{"id":14138,"date":"2025-12-29T22:28:12","date_gmt":"2025-12-29T19:28:12","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14138"},"modified":"2025-12-29T22:28:12","modified_gmt":"2025-12-29T19:28:12","slug":"what-happens-to-data-after-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/what-happens-to-data-after-phishing\/14138\/","title":{"rendered":"Kimlik av\u0131 kullan\u0131larak \u00e7al\u0131nan verilere ne olur?"},"content":{"rendered":"<p>D\u00fc\u015f\u00fcn\u00fcn: Bir kullan\u0131c\u0131 bir doland\u0131r\u0131c\u0131l\u0131k sitesine gider, al\u0131\u015fveri\u015f yapmaya karar verir ve banka kart\u0131 ayr\u0131nt\u0131lar\u0131n\u0131, ad\u0131n\u0131 ve adresini girer. Bilin bakal\u0131m sonra ne olur? Sald\u0131rganlar\u0131n sadece paray\u0131 al\u0131p ortadan kayboldu\u011funu d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z yan\u0131l\u0131yorsunuz. Ne yaz\u0131k ki durum san\u0131ld\u0131\u011f\u0131ndan \u00e7ok daha karma\u015f\u0131k zira bilgiler; kurbanlar\u0131n verilerinin y\u0131llarca dola\u015ft\u0131\u011f\u0131, el de\u011fi\u015ftirdi\u011fi ve yeni sald\u0131r\u0131larda yeniden kullan\u0131ld\u0131\u011f\u0131 devasa bir g\u00f6lge piyasa hatt\u0131na girer.<\/p>\n<p>Kaspersky olarak; bir kimlik av\u0131 sald\u0131r\u0131s\u0131ndan sonra verilerin kimlerin eline ge\u00e7ti\u011finin, nas\u0131l tasnif edildi\u011finin, yeniden sat\u0131ld\u0131\u011f\u0131n\u0131n ve g\u00f6lge piyasada nas\u0131l kullan\u0131ld\u0131\u011f\u0131n\u0131n izini s\u00fcrd\u00fck. Bu makalede, \u00e7al\u0131nan verilerin rotas\u0131n\u0131 \u00e7iziyor ve kimlik av\u0131 ile kar\u015f\u0131la\u015ft\u0131ysan\u0131z ya da gelecekte bundan ka\u00e7\u0131nmak istiyorsan\u0131z kendinizi nas\u0131l koruyaca\u011f\u0131n\u0131z\u0131 a\u00e7\u0131kl\u0131yoruz. Teknik bilgilerle tamamlanan ayr\u0131nt\u0131l\u0131 raporu Securelist\u2019te okuyabilirsiniz.<\/p>\n<h2>Hasat verileri<\/h2>\n<p>Kimlik av\u0131 siteleri, yasal g\u00f6r\u00fcnmek i\u00e7in \u00f6zenle gizlenmi\u015ftir. Bazen g\u00f6rsel tasar\u0131m, kullan\u0131c\u0131 arabirimi ve hatta alan ad\u0131, ger\u00e7ek siteden neredeyse ay\u0131rt edilemez. Verileri \u00e7almak i\u00e7in sald\u0131rganlar genellikle kullan\u0131c\u0131lardan giri\u015f bilgilerini, \u00f6deme kart\u0131 ayr\u0131nt\u0131lar\u0131n\u0131 veya di\u011fer hassas bilgileri girmelerini isteyen HTML formlar\u0131 kullan\u0131r.<\/p>\n<p>Kullan\u0131c\u0131 <em>Oturum A\u00e7<\/em> veya <em>\u00d6de<\/em> d\u00fc\u011fmesine bast\u0131\u011f\u0131 anda, bilgiler an\u0131nda siber su\u00e7lulara g\u00f6nderilir. Baz\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 sald\u0131r\u0131 kampanyalar\u0131, verileri do\u011frudan bir kimlik av\u0131 sitesi arac\u0131l\u0131\u011f\u0131yla toplamak yerine, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/google-forms-scam\/13628\/\" target=\"_blank\" rel=\"noopener\">Google Formlar<\/a> gibi yasal hizmetleri k\u00f6t\u00fcye kullanarak nihai hedef sunucuyu gizler.<\/p>\n<div id=\"attachment_14141\" style=\"width: 1013px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/29214745\/what-happens-to-data-after-phishing-1-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14141\" class=\"wp-image-14141 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/29214745\/what-happens-to-data-after-phishing-1-1.png\" alt=\"Sahte bir DHL web sitesi. Kullan\u0131c\u0131dan ger\u00e7ek DHL hesab\u0131n\u0131n kullan\u0131c\u0131 ad\u0131 ve parolas\u0131n\u0131 girmesi istenir.