{"id":14371,"date":"2026-03-18T18:35:41","date_gmt":"2026-03-18T15:35:41","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14371"},"modified":"2026-03-18T18:35:41","modified_gmt":"2026-03-18T15:35:41","slug":"beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/14371\/","title":{"rendered":"Devlet hizmetleri ve Starlink uygulamalar\u0131 k\u0131l\u0131\u011f\u0131na giren Android truva at\u0131"},"content":{"rendered":"<p>Android k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m geli\u015ftiricileri, k\u00f6t\u00fc niyetli hedeflerine ula\u015fmak i\u00e7in bir dizi zorlu\u011fun \u00fcstesinden gelmek zorundad\u0131r: kullan\u0131c\u0131lar\u0131 kand\u0131rarak ak\u0131ll\u0131 telefonlar\u0131na s\u0131zmak, g\u00fcvenlik yaz\u0131l\u0131mlar\u0131ndan ka\u00e7mak, kurbanlar\u0131 \u00e7e\u015fitli sistem izinlerini vermeye ikna etmek, kaynak t\u00fcketen uygulamalar\u0131 sonland\u0131ran yerle\u015fik pil optimizasyon ara\u00e7lar\u0131ndan ka\u00e7\u0131nmak ve t\u00fcm bunlardan sonra, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n\u0131n ger\u00e7ekten k\u00e2r getirmesini sa\u011flamak. Uzmanlar\u0131m\u0131z taraf\u0131ndan k\u0131sa s\u00fcre \u00f6nce ortaya \u00e7\u0131kar\u0131lan Android\u2011 tabanl\u0131 bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sald\u0131r\u0131 kampanyas\u0131 olan BeatBanker\u2019\u0131n yarat\u0131c\u0131lar\u0131, bu ad\u0131mlar\u0131n her biri i\u00e7in yeni bir y\u00f6ntem geli\u015ftirmi\u015f. Sald\u0131r\u0131 (\u015fimdilik) Brezilyal\u0131 kullan\u0131c\u0131lar\u0131 hedef al\u0131yor, ancak geli\u015ftiricilerin hedefleri onlar\u0131 neredeyse kesin olarak uluslararas\u0131 alana yay\u0131lmaya itecektir; bu nedenle tetikte olmak ve sald\u0131rgan\u0131n kulland\u0131\u011f\u0131 y\u00f6ntemleri incelemek faydal\u0131 olacakt\u0131r. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n kapsaml\u0131 teknik analizini <a href=\"https:\/\/securelist.com\/beatbanker-miner-and-banker\/119121\/\" target=\"_blank\" rel=\"noopener\">Securelist\u2019te<\/a> bulabilirsiniz.<\/p>\n<h2>BeatBanker bir ak\u0131ll\u0131 telefona nas\u0131l s\u0131zar?<\/h2>\n<p>Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, Google Play Store\u2019u taklit eden \u00f6zel olarak haz\u0131rlanm\u0131\u015f kimlik av\u0131 sayfalar\u0131 arac\u0131l\u0131\u011f\u0131yla yay\u0131l\u0131yor. Resmi uygulama ma\u011fazas\u0131yla kolayca kar\u0131\u015ft\u0131r\u0131labilecek bir sayfa, kullan\u0131c\u0131lar\u0131 g\u00f6r\u00fcn\u00fc\u015fte yararl\u0131 bir uygulamay\u0131 indirmeye davet ediyor. Bir sald\u0131r\u0131 kampanyas\u0131nda bu truva at\u0131, Brezilya h\u00fck\u00fcmetinin hizmet uygulamas\u0131 olan INSS Reembolso k\u0131l\u0131\u011f\u0131na girmi\u015f; bir di\u011ferinde ise Starlink uygulamas\u0131 gibi g\u00f6r\u00fcnm\u00fc\u015ft\u00fc.<\/p>\n<div id=\"attachment_14372\" style=\"width: 1392px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/03\/18182910\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14372\" class=\"wp-image-14372 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/03\/18182910\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png\" alt=\"cupomgratisfood{.