{"id":14440,"date":"2026-04-08T18:42:33","date_gmt":"2026-04-08T15:42:33","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14440"},"modified":"2026-04-08T18:42:33","modified_gmt":"2026-04-08T15:42:33","slug":"supply-chain-attacks-in-2025","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/supply-chain-attacks-in-2025\/14440\/","title":{"rendered":"2025 y\u0131l\u0131n\u0131n en dikkat \u00e7eken tedarik zinciri sald\u0131r\u0131lar\u0131"},"content":{"rendered":"<p>Tedarik zinciri sald\u0131r\u0131lar\u0131, <a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-in-2024\/52965\/\" target=\"_blank\" rel=\"noopener nofollow\">y\u0131llard\u0131r<\/a> siber g\u00fcvenlik olaylar\u0131n\u0131n en tehlikeli kategorilerinden biri olmu\u015f durumda. 2025 y\u0131l\u0131 bize bir \u015fey \u00f6\u011frettiyse, o da siber su\u00e7lular\u0131n bu y\u00f6ntemlere daha da yo\u011funla\u015ft\u0131\u011f\u0131d\u0131r. Bu ayr\u0131nt\u0131l\u0131 incelemede, 2025 y\u0131l\u0131nda meydana gelen tedarik zinciri sald\u0131r\u0131lar\u0131n\u0131 ele al\u0131yoruz; bu sald\u0131r\u0131lar her zaman en maliyetli olmasa da, kesinlikle en s\u0131ra d\u0131\u015f\u0131 olanlard\u0131 ve sekt\u00f6r\u00fcn dikkatini \u00e7ektiler.<\/p>\n<h2>Ocak 2025: DogWifTools GitHub deposunda bir RAT tespit edildi<\/h2>\n<p>Tatil aras\u0131n\u0131n ard\u0131ndan bir \u201c\u0131s\u0131nma\u201d olarak, siber su\u00e7lular DogWifTools\u2019un \u00e7e\u015fitli s\u00fcr\u00fcmlerine sistematik olarak <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/solana-pumpfun-tool-dogwiftool-compromified-to-drain-wallets\/\" target=\"_blank\" rel=\"noopener nofollow\">arka kap\u0131<\/a> yerle\u015ftirdiler. Bu, Pump.fun platformunda Solana tabanl\u0131 <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Meme_coin\" target=\"_blank\" rel=\"noopener nofollow\">meme coin\u2019leri<\/a> piyasaya s\u00fcrmek ve etkin bir \u015fekilde tan\u0131tmak i\u00e7in tasarlanm\u0131\u015f bir yard\u0131mc\u0131 programd\u0131r. Sald\u0131rganlar, DogWifTools\u2019un \u00f6zel GitHub deposunu ele ge\u00e7irdikten sonra, geli\u015ftiricilerin yeni bir s\u00fcr\u00fcm\u00fc y\u00fcklemesini beklediler, bu s\u00fcr\u00fcme bir RAT yerle\u015ftirdiler ve birka\u00e7 saat sonra da yasal program\u0131 kendi k\u00f6t\u00fc ama\u00e7l\u0131 s\u00fcr\u00fcmleriyle de\u011fi\u015ftirdiler. Geli\u015ftiricilere g\u00f6re, siber su\u00e7lular DogWifTools for Windows\u2019un 1.6.3 ile 1.6.6 aras\u0131ndaki s\u00fcr\u00fcmlerine ba\u015far\u0131yla trojan yerle\u015ftirdiler.