\" width=\"1003\" height=\"570\"><\/a><p id=\"caption-attachment-14141\" class=\"wp-caption-text\">Sahte bir DHL web sitesi. Kullan\u0131c\u0131dan ger\u00e7ek DHL hesab\u0131n\u0131n kullan\u0131c\u0131 ad\u0131 ve parolas\u0131n\u0131 girmesi istenir.<\/p><\/div>\n<p>\u00c7al\u0131nan veriler genellikle \u00fc\u00e7 yoldan biriyle veya bunlar\u0131n bir kombinasyonuyla iletilir:<\/p>\n<ul>\n<li><strong>E-posta:<\/strong> Bu y\u00f6ntem, olas\u0131 gecikmeler veya yasaklar nedeniyle g\u00fcn\u00fcm\u00fczde daha az yayg\u0131n olarak kullan\u0131lmaktad\u0131r.<\/li>\n<li><strong>Telegram botlar\u0131:<\/strong> Sald\u0131rganlar bilgileri an\u0131nda al\u0131rlar. Bu botlar\u0131n \u00e7o\u011fu tek kullan\u0131ml\u0131kt\u0131r, bu da onlar\u0131 takip etmeyi zorla\u015ft\u0131r\u0131r.<\/li>\n<li><strong>Y\u00f6netici panelleri:<\/strong> Siber su\u00e7lular; verileri toplamak ve s\u0131ralamak, istatistikleri g\u00f6r\u00fcnt\u00fclemek ve hatta \u00e7al\u0131nan bilgileri otomatik olarak do\u011frulamak i\u00e7in \u00f6zel yaz\u0131l\u0131mlar kullanabilirler.<\/li>\n<\/ul>\n<h2>Kimlik avc\u0131lar\u0131 ne t\u00fcr verilerin pe\u015findedir?<\/h2>\n<p>Siber su\u00e7lular\u0131n arad\u0131\u011f\u0131 verilerin kapsam\u0131 olduk\u00e7a geni\u015ftir.<\/p>\n<ul>\n<li><strong>Ki\u015fisel veriler<\/strong>: Telefon numaralar\u0131, tam adlar, e-posta adresleri, kay\u0131t ve ikamet adresleri gibi bilgiler, hedefli sald\u0131r\u0131lar d\u00fczenlemek i\u00e7in kullan\u0131labilir. \u0130nsanlar genellikle sald\u0131rganlar\u0131n \u00e7ok say\u0131da ki\u015fisel bilgiye sahip olmas\u0131 nedeniyle doland\u0131r\u0131c\u0131l\u0131klara kanarlar; sald\u0131rganlar onlara isimleriyle hitap ederler, nerede ya\u015fad\u0131klar\u0131n\u0131 ve hangi hizmetleri kulland\u0131klar\u0131n\u0131 bilirler.<\/li>\n<li><strong>Belgeler<\/strong>: Sosyal g\u00fcvenlik kartlar\u0131, ehliyetler, sigorta, vergi kimlik numaralar\u0131 vb. veriler ve taramalar\u0131, su\u00e7lular taraf\u0131ndan kimlik h\u0131rs\u0131zl\u0131\u011f\u0131, kredi ba\u015fvurusu ve bankalara veya e-devlet portallar\u0131na giri\u015f yaparken kimlik do\u011frulama amac\u0131yla kullan\u0131r.<\/li>\n<li><strong>Kimlik bilgileri<\/strong>: Kullan\u0131c\u0131 adlar\u0131, parolalar ve tek kullan\u0131ml\u0131k 2FA kodlar\u0131.<\/li>\n<li><strong>Biyometrik<\/strong>: Deepfake \u00fcretmek veya iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 atlatmak i\u00e7in kullan\u0131lan y\u00fcz taramalar\u0131, parmak izleri ve ses \u00f6rnekleri.<\/li>\n<li><strong>\u00d6deme bilgileri:<\/strong> Banka kart\u0131 ve kripto para c\u00fczdan\u0131 bilgileri.<\/li>\n<li>Ve \u00e7ok daha fazlas\u0131.<\/li>\n<\/ul>\n<p>Ara\u015ft\u0131rmam\u0131za g\u00f6re, Ocak-Eyl\u00fcl 2025 aras\u0131nda ger\u00e7ekle\u015ftirilen kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011fu (%88,5) \u00e7evrimi\u00e7i hesap kimlik bilgilerini hedef al\u0131rken, %9,5\u2019i kullan\u0131c\u0131lar\u0131n isim, adres ve tarih gibi ki\u015fisel verilerini ele ge\u00e7irme giri\u015fimleriydi. Son olarak, kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131n %2\u2019si banka kart\u0131 bilgilerini \u00e7almaya odaklanm\u0131\u015ft\u0131.