}shop adl\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 site, bir uygulama ma\u011fazas\u0131n\u0131 taklit etme konusunda olduk\u00e7a ba\u015far\u0131l\u0131. Sahte INSS Reembolso'nun neden tam da \u00fc\u00e7 kez ortaya \u00e7\u0131kt\u0131\u011f\u0131 belli de\u011fil. Daha emin olmak i\u00e7in, belki de?!\" width=\"1382\" height=\"511\"><\/a><p id=\"caption-attachment-14372\" class=\"wp-caption-text\">cupomgratisfood{.}shop adl\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 site, bir uygulama ma\u011fazas\u0131n\u0131 taklit etme konusunda olduk\u00e7a ba\u015far\u0131l\u0131. Sahte INSS Reembolso\u2019nun neden tam da \u00fc\u00e7 kez ortaya \u00e7\u0131kt\u0131\u011f\u0131 belli de\u011fil. Daha emin olmak i\u00e7in, belki de?!<\/p><\/div>\n<p>Y\u00fckleme i\u015flemi, tek seferde \u00e7ok fazla izin talep etmemek ve kurban\u0131n dikkatini daha da gev\u015fetmek amac\u0131yla birka\u00e7 a\u015famada ger\u00e7ekle\u015ftirilir. \u0130lk uygulama indirilip ba\u015flat\u0131ld\u0131ktan sonra, yine Google Play\u2019e benzeyen bir arabirim g\u00f6r\u00fcnt\u00fclenir ve bu arabirim, tuzak uygulama i\u00e7in bir g\u00fcncelleme sim\u00fclasyonu ger\u00e7ekle\u015ftirir; bu s\u00fcre\u00e7te kullan\u0131c\u0131dan uygulama y\u00fckleme izni talep edilir, ki bu ba\u011flamda ola\u011fan d\u0131\u015f\u0131 bir durum gibi g\u00f6r\u00fcnmez. Bu izni verirseniz, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m ak\u0131ll\u0131 telefonunuza ek zararl\u0131 mod\u00fcller indirir.<\/p>\n<div id=\"attachment_14373\" style=\"width: 512px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/03\/18182937\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14373\" class=\"wp-image-14373 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/03\/18182937\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png\" alt=\"Y\u00fckleme i\u015fleminden sonra, bu truva at\u0131, uygulama y\u00fckleme izni talep ederek Google Play \u00fczerinden sahte bir uygulama g\u00fcncellemesi gibi davran\u0131rken, bu s\u00fcre\u00e7te ek zararl\u0131 mod\u00fclleri indirir\" width=\"502\" height=\"830\"><\/a><p id=\"caption-attachment-14373\" class=\"wp-caption-text\">Y\u00fckleme i\u015fleminden sonra, bu truva at\u0131, uygulama y\u00fckleme izni talep ederek Google Play \u00fczerinden sahte bir uygulama g\u00fcncellemesi gibi davran\u0131rken, bu s\u00fcre\u00e7te ek zararl\u0131 mod\u00fclleri indirir<\/p><\/div>\n<p>Truva at\u0131n\u0131n t\u00fcm bile\u015fenleri \u015fifrelenmi\u015ftir. \u015eifreyi \u00e7\u00f6zmeden ve enfeksiyonun sonraki a\u015famalar\u0131na ge\u00e7meden \u00f6nce, ger\u00e7ek bir ak\u0131ll\u0131 telefonda ve hedef \u00fclkede olup olmad\u0131\u011f\u0131n\u0131 kontrol eder. BeatBanker, herhangi bir tutars\u0131zl\u0131k tespit etti\u011finde veya em\u00fclasyon ya da analiz ortamlar\u0131nda \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 alg\u0131lad\u0131\u011f\u0131nda kendi i\u015fleyi\u015fini derhal sonland\u0131r\u0131r. Bu durum, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n dinamik analizini zorla\u015ft\u0131rmaktad\u0131r. Bu arada, sahte g\u00fcncelleme indiricisi, g\u00fcvenlik yaz\u0131l\u0131mlar\u0131 taraf\u0131ndan tespit edilebilecek dosyalar\u0131n ak\u0131ll\u0131 telefonda olu\u015fturulmas\u0131n\u0131 \u00f6nlemek i\u00e7in mod\u00fclleri do\u011frudan RAM\u2019e yerle\u015ftiriyor.