{"id":14411,"date":"2026-04-02T15:54:19","date_gmt":"2026-04-02T12:54:19","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14411"},"modified":"2026-04-02T15:54:20","modified_gmt":"2026-04-02T12:54:20","slug":"bubble-no-code-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/bubble-no-code-phishing\/14411\/","title":{"rendered":"Bubble: Kimlik av\u0131 doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 i\u00e7in yeni bir ara\u00e7"},"content":{"rendered":"<p>\u00c7e\u015fitli yapay zeka destekli uygulama olu\u015fturucular, fikirlerinizi h\u0131zl\u0131 ve zahmetsiz bir \u015fekilde hayata ge\u00e7irmeyi vaat ediyor. Ne yaz\u0131k ki, kimlerin hayata ge\u00e7irmek \u00fczere s\u00fcrekli yeni fikirler arad\u0131\u011f\u0131n\u0131 \u00e7ok iyi biliyoruz. \u00c7\u00fcnk\u00fc onlar\u0131n eski fikirlerini tespit edip engelleme konusunda olduk\u00e7a iyiyiz. Tabii ki kimlik avc\u0131lar\u0131ndan bahsediyoruz. Son zamanlarda, repertuarlar\u0131na yeni bir numara eklediklerini ke\u015ffettik: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bubble_(programming_language)\" target=\"_blank\" rel=\"noopener nofollow\">Bubble<\/a>\u2018\u0131n yapay zeka destekli web sitesi olu\u015fturucusunu kullanarak web siteleri olu\u015fturmak. Bu takti\u011fin \u015fu anda bir veya daha fazla hizmet olarak sunulan kimlik av\u0131 platformu arac\u0131l\u0131\u011f\u0131yla kullan\u0131labilir hale gelmi\u015f olmas\u0131 son derece muhtemeldir; bu da bu tuzaklar\u0131n \u00e7ok \u00e7e\u015fitli sald\u0131r\u0131larda ortaya \u00e7\u0131kmaya ba\u015flayaca\u011f\u0131n\u0131 neredeyse kesinle\u015ftiriyor. Bunu ad\u0131m ad\u0131m inceleyelim.<\/p>\n<h2>Kimlik avc\u0131lar\u0131 neden Bubble kullan\u0131yor?<\/h2>\n<p>Bir e-postaya, kimlik av\u0131 sitesine y\u00f6nlendiren do\u011frudan bir ba\u011flant\u0131 eklemek, ba\u015far\u0131s\u0131zl\u0131\u011fa giden tek y\u00f6nl\u00fc bir bilettir. Mesaj\u0131n hedefine ula\u015fmama ihtimali olduk\u00e7a y\u00fcksektir; zira g\u00fcvenlik filtreleri, kullan\u0131c\u0131 mesaj\u0131 g\u00f6rmeden \u00f6nce onu engelleyecektir. Benzer \u015fekilde, otomatik y\u00f6nlendirmelerin kullan\u0131lmas\u0131, modern g\u00fcvenlik \u00e7\u00f6z\u00fcmleri a\u00e7\u0131s\u0131ndan uzun zamand\u0131r \u00f6nemli bir tehlike i\u015fareti olarak g\u00f6r\u00fclmektedir. Peki ya QR kodlar\u0131? Kurban\u0131n bir ba\u011flant\u0131ya t\u0131klamak yerine telefonuyla bir kodu taramas\u0131 teoride i\u015fe yarayabilir, ancak kimlik avc\u0131lar\u0131 bu a\u015famada ka\u00e7\u0131n\u0131lmaz olarak trafik kaybederler, \u00e7\u00fcnk\u00fc herkes ki\u015fisel bir cihaza \u015firket kimlik bilgilerini girmek istemez. \u0130\u015fte bu noktada, otomatik kod olu\u015fturma hizmetleri siber su\u00e7lular\u0131n imdad\u0131na yeti\u015fiyor.