<\/p>\n<div id=\"attachment_14143\" style=\"width: 1852px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/29214834\/what-happens-to-data-after-phishing-2-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14143\" class=\"wp-image-14143 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/29214834\/what-happens-to-data-after-phishing-2-EN.png\" alt=\"Hedef al\u0131nan veri t\u00fcr\u00fcne g\u00f6re sald\u0131r\u0131lar\u0131n da\u011f\u0131l\u0131m\u0131, Ocak\u2013Eyl\u00fcl 2025\" width=\"1842\" height=\"1150\"><\/a><p id=\"caption-attachment-14143\" class=\"wp-caption-text\">Hedef al\u0131nan veri t\u00fcr\u00fcne g\u00f6re sald\u0131r\u0131lar\u0131n da\u011f\u0131l\u0131m\u0131, Ocak\u2013Eyl\u00fcl 2025<\/p><\/div>\n<h2>\u00c7al\u0131nan verilere \u015fimdi ne olacak?<\/h2>\n<p>\u00c7al\u0131nan verilerin t\u00fcm\u00fc sald\u0131rganlar taraf\u0131ndan do\u011frudan kendi hesaplar\u0131na para aktarmak i\u00e7in kullan\u0131lmaz. Asl\u0131nda, veriler nadiren an\u0131nda kullan\u0131l\u0131r; daha \u00e7ok, g\u00f6lge piyasada analistlere ve veri simsarlar\u0131na ula\u015f\u0131rlar. Tipik bir yolculuk a\u015fa\u011f\u0131 yukar\u0131 \u015funa benzer:<\/p>\n<h4>1.\u00a0\u00a0\u00a0\u00a0 Verilerin toplu sat\u0131\u015f\u0131<\/h4>\n<p>Ham veri setleri b\u00fcy\u00fck ar\u015fivler halinde toplan\u0131r ve karanl\u0131k web forumlar\u0131nda toplu olarak sunulur. Bu d\u00f6k\u00fcmler genellikle gereksiz veya g\u00fcncel olmayan bilgiler i\u00e7erir, bu y\u00fczden nispeten ucuzdurlar; fiyatlar\u0131 yakla\u015f\u0131k 50 $\u2019dan ba\u015flar.<\/p>\n<h4>2.\u00a0\u00a0\u00a0\u00a0 Veri tasnifi ve do\u011frulamas\u0131<\/h4>\n<p>Bu ar\u015fivler, analist olarak hareket eden hackerlar taraf\u0131ndan sat\u0131n al\u0131n\u0131r. Veri k\u00fcmelerini kategorilere ay\u0131r\u0131rlar ve belirlenen hizmetler i\u00e7in giri\u015f bilgilerinin \u00e7al\u0131\u015f\u0131p \u00e7al\u0131\u015fmad\u0131\u011f\u0131n\u0131, ba\u015fka sitelerde de kullan\u0131l\u0131p kullan\u0131lmad\u0131\u011f\u0131n\u0131 ve ge\u00e7mi\u015fteki g\u00fcvenlik ihlallerinden elde edilen verilerle e\u015fle\u015fip e\u015fle\u015fmedi\u011fini kontrol ederek verilerin ge\u00e7erlili\u011fini do\u011frularlar. Hedefli sald\u0131r\u0131lar i\u00e7in siber su\u00e7lular dijital bir dosya haz\u0131rlarlar. Hem son zamanlarda hem de daha eski sald\u0131r\u0131lardan toplanan bilgileri depolar, yani hacklemelerde kullan\u0131lmaya haz\u0131r bir veri tablosu olu\u015fturur.<\/p>\n<h4>3.\u00a0\u00a0\u00a0\u00a0 Do\u011frulanm\u0131\u015f verilerin yeniden sat\u0131\u015f\u0131<\/h4>\n<p>S\u0131ralanan veri setleri, art\u0131k daha y\u00fcksek bir fiyata tekrar sat\u0131\u015fa sunulmaktad\u0131r, hem de sadece dark web\u2019de de\u011fil, daha tan\u0131d\u0131k olan Telegram\u2019da da.<\/p>\n<div id=\"attachment_14146\" style=\"width: 702px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/29215716\/what-happens-to-data-after-phishing-3-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14146\" class=\"wp-image-14146 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2025\/12\/29215716\/what-happens-to-data-after-phishing-3-1.png\" alt=\"Sosyal medya hesap bilgilerinin Telegram \u00fczerinden sat\u0131\u015f\u0131 i\u00e7in bir reklam.