<\/p>\n<p>Bu hilelerin hi\u00e7biri yeni de\u011fil ve masa\u00fcst\u00fc bilgisayarlar i\u00e7in geli\u015ftirilen karma\u015f\u0131k k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarda s\u0131kl\u0131kla kullan\u0131l\u0131yor. Ancak ak\u0131ll\u0131 telefonlarda bu t\u00fcr bir geli\u015fmi\u015flik h\u00e2l\u00e2 nadir g\u00f6r\u00fcl\u00fcr ve her g\u00fcvenlik arac\u0131 bunu tespit edemez. <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky \u00fcr\u00fcnlerini<\/a>\u00a0kullananlar bu tehditten korunmaktad\u0131r.<\/p>\n<h2>Ses dosyas\u0131n\u0131 bir kalkan olarak kullanmak<\/h2>\n<p>BeatBanker, ak\u0131ll\u0131 telefona y\u00fcklendikten sonra Monero kripto para madencili\u011fi i\u00e7in bir mod\u00fcl indirir. Yazarlar, ak\u0131ll\u0131 telefonun agresif pil optimizasyon sistemlerinin madenci uygulamas\u0131n\u0131 kapatabilece\u011finden \u00e7ok endi\u015felendikleri i\u00e7in bir hile buldular: her zaman neredeyse duyulmayacak kadar d\u00fc\u015f\u00fck sesli bir ses \u00e7almak. G\u00fc\u00e7 t\u00fcketimi kontrol sistemleri, arka plandaki m\u00fczik veya podcast oynat\u0131c\u0131lar\u0131n\u0131n kesilmesini \u00f6nlemek i\u00e7in genellikle ses veya video oynatmakta olan uygulamalar\u0131 bu k\u0131s\u0131tlamadan muaf tutar. Bu \u015fekilde, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kesintisiz olarak \u00e7al\u0131\u015fabilir. Ayr\u0131ca, durum \u00e7ubu\u011funda kal\u0131c\u0131 bir bildirim g\u00f6stererek, kullan\u0131c\u0131dan sistem g\u00fcncellemesi i\u00e7in telefonun a\u00e7\u0131k kalmas\u0131n\u0131 ister.<\/p>\n<div id=\"attachment_14374\" style=\"width: 447px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/03\/18183022\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-03.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14374\" class=\"wp-image-14374 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/03\/18183022\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-03.png\" alt=\"Starlink uygulamas\u0131 k\u0131l\u0131\u011f\u0131na girmi\u015f ba\u015fka bir k\u00f6t\u00fc ama\u00e7l\u0131 uygulamadan gelen kal\u0131c\u0131 sistem g\u00fcncelleme bildiriminin \u00f6rne\u011fi\" width=\"437\" height=\"111\"><\/a><p id=\"caption-attachment-14374\" class=\"wp-caption-text\">Starlink uygulamas\u0131 k\u0131l\u0131\u011f\u0131na girmi\u015f ba\u015fka bir k\u00f6t\u00fc ama\u00e7l\u0131 uygulamadan gelen kal\u0131c\u0131 sistem g\u00fcncelleme bildiriminin \u00f6rne\u011fi<\/p><\/div>\n<h2>Google \u00fczerinden kontrol<\/h2>\n<p>Yazarlar, bu truva at\u0131n\u0131 y\u00f6netmek i\u00e7in Google\u2019\u0131n yasal Firebase Cloud Messaging (FCM) hizmetini kullan\u0131yor; bu hizmet, ak\u0131ll\u0131 telefonlardan bildirim almak ve veri g\u00f6ndermek i\u00e7in kullan\u0131lan bir sistemdir. Bu \u00f6zellik t\u00fcm uygulamalarda kullan\u0131labilir ve veri g\u00f6nderip almak i\u00e7in en yayg\u0131n y\u00f6ntemdir. FCM sayesinde sald\u0131rganlar, cihaz\u0131n durumunu izleyebilir ve gerekti\u011finde ayarlar\u0131n\u0131 de\u011fi\u015ftirebilir.