<\/p>\n<p>Bubble, web ve mobil uygulamalar geli\u015ftirmek i\u00e7in kod yazmaya gerek olmayan bir platform olarak konumlan\u0131r. Temelde, kullan\u0131c\u0131 g\u00f6rsel bir arabirim arac\u0131l\u0131\u011f\u0131yla neye ihtiyac\u0131 oldu\u011funu belirtir ve platform haz\u0131r bir \u00e7\u00f6z\u00fcm \u00fcretir. Doland\u0131r\u0131c\u0131lar, adreslerini daha sonra kimlik av\u0131 e-postalar\u0131na ekledikleri web uygulamalar\u0131 olu\u015fturmak i\u00e7in bu teknolojiyi benimsemi\u015ftir. Bu uygulamalar\u0131n as\u0131l i\u015flevi, her zamanki gibi k\u00f6t\u00fc ama\u00e7l\u0131 bir siteye otomatik olarak y\u00f6nlendirmekle s\u0131n\u0131rl\u0131 olsa da, burada birka\u00e7 belirgin ayr\u0131nt\u0131 s\u00f6z konusu.<\/p>\n<p>\u00d6ncelikle, ortaya \u00e7\u0131kan web uygulamas\u0131 do\u011frudan platformun sunucular\u0131nda bar\u0131nd\u0131r\u0131l\u0131yor. Bir kimlik av\u0131 e-postas\u0131nda kullan\u0131lmaya haz\u0131r URL, <em>https:\/\/%name%.bubble.io\/ gibi g\u00f6r\u00fcn\u00fcyor.<\/em> G\u00fcvenlik \u00e7\u00f6z\u00fcmleri a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, bu site yasal ve uzun s\u00fcredir faaliyet g\u00f6steren bir site gibi g\u00f6r\u00fcn\u00fcyor.<\/p>\n<p>\u0130kincisi, bu web uygulamas\u0131n\u0131n kodu tipik bir y\u00f6nlendirme gibi g\u00f6r\u00fcnm\u00fcyor. A\u00e7\u0131k\u00e7as\u0131, neye benzedi\u011fini s\u00f6ylemek zor. Bu kodsuz platform taraf\u0131ndan \u00fcretilen kod, JavaScript ve birbirinden ba\u011f\u0131ms\u0131z Shadow DOM (Belge Nesne Modeli) yap\u0131lar\u0131n\u0131n olu\u015fturdu\u011fu devasa bir karma\u015fa. Bir uzman i\u00e7in bile ilk bak\u0131\u015fta neler olup bitti\u011fini kavramak zor; t\u00fcm\u00fcn\u00fcn nas\u0131l i\u015fledi\u011fini ve amac\u0131n\u0131n ne oldu\u011funu anlamak i\u00e7in ger\u00e7ekten derinlemesine incelemek gerekiyor. Otomatik web kodu analiz algoritmalar\u0131 daha da kolay yan\u0131lt\u0131labilir ve s\u0131kl\u0131kla bu sitenin sadece i\u015flevsel ve kullan\u0131\u015fl\u0131 bir site oldu\u011fu sonucuna var\u0131rlar.<\/p>\n<div id=\"attachment_14413\" style=\"width: 705px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/04\/02153547\/bubble-no-code-phishing-code.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14413\" class=\"wp-image-14413 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/04\/02153547\/bubble-no-code-phishing-code.png\" alt=\"Bubble platformunda bar\u0131nd\u0131r\u0131lan bir web uygulamas\u0131n\u0131n kod par\u00e7as\u0131\" width=\"695\" height=\"415\"><\/a><p id=\"caption-attachment-14413\" class=\"wp-caption-text\">Bubble platformunda bar\u0131nd\u0131r\u0131lan bir web uygulamas\u0131n\u0131n kod par\u00e7as\u0131<\/p><\/div>\n<h2>Bu kimlik av\u0131 platformlar\u0131 nedir ve as\u0131l ama\u00e7lar\u0131 nedir?<\/h2>\n<p>G\u00fcn\u00fcm\u00fczde kimlik avc\u0131lar\u0131 nadiren s\u0131f\u0131rdan yeni hileler geli\u015ftirip uygulamaya koyuyorlar. \u00c7o\u011fu, kimlik av\u0131 kitlerini (temelde doland\u0131r\u0131c\u0131l\u0131k planlar\u0131 ba\u015flatmak i\u00e7in kullan\u0131lan \u201ckendin yap\u201d t\u00fcr\u00fcnde ara\u00e7lar) veya hatta tam kapsaml\u0131 kimlik av\u0131 hizmeti platformlar\u0131n\u0131 kullan\u0131yor.