\" width=\"692\" height=\"254\"><\/a><p id=\"caption-attachment-14146\" class=\"wp-caption-text\">Sosyal medya hesap bilgilerinin Telegram \u00fczerinden sat\u0131\u015f\u0131 i\u00e7in bir reklam.<\/p><\/div>\n<p>Kaspersky Digital Footprint Intelligence\u2019a g\u00f6re hesap fiyatlar\u0131; hesap ya\u015f\u0131, 2FA kimlik do\u011frulama, ba\u011fl\u0131 banka kartlar\u0131 ve hizmet kullan\u0131c\u0131 taban\u0131 gibi \u00e7ok say\u0131da fakt\u00f6rden etkilenmektedir. Bu pazarda en pahal\u0131 ve en \u00e7ok talep g\u00f6ren \u00fcr\u00fcn\u00fcn banka hesaplar\u0131na ve kripto c\u00fczdanlar\u0131na eri\u015fim olmas\u0131 \u015fa\u015f\u0131rt\u0131c\u0131 de\u011fildir.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"197\"><strong>Kategori<\/strong><\/td>\n<td width=\"189\"><strong>Fiyat, ABD Dolar\u0131<\/strong><\/td>\n<td width=\"190\"><strong>Ortalama fiyat, ABD dolar\u0131<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Kripto platformlar\u0131<\/td>\n<td width=\"189\">60\u2013400<\/td>\n<td width=\"190\">105<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Bankalar<\/td>\n<td width=\"189\">70\u20132000<\/td>\n<td width=\"190\">350<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">E-devlet portallar\u0131<\/td>\n<td width=\"189\">15\u20132000<\/td>\n<td width=\"190\">82,5<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Sosyal medya<\/td>\n<td width=\"189\">0,4\u2013279<\/td>\n<td width=\"190\">3<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Mesajla\u015fma uygulamalar\u0131<\/td>\n<td width=\"189\">0,065\u2013150<\/td>\n<td width=\"190\">2,5<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">\u00c7evrimi\u00e7i ma\u011fazalar<\/td>\n<td width=\"189\">10\u201350<\/td>\n<td width=\"190\">20<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Oyunlar ve oyun platformlar\u0131<\/td>\n<td width=\"189\">1\u201350<\/td>\n<td width=\"190\">6<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Global internet portallar\u0131<\/td>\n<td width=\"189\">0,2\u20132<\/td>\n<td width=\"190\">0,9<\/td>\n<\/tr>\n<tr>\n<td width=\"197\">Ki\u015fisel belgeler<\/td>\n<td width=\"189\">0,5\u2013125<\/td>\n<td width=\"190\">15<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"wp-caption aligncenter\">\n<p class=\"wp-caption-text\">2025 y\u0131l\u0131n\u0131n Ocak-Eyl\u00fcl d\u00f6neminde ortalama hesap fiyatlar\u0131<\/p>\n<\/div>\n<h4>4.\u00a0\u00a0\u00a0\u00a0 Tekrarlanan sald\u0131r\u0131lar<\/h4>\n<p>Bir siber su\u00e7lu, kurban\u0131n dijital dosyas\u0131n\u0131 sat\u0131n ald\u0131ktan sonra bir sonraki sald\u0131r\u0131s\u0131n\u0131 planlayabilir. A\u00e7\u0131k kaynakl\u0131 istihbarat\u0131 kullanarak ki\u015finin \u00e7al\u0131\u015ft\u0131\u011f\u0131 yeri bulabilir ve ard\u0131ndan patronunu taklit eden ikna edici bir e-posta haz\u0131rlayabilir. Alternatif olarak, bir sosyal medya profilini hackleyip, uygunsuz foto\u011fraflar\u0131 ele ge\u00e7irebilir ve bunlar\u0131n iadesi i\u00e7in fidye talep edebilir. Ancak, neredeyse t\u00fcm tehditkar veya gasp ama\u00e7l\u0131 e-postalar\u0131n <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/blackmail-and-scam-in-different-countries\/13992\/\" target=\"_blank\" rel=\"noopener\">doland\u0131r\u0131c\u0131lar\u0131n korkutma takti\u011fi<\/a> oldu\u011funu unutmay\u0131n.