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklendikten sonra bir s\u00fcre hi\u00e7bir \u015fey olmaz: sald\u0131rganlar zaman ge\u00e7mesini bekler. Ard\u0131ndan i\u015flemciyi tam kapasiteye \u00e7\u0131kar\u0131rlar, ancak telefon a\u015f\u0131r\u0131 \u0131s\u0131n\u0131rsa, pil seviyesi d\u00fc\u015fmeye ba\u015flarsa ya da kullan\u0131c\u0131 cihaz\u0131 kullan\u0131yorsa, i\u015flemciyi yava\u015flatmaya \u00f6zen g\u00f6sterirler. T\u00fcm bunlar FCM arac\u0131l\u0131\u011f\u0131yla ger\u00e7ekle\u015ftirilir.<\/p>\n<h2>H\u0131rs\u0131zl\u0131k ve casusluk<\/h2>\n<p>Kripto madenci program\u0131n\u0131n yan\u0131 s\u0131ra, BeatBanker kullan\u0131c\u0131y\u0131 g\u00f6zetlemek ve uygun bir anda doland\u0131rmak i\u00e7in ek mod\u00fcller y\u00fckler. Casus yaz\u0131l\u0131m mod\u00fcl\u00fc, Eri\u015filebilirlik Hizmetleri iznini talep eder ve bu izin verilirse, ak\u0131ll\u0131 telefonda ger\u00e7ekle\u015fen her \u015feyi izlemeye ba\u015flar.<\/p>\n<p>Kullan\u0131c\u0131 USDT g\u00f6ndermek i\u00e7in Binance veya Trust Wallet uygulamas\u0131n\u0131 a\u00e7arsa, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m c\u00fczdan arabiriminin \u00fczerine sahte bir ekran yerle\u015ftirerek al\u0131c\u0131n\u0131n adresini kendi adresiyle de\u011fi\u015ftirir. T\u00fcm paslar forvetlere gidiyor.<\/p>\n<p>Bu truva at\u0131, geli\u015fmi\u015f bir uzaktan kumanda sistemine sahiptir ve bir\u00e7ok ba\u015fka komutu da yerine getirebilir:<\/p>\n<ul>\n<li>Google Authenticator\u2019dan tek kullan\u0131ml\u0131k kodlar\u0131 yakalama<\/li>\n<li>Mikrofondan ses kayd\u0131<\/li>\n<li>Ekran\u0131 ger\u00e7ek zamanl\u0131 olarak yay\u0131nlama<\/li>\n<li>Pano\u2019yu izleme ve tu\u015f vuru\u015flar\u0131n\u0131 yakalama<\/li>\n<li>SMS mesajlar\u0131 g\u00f6nderme<\/li>\n<li>Sald\u0131rgan taraf\u0131ndan g\u00f6nderilen bir komut dosyas\u0131na g\u00f6re ekran\u0131n belirli b\u00f6lgelerine dokunma hareketlerini ve metin giri\u015fini sim\u00fcle etme ve \u00e7ok daha fazlas\u0131<\/li>\n<\/ul>\n<p>T\u00fcm bunlar, kurban\u0131n sadece kripto para \u00f6demeleri de\u011fil, di\u011fer t\u00fcm bankac\u0131l\u0131k veya \u00f6deme hizmetlerini kulland\u0131\u011f\u0131 zamanlarda da doland\u0131r\u0131lmas\u0131n\u0131 m\u00fcmk\u00fcn k\u0131l\u0131yor.<\/p>\n<p>Bazen kurbanlar\u0131n cihazlar\u0131na casusluk ve ak\u0131ll\u0131 telefonun uzaktan kontrol\u00fc amac\u0131yla farkl\u0131 bir mod\u00fcl, yani BTMOB uzaktan eri\u015fim truva at\u0131 bula\u015ft\u0131r\u0131l\u0131r. K\u00f6t\u00fc ama\u00e7l\u0131 i\u015flevleri daha da geni\u015f kapsaml\u0131d\u0131r; bunlara \u00f6rnek olarak \u015funlar say\u0131labilir:<\/p>\n<ul>\n<li>Android 13\u201315\u2019te belirli izinlerin otomatik olarak al\u0131nmas\u0131<\/li>\n<li>S\u00fcrekli konum izleme<\/li>\n<li>\u00d6n ve arka kameralara eri\u015fim<\/li>\n<li>Ekran kilidini a\u00e7mak i\u00e7in PIN kodlar\u0131n\u0131 ve parolalar\u0131 alma<\/li>\n<li>Klavye giri\u015flerini yakalama<\/li>\n<\/ul>\n<h2>BeatBanker\u2019dan nas\u0131l korunabilirsiniz?