fcreticisi bu y\u00f6nde bir plan a\u00e7\u0131klamad\u0131.<\/p>\n<p>Pixnapping\u2019e kar\u015f\u0131 savunma se\u00e7enekleri s\u0131n\u0131rl\u0131d\u0131r. A\u015fa\u011f\u0131daki \u00f6nlemleri alman\u0131z\u0131 \u00f6neririz:<\/p>\n<ul>\n<li>Android cihazlar\u0131n\u0131z\u0131 t\u00fcm g\u00fcncel g\u00fcvenlik yamalar\u0131na sahip olan en son s\u00fcr\u00fcme hemen g\u00fcncelleyin.<\/li>\n<li>Resmi olmayan kaynaklardan uygulama y\u00fcklemekten ka\u00e7\u0131n\u0131n; resmi ma\u011fazalardan indirilen uygulamalar \u00e7ok yeni, indirme say\u0131s\u0131 d\u00fc\u015f\u00fck veya puanlar\u0131 d\u00fc\u015f\u00fckse dikkatli olun.<\/li>\n<li>Telefonunuzda <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>\u00a0gibi tam donan\u0131ml\u0131 bir g\u00fcvenlik sistemi kullan\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<\/ul>\n<blockquote><p>Ba\u015fka standart d\u0131\u015f\u0131 Android sald\u0131r\u0131 y\u00f6ntemlerine dair bilgi almak i\u00e7in a\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131za g\u00f6z atabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/disguised-spy-for-android\/54051\/\" target=\"_blank\" rel=\"noopener nofollow\">Antivir\u00fcs gibi davranan casus yaz\u0131l\u0131m<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/trojan-in-fake-smartphones\/13304\/\" target=\"_blank\" rel=\"noopener\">Sahte Android ak\u0131ll\u0131 telefonlara yerle\u015ftirilmi\u015f Truva at\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/data-theft-during-charging-choicejacking-protection\/13420\/\" target=\"_blank\" rel=\"noopener\">Ak\u0131ll\u0131 telefon \u015farj\u0131 s\u0131ras\u0131nda veri h\u0131rs\u0131zl\u0131\u011f\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-stealer-sparkkitty\/13490\/\" target=\"_blank\" rel=\"noopener\">Kedi foto\u011fraflar\u0131n\u0131z tehlikede: Yeni SparkKitty Truva at\u0131n\u0131n olu\u015fturdu\u011fu tehdit<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/necro-infects-android-users\/12842\/\" target=\"_blank\" rel=\"noopener\">Necro Truva At\u0131 11 milyon Android kullan\u0131c\u0131s\u0131na nas\u0131l sald\u0131rd\u0131?<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n","protected":false},"excerpt":{"rendered":"<p>Pixnapping, ara\u015ft\u0131rmac\u0131lar taraf\u0131ndan ke\u015ffedilen bir Android g\u00fcvenlik a\u00e7\u0131\u011f\u0131d\u0131r. Bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131, uygulamalar\u0131n i\u015fletim sisteminden herhangi bir \u00f6zel izin almadan ekrandan parolalar\u0131, tek kullan\u0131ml\u0131k \u015fifreleri ve di\u011fer gizli bilgileri \u00e7almas\u0131na olanak tan\u0131r. Nas\u0131l \u00e7al\u0131\u015f\u0131r ve kendinizi korumak i\u00e7in ne yapabilirsiniz?<\/p>\n","protected":false},"author":2722,"featured_media":14034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1624,105,2786,2556,500,790,519,1525,537],"class_list":{"0":"post-14033","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-2fa","9":"tag-android","10":"tag-bilgi-hirsizlari","11":"tag-casus-yazilimlar","12":"tag-gizlilik","13":"tag-guvenlik-aciklari","14":"tag-ipuclari-2","15":"tag-parolalar","16":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/pixnapping-cve-2025-48561\/14033\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/pixnapping-cve-2025-48561\/29818\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/24888\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/13006\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/pixnapping-cve-2025-48561\/29705\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/28780\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/pixnapping-cve-2025-48561\/31646\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/pixnapping-cve-2025-48561\/30309\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/pixnapping-cve-2025-48561\/40865\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/pixnapping-cve-2025-48561\/54756\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/pixnapping-cve-2025-48561\/23402\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/pixnapping-cve-2025-48561\/32932\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/pixnapping-cve-2025-48561\/29942\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/pixnapping-cve-2025-48561\/35652\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/pixnapping-cve-2025-48561\/35280\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/android\/","name":"android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14033"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14033\/revisions"}],"predecessor-version":[{"id":14037,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14033\/revisions\/14037"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14034"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}