<\/p>\n<p>Siber su\u00e7lular, ele ge\u00e7irdikleri hesaplar\u0131 kullanarak kurban\u0131n ki\u015filer listesine daha fazla kimlik av\u0131 e-postas\u0131 ve k\u00f6t\u00fc ama\u00e7l\u0131 ba\u011flant\u0131lar g\u00f6nderirler. Dolay\u0131s\u0131yla, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/whatsapp-phishing-vote\/13866\/\" target=\"_blank\" rel=\"noopener\">bir yar\u0131\u015fmada ye\u011fenine oy vermenizi<\/a>, bor\u00e7 para vermenizi veya \u015f\u00fcpheli bir ba\u011flant\u0131ya t\u0131klaman\u0131z\u0131 isteyen bir mesaj al\u0131rsan\u0131z, temkinli davranman\u0131z i\u00e7in her t\u00fcrl\u00fc neden vard\u0131r.<\/p>\n<h2>Verileriniz \u00e7al\u0131nd\u0131\u011f\u0131nda ne yapmal\u0131s\u0131n\u0131z?<\/h2>\n<ol>\n<li>\u00d6ncelikle, kimlik av\u0131 sitesine girdi\u011finiz bilgileri geri al\u0131n. \u00d6deme kart\u0131 ayr\u0131nt\u0131lar\u0131n\u0131 verdiyseniz, derhal bankan\u0131z\u0131 aray\u0131n ve kartlar\u0131n\u0131z\u0131 bloke ettirin. Ba\u015fka hesaplar i\u00e7in kulland\u0131\u011f\u0131n\u0131z bir kullan\u0131c\u0131 ad\u0131 ve parola girdiyseniz, bu parolalar\u0131 da hemen de\u011fi\u015ftirin. Bir <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">parola y\u00f6neticisi<\/a>, g\u00fc\u00e7l\u00fc ve benzersiz parolalar olu\u015fturman\u0131za ve saklaman\u0131za yard\u0131mc\u0131 olabilir.<\/li>\n<li>M\u00fcmk\u00fcn oldu\u011funca iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 (2FA) etkinle\u015ftirin. \u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulaman\u0131n ne oldu\u011fu ve nas\u0131l kullan\u0131ld\u0131\u011f\u0131 hakk\u0131nda daha fazla ayr\u0131nt\u0131 i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/what-is-two-factor-authentication\/11564\/\" target=\"_blank\" rel=\"noopener\">k\u0131lavuzumuzu<\/a> \u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama y\u00f6ntemi se\u00e7erken, SMS kullanmaktan ka\u00e7\u0131nmak en iyisidir, <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">\u00e7\u00fcnk\u00fc metin mesaj\u0131yla g\u00f6nderilen tek kullan\u0131ml\u0131k kodlar ele ge\u00e7irilebilir<\/a>. \u0130deal olarak, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-password-manager-authenticator\/11689\/\" target=\"_blank\" rel=\"noopener\">tek kullan\u0131ml\u0131k kodlar olu\u015fturmak<\/a> i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0gibi bir kimlik do\u011frulama uygulamas\u0131 kullan\u0131n<\/li>\n<li>\u00d6nemli hesaplar\u0131n\u0131zda etkin oturumlar\u0131 (oturum a\u00e7m\u0131\u015f cihazlar\u0131n listesi) kontrol edin. Tan\u0131d\u0131k gelmeyen bir cihaz veya IP adresi g\u00f6r\u00fcrseniz, o oturumu hemen sonland\u0131r\u0131n. Ard\u0131ndan parolay\u0131 de\u011fi\u015ftirin ve iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 ayarlay\u0131n.<\/li>\n<\/ol>\n<h2>Kimlik av\u0131na kar\u015f\u0131 kendimizi nas\u0131l koruruz?<\/h2>\n<ul>\n<li>E-postalarda veya mesajlarda bulunan ba\u011flant\u0131lar\u0131, <a href=\"https:\/\/www.kaspersky.com.tr\/home-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener\">bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcyle<\/a> taratmadan a\u00e7may\u0131n.