<\/h2>\n<p>Siber su\u00e7lular sald\u0131r\u0131lar\u0131n\u0131 s\u00fcrekli olarak geli\u015ftiriyor ve kurbanlar\u0131ndan \u00e7\u0131kar sa\u011flamak i\u00e7in yeni y\u00f6ntemler buluyor. Buna ra\u011fmen, birka\u00e7 basit \u00f6nlemi alarak kendinizi koruyabilirsiniz:<\/p>\n<ul>\n<li>Uygulamalar\u0131 yaln\u0131zca Google Play veya \u00fcretici taraf\u0131ndan \u00f6nceden y\u00fcklenmi\u015f uygulama ma\u011fazas\u0131 gibi <strong>resmi kaynaklardan indirin<\/strong>. \u0130nternette arama yaparken bir uygulama bulursan\u0131z, taray\u0131c\u0131n\u0131zdaki ba\u011flant\u0131dan uygulamay\u0131 a\u00e7may\u0131n; bunun yerine ak\u0131ll\u0131 telefonunuzdaki Google Play uygulamas\u0131na veya ba\u015fka bir resmi ma\u011fazaya gidip uygulamay\u0131 oradan aray\u0131n. Haz\u0131r ba\u015flam\u0131\u015fken, indirme say\u0131s\u0131n\u0131 ve uygulaman\u0131n piyasaya \u00e7\u0131k\u0131\u015f tarihini kontrol edin; ayr\u0131ca puanlara ve yorumlara da g\u00f6z at\u0131n. Yeni uygulamalardan, d\u00fc\u015f\u00fck puan alan uygulamalardan ve indirme say\u0131s\u0131 az olan uygulamalardan uzak durun.<\/li>\n<li><strong>Verdi\u011finiz izinleri kontrol edin<\/strong> . \u0130zinlerin ne i\u015fe yarad\u0131\u011f\u0131ndan veya o uygulaman\u0131n neden bu izinlere ihtiya\u00e7 duydu\u011fundan emin de\u011filseniz, izin vermeyin. <em>Bilinmeyen uygulamalar\u0131 y\u00fckleme<\/em>, <em>Eri\u015filebilirlik<\/em>, <em>S\u00fcper kullan\u0131c\u0131<\/em> ve <em>Di\u011fer uygulamalar\u0131n \u00fczerine g\u00f6r\u00fcnt\u00fcleme<\/em> gibi izinlere \u00f6zellikle dikkat edin. Bu konular\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/android-most-dangerous-features\/11817\/\" target=\"_blank\" rel=\"noopener\">ayr\u0131 bir makalede<\/a> ayr\u0131nt\u0131l\u0131 olarak ele ald\u0131k.<\/li>\n<li><strong>Cihaz\u0131n\u0131z\u0131 kapsaml\u0131 bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan koruma \u00e7\u00f6z\u00fcm\u00fcyle donat\u0131n<\/strong>. Elbette biz <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>\u00a0uygulamas\u0131n\u0131 \u00f6neriyoruz. Kaspersky \u00fcr\u00fcnlerinin kullan\u0131c\u0131lar\u0131, <em>HEUR:Trojan-Dropper.AndroidOS.BeatBanker<\/em> ve <em>HEUR:Trojan-Dropper.AndroidOS.Banker*<\/em> tan\u0131mlar\u0131yla tespit edilen BeatBanker\u2019dan korunmaktad\u0131r..<\/li>\n<li><strong>\u0130\u015fletim sisteminizi ve g\u00fcvenlik yaz\u0131l\u0131m\u0131n\u0131z\u0131 d\u00fczenli olarak g\u00fcncelleyin<\/strong>. \u015eu anda Google Play\u2019de bulunmayan <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>\u00a0uygulamas\u0131 i\u00e7in, l\u00fctfen uygulaman\u0131n y\u00fcklenmesi ve g\u00fcncellenmesi ile ilgili <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-install-kaspersky-apps-from-alternative-stores\/13110\/\" target=\"_blank\" rel=\"noopener\">ayr\u0131nt\u0131l\u0131 talimatlar\u0131m\u0131z\u0131 inceleyin.<\/a><\/li>\n<\/ul>\n<blockquote><p>Son zamanlarda Android kullan\u0131c\u0131lar\u0131na y\u00f6nelik tehditler tavan yapt\u0131. En yayg\u0131n ve \u00f6nemli Android sald\u0131r\u0131lar\u0131 ile kendinizi ve sevdiklerinizi g\u00fcvende tutmak i\u00e7in ipu\u00e7lar\u0131n\u0131 i\u00e7eren di\u011fer yaz\u0131lar\u0131m\u0131za g\u00f6z at\u0131n:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/growing-2026-android-threats-and-protection\/14232\/\" target=\"_blank\" rel=\"noopener\"><strong>Android tehditlerinin m\u00fckemmel