<\/p>\n<p>Bu platformlar, sald\u0131rganlara e-posta teslimat\u0131n\u0131 iyile\u015ftirmek ve Kimlik Av\u0131 Korumas\u0131 tedbirlerini atlatmak i\u00e7in s\u00fcrekli geli\u015fen, geli\u015fmi\u015f (ve son derece sinir bozucu) bir ara\u00e7 seti sunuyor. \u00d6rne\u011fin, bu ara\u00e7lar sald\u0131rganlar\u0131n; oturum \u00e7erezlerini ele ge\u00e7irmelerine, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/google-tasks-phishing\/14312\/\" target=\"_blank\" rel=\"noopener\">Google Tasks \u00fczerinden kimlik av\u0131 sald\u0131r\u0131lar\u0131<\/a> d\u00fczenlemelerine (bu takti\u011fi \u00f6nceki bir yaz\u0131m\u0131zda ele alm\u0131\u015ft\u0131k), iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 (2FA) do\u011frulamak ve ger\u00e7ek zamanl\u0131 olarak atlatmak i\u00e7in ortadaki sald\u0131rgan (AiTM) sald\u0131r\u0131lar\u0131 ger\u00e7ekle\u015ftirmelerine, g\u00fcvenlik taray\u0131c\u0131lar\u0131ndan gizlenmek i\u00e7in honeypot\u2019lar ve co\u011frafi s\u0131n\u0131rlama ile donat\u0131lm\u0131\u015f kimlik av\u0131 siteleri olu\u015fturmalar\u0131na ve benzersiz kimlik av\u0131 e-postalar\u0131 olu\u015fturmak i\u00e7in yapay zeka asistanlar\u0131n\u0131 kullanmalar\u0131na olanak tan\u0131r. Durumu daha da k\u00f6t\u00fcle\u015ftiren \u015fey ise, bu platformlar\u0131n altyap\u0131s\u0131n\u0131n genellikle AWS gibi tamamen yasal hizmetler \u00fczerinde bar\u0131nd\u0131r\u0131lmas\u0131d\u0131r; bu da onlar\u0131n taktiklerini tespit etmeyi daha da zorla\u015ft\u0131rmaktad\u0131r.<\/p>\n<p>Kimlik bilgilerini toplayan son hedef sayfay\u0131 olu\u015fturmak i\u00e7in de ayn\u0131 platformlar kullan\u0131l\u0131r. Bu \u00f6zel durumda, Bubble \u00fczerinde bar\u0131nd\u0131r\u0131lan web uygulamas\u0131, kurbanlar\u0131 Microsoft oturum a\u00e7ma penceresini taklit eden ve Cloudflare do\u011frulama kontrol\u00fc i\u00e7eren bir siteye y\u00f6nlendiriyor.<\/p>\n<div id=\"attachment_14414\" style=\"width: 749px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/04\/02153634\/bubble-no-code-phishing-login.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14414\" class=\"wp-image-14414 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/04\/02153634\/bubble-no-code-phishing-login.png\" alt=\"Kurumsal kimlik bilgilerini ele ge\u00e7irmek amac\u0131yla tasarlanm\u0131\u015f kimlik av\u0131 formu\" width=\"739\" height=\"581\"><\/a><p id=\"caption-attachment-14414\" class=\"wp-caption-text\">Kurumsal kimlik bilgilerini ele ge\u00e7irmek amac\u0131yla tasarlanm\u0131\u015f kimlik av\u0131 formu<\/p><\/div>\n<p>G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re, sald\u0131rganlar\u0131n kendi d\u00fcnyas\u0131nda Skype h\u00e2l\u00e2 kullan\u0131labilir bir ileti\u015fim arac\u0131; bunun d\u0131\u015f\u0131nda ise site olduk\u00e7a inand\u0131r\u0131c\u0131 g\u00f6r\u00fcn\u00fcyor.<\/p>\n<h2>\u015eirketinizi geli\u015fmi\u015f kimlik av\u0131 sald\u0131r\u0131lar\u0131ndan nas\u0131l koruyabilirsiniz?