<\/li>\n<li>\u015e\u00fcpheli bir e-posta al\u0131rsan\u0131z, her zaman g\u00f6nderenin adresini kontrol ederek o ki\u015fiyle daha \u00f6nce herhangi bir ileti\u015fiminiz olup olmad\u0131\u011f\u0131n\u0131 kontrol edin. Birisi bir devlet kurumu veya \u015firketi temsil etti\u011fini iddia ederse, e-postan\u0131n g\u00f6nderildi\u011fi alan ad\u0131n\u0131 kurulu\u015fun resmi web sitesinin alan ad\u0131yla kar\u015f\u0131la\u015ft\u0131r\u0131n. Resmi yaz\u0131\u015fmalar asla \u00fccretsiz e-posta hizmetlerinden g\u00f6nderilmemelidir.<\/li>\n<li>\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/best-authenticator-apps-2022\/10422\/\" target=\"_blank\" rel=\"noopener\">bir kimlik do\u011frulama uygulamas\u0131<\/a> kullan\u0131n.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/international-password-day-2025\/13337\/\" target=\"_blank\" rel=\"noopener\">Ele ge\u00e7irilmeye kar\u015f\u0131 dayan\u0131kl\u0131 parolalar<\/a> olu\u015fturun. Ara\u015ft\u0131rmalar\u0131m\u0131z, bilgisayar korsanlar\u0131n\u0131n d\u00fcnyadaki t\u00fcm parolalar\u0131n neredeyse <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/password-can-be-hacked-in-one-hour\/12474\/\" target=\"_blank\" rel=\"noopener\">%60\u2019\u0131n\u0131 bir saatten daha k\u0131sa s\u00fcrede k\u0131rabildi\u011fini<\/a> g\u00f6steriyor. Alternatif olarak, \u00e7ok daha g\u00fc\u00e7l\u00fc hesap korumas\u0131 sa\u011flayan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/full-guide-to-passkeys-in-2025-part-1\/13507\/\" target=\"_blank\" rel=\"noopener\">ge\u00e7i\u015f anahtarlar\u0131na ge\u00e7meyi<\/a> d\u00fc\u015f\u00fcnebilirsiniz, ancak bunlar i\u00e7in de <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/full-guide-to-passkeys-in-2025-part-2\/13522\/\" target=\"_blank\" rel=\"noopener\">baz\u0131 uyar\u0131lar oldu\u011funu<\/a> unutmay\u0131n.<\/li>\n<li>Unutmay\u0131n: Birden fazla hizmet i\u00e7in ayn\u0131 parolay\u0131 kullanmak \u00e7ok <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/never-reuse-passwords-story\/5502\/\" target=\"_blank\" rel=\"noopener\">b\u00fcy\u00fck bir hatad\u0131r<\/a>. K\u00f6t\u00fc niyetli ki\u015filer bundan yararlan\u0131r. Hi\u00e7bir kimlik av\u0131 doland\u0131r\u0131c\u0131l\u0131\u011f\u0131na kanmam\u0131\u015f olsan\u0131z bile, siber sald\u0131rganlar sadece bireyleri de\u011fil, t\u00fcm \u015firketleri hedef ald\u0131klar\u0131 i\u00e7in parolalar\u0131n\u0131z ve verileriniz yine de <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/top-five-data-breaches-in-history\/12767\/\" target=\"_blank\" rel=\"noopener\">veri ihlallerine maruz kalabilir<\/a>. Bu y\u0131l, Kimlik H\u0131rs\u0131zl\u0131\u011f\u0131 Kaynak Merkezi \u015fimdiden iki binden fazla veri ihlali kaydetmi\u015ftir. Riskleri en aza indirmek i\u00e7in, her hesap i\u00e7in benzersiz ve g\u00fc\u00e7l\u00fc bir parola olu\u015fturun. Hepsini ezberlemenize gerek yoktur ve zaten ezberlemeniz de m\u00fcmk\u00fcn de\u011fildir. Karma\u015f\u0131k parolalar olu\u015fturan ve bunlar\u0131 g\u00fcvenli bir \u015fekilde saklayan, t\u00fcm cihazlar\u0131n\u0131zda senkronize eden, web sitelerinde ve uygulamalarda otomatik olarak dolduran ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-international-password-day-2024\/12275\/\" target=\"_blank\" rel=\"noopener\">kimlik bilgilerinizin bilinen bir veri ihlalinde ortaya \u00e7\u0131kmas\u0131 durumunda<\/a> sizi uyaran bir <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">parola y\u00f6neticisi<\/a>\u00a0kullanmak daha iyidir.