f\u0131rt\u0131nas\u0131<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/mental-health-apps-issues-2026\/55395\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Beyin g\u00f6\u00e7\u00fc: Ruh sa\u011fl\u0131\u011f\u0131 uygulamalar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/pixnapping-cve-2025-48561\/14033\/\" target=\"_blank\" rel=\"noopener\"><strong>Pixnapping g\u00fcvenlik a\u00e7\u0131\u011f\u0131: Android telefonunuzun engellenemez ekran g\u00f6r\u00fcnt\u00fcleri<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/nfc-gate-relay-attacks-2026\/14198\/\" target=\"_blank\" rel=\"noopener\"><strong>NFC skimming sald\u0131r\u0131lar\u0131<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/notification-listener-in-kaspersky-for-android\/13791\/\" target=\"_blank\" rel=\"noopener\"><strong>Kaspersky for Android\u2019de yeni bir kimlik av\u0131 g\u00fcvenlik katman\u0131<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n","protected":false},"excerpt":{"rendered":"<p>Casusluk, kripto para h\u0131rs\u0131zl\u0131\u011f\u0131 ve madencilik faaliyetlerini, ak\u0131ll\u0131 telefonlara yerle\u015fmek i\u00e7in geli\u015ftirdi\u011fi yarat\u0131c\u0131 y\u00f6ntemlerle birle\u015ftiren BeatBanker truva at\u0131 sald\u0131r\u0131s\u0131n\u0131 ayr\u0131nt\u0131l\u0131 olarak inceliyoruz. <\/p>\n","protected":false},"author":312,"featured_media":14377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[105,1045,978,2786,612,22,183,519,2790,2628,537,1986],"class_list":{"0":"post-14371","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-android","9":"tag-bankacilik-trojani","10":"tag-bankalar","11":"tag-bilgi-hirsizlari","12":"tag-dolandiricilik","13":"tag-google","14":"tag-google-play","15":"tag-ipuclari-2","16":"tag-kripto","17":"tag-kripto-cuzdanlari","18":"tag-tehditler","19":"tag-truva-atlari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/14371\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30260\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/25338\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/13259\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30132\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/29038\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/31921\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30532\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/41429\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/55401\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/23716\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/24810\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/33292\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/30387\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/36016\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso\/35674\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/android\/","name":"android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/312"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14371"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14371\/revisions"}],"predecessor-version":[{"id":14378,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14371\/revisions\/14378"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14377"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}