<\/h2>\n<p>G\u00fcn\u00fcm\u00fcz\u00fcn dijital ortam\u0131nda, \u00e7al\u0131\u015fanlar kurumsal kimlik bilgilerinin yaln\u0131zca \u015firketin ait oldu\u011fu kesin olarak bilinen hizmetlere ve web sitelerine girilmesi gerekti\u011fini a\u00e7\u0131k\u00e7a anlamal\u0131d\u0131r. \u00c7evrimi\u00e7i e\u011fitim i\u00e7in <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> kullanarak ekibinizin modern siber tehditler konusundaki fark\u0131ndal\u0131\u011f\u0131n\u0131 art\u0131rabilirsiniz.<\/p>\n<p>Elbette, en temkinli \u00e7al\u0131\u015fan bile ara s\u0131ra bu tuza\u011fa d\u00fc\u015febilir. Bizim \u00f6nerimiz; internete ba\u011fl\u0131 t\u00fcm i\u015f istasyonlar\u0131n\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 sitelere girme giri\u015fimlerini kolayca engelleyecek <a href=\"https:\/\/www.kaspersky.com.tr\/next?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____99cf0f930d9987ff\" target=\"_blank\" rel=\"noopener\">sa\u011flam g\u00fcvenlik \u00e7\u00f6z\u00fcmleriyle<\/a> donatman\u0131zd\u0131r. Son olarak, \u015firket posta kutular\u0131n\u0131 dolduran tehlikeli e-postalar\u0131n say\u0131s\u0131n\u0131 en ba\u015f\u0131ndan azaltmak i\u00e7in, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/mail-security-appliance?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">geli\u015fmi\u015f Kimlik Av\u0131 Korumas\u0131 teknolojilerine sahip bir a\u011f ge\u00e7idi g\u00fcvenlik \u00fcr\u00fcn\u00fcn\u00fcn<\/a> kullan\u0131lmas\u0131 \u00f6nerilir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular, kurumsal kimlik bilgilerini ele ge\u00e7irmek i\u00e7in art\u0131k yapay zeka destekli uygulama geli\u015ftirici Bubble taraf\u0131ndan olu\u015fturulan web uygulamalar\u0131n\u0131 kullan\u0131yor.<\/p>\n","protected":false},"author":2598,"featured_media":14412,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1425,1921,1074,1424],"class_list":{"0":"post-14411","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-ai","11":"tag-e-posta","12":"tag-kimlik-avi","13":"tag-yapay-zeka"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bubble-no-code-phishing\/14411\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/bubble-no-code-phishing\/31959\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/bubble-no-code-phishing\/30565\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/bubble-no-code-phishing\/41581\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/bubble-no-code-phishing\/55488\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/bubble-no-code-phishing\/23760\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/bubble-no-code-phishing\/24849\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/bubble-no-code-phishing\/33328\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/bubble-no-code-phishing\/30449\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14411"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14411\/revisions"}],"predecessor-version":[{"id":14416,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14411\/revisions\/14416"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14412"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}