<\/li>\n<\/ul>\n<blockquote><p>Kimlik av\u0131 ve doland\u0131r\u0131c\u0131l\u0131k hakk\u0131nda daha fazla bilgi:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ai-phishing-and-scams\/13848\/\" target=\"_blank\" rel=\"noopener\">Kimlik avc\u0131lar\u0131 ve doland\u0131r\u0131c\u0131lar yapay zekay\u0131 nas\u0131l kullan\u0131yor?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-deal-with-email-phishing\/13643\/\" target=\"_blank\" rel=\"noopener\">Bir kimlik av\u0131 e-postas\u0131 al\u0131rsan\u0131z ne yapmal\u0131s\u0131n\u0131z?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/blackmail-and-scam-in-different-countries\/13992\/\" target=\"_blank\" rel=\"noopener\">E-posta \u015fantaj\u0131: Doland\u0131r\u0131c\u0131lar \u015fantaj\u0131 nas\u0131l kullan\u0131yor?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/phishing-and-scam-in-telegram-2025\/13690\/\" target=\"_blank\" rel=\"noopener\">Botlar, hediyeler ve kripto paralarla yap\u0131lan Telegram doland\u0131r\u0131c\u0131l\u0131\u011f\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/\" target=\"_blank\" rel=\"noopener\">ve di\u011ferleri<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm\">\n","protected":false},"excerpt":{"rendered":"<p>Bir kimlik av\u0131 sald\u0131r\u0131s\u0131n\u0131n izini takip ederek, kullan\u0131c\u0131lardan \u00e7al\u0131nan verilere ne oldu\u011funu ad\u0131m ad\u0131m inceliyoruz.<\/p>\n","protected":false},"author":2710,"featured_media":14139,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[2837,612,1564,1074,2007],"class_list":{"0":"post-14138","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bilgisayar-korsanlari","9":"tag-dolandiricilik","10":"tag-hesaplar","11":"tag-kimlik-avi","12":"tag-sizintilar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-happens-to-data-after-phishing\/14138\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-happens-to-data-after-phishing\/29959\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/25028\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-happens-to-data-after-phishing\/29836\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/28870\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-happens-to-data-after-phishing\/31746\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-happens-to-data-after-phishing\/30390\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-happens-to-data-after-phishing\/41100\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-happens-to-data-after-phishing\/54968\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-happens-to-data-after-phishing\/23500\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-happens-to-data-after-phishing\/30126\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-happens-to-data-after-phishing\/35746\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-happens-to-data-after-phishing\/35376\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2710"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14138"}],"version-history":[{"count":10,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14138\/revisions"}],"predecessor-version":[{"id":14142,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14138\/revisions\/14142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14139"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}