<\/p>\n<p>Olaylar Ocak ay\u0131 sonlar\u0131nda ba\u015flad\u0131. Sald\u0131rganlar, RAT\u2019\u0131 kullanarak vir\u00fcs bula\u015fm\u0131\u015f cihazlardan b\u00fcy\u00fck miktarda veri toplad\u0131ktan sonra, kurbanlar\u0131n\u0131n kripto c\u00fczdanlar\u0131n\u0131 bo\u015faltt\u0131. Ma\u011fdurlar, \u00e7al\u0131nan kripto para biriminin toplam de\u011ferinin 10 milyon ABD dolar\u0131n\u0131n \u00fczerinde oldu\u011funu tahmin ederken, sald\u0131rganlar bu rakam\u0131 <a href=\"https:\/\/x.com\/JizzyGroup\/status\/1884395542072959208\" target=\"_blank\" rel=\"noopener nofollow\">yalanlad\u0131<\/a>, ancak ger\u00e7ekte ne kadar para \u00e7ald\u0131klar\u0131n\u0131 tam olarak a\u00e7\u0131klamaktan ka\u00e7\u0131nd\u0131lar.<\/p>\n<h2>\u015eubat 2025: 1,5 milyar dolarl\u0131k Bybit soygunu<\/h2>\n<p>Ocak ay\u0131 bir \u0131s\u0131nma turuysa, \u015eubat ay\u0131 tam bir \u00e7\u00f6k\u00fc\u015f oldu. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/bybit-hack-lessons-how-to-do-self-custody-properly\/13214\/\" target=\"_blank\" rel=\"noopener\">Bybit kripto borsas\u0131na yap\u0131lan sald\u0131r\u0131<\/a>, \u00f6nceki olaylar\u0131 g\u00f6lgede b\u0131rakarak tarihin en b\u00fcy\u00fck kripto h\u0131rs\u0131zl\u0131\u011f\u0131 oldu. Sald\u0131rganlar, borsan\u0131n varl\u0131klar\u0131n\u0131 y\u00f6netmek i\u00e7in kulland\u0131\u011f\u0131 \u00e7oklu imza tabanl\u0131 so\u011fuk depolama \u00e7\u00f6z\u00fcm\u00fc olan Safe{Wallet} yaz\u0131l\u0131m\u0131n\u0131 ele ge\u00e7irmeyi ba\u015fard\u0131lar.<\/p>\n<p>Bybit \u00e7al\u0131\u015fanlar\u0131 rutin bir i\u015flem yapt\u0131klar\u0131n\u0131 san\u0131yorlard\u0131; oysa ger\u00e7ekte k\u00f6t\u00fc niyetli bir ak\u0131ll\u0131 s\u00f6zle\u015fmeyi onayl\u0131yorlard\u0131. Sald\u0131r\u0131 ger\u00e7ekle\u015ftirildi\u011finde, birincil so\u011fuk c\u00fczdan\u0131n i\u00e7indeki varl\u0131klar bo\u015falt\u0131ld\u0131 ve bu varl\u0131klar sald\u0131rganlar\u0131n kontrol\u00fcndeki y\u00fczlerce adrese da\u011f\u0131t\u0131ld\u0131. Son toplanan miktar 400.000 ETH\/stETH\u2019yi a\u015ft\u0131 ve toplam de\u011feri yakla\u015f\u0131k\u2026 1,5 milyar ABD dolar\u0131 gibi dudak u\u00e7uklatan bir rakama ula\u015ft\u0131!<\/p>\n<h2>Mart 2025: Coinbase, GitHub Actions\u2019ta meydana gelen zincirleme g\u00fcvenlik ihlalinin hedefi oldu<\/h2>\n<p>2025 ilkbahar\u0131, standart DevOps g\u00f6revlerini otomatikle\u015ftirmek i\u00e7in kullan\u0131lan i\u015f ak\u0131\u015f\u0131 \u015fablonlar\u0131 olan <a href=\"https:\/\/www.kaspersky.com\/blog\/malicious-github-action-changed-files\/53179\/\" target=\"_blank\" rel=\"noopener nofollow\">GitHub Actions\u2019\u0131n birden fazlas\u0131n\u0131n ele ge\u00e7irilmesini<\/a> ana sald\u0131r\u0131 mekanizmas\u0131 olarak kullanan sofistike bir sald\u0131r\u0131yla ba\u015flad\u0131. Her \u015fey, SpotBugs analiz arac\u0131n\u0131n bir bak\u0131m sorumlusuna ait ki\u015fisel belirte\u00e7in \u00e7al\u0131nmas\u0131yla ba\u015flad\u0131. Sald\u0131rganlar bu eri\u015fim noktas\u0131n\u0131 kullanarak k\u00f6t\u00fc ama\u00e7l\u0131 bir i\u015flem ba\u015flatt\u0131lar ve ayn\u0131 zamanda projeye de dahil olan reviewdog\/action-setup i\u015f ak\u0131\u015f\u0131n\u0131n bir bak\u0131m sorumlusundan bir belirte\u00e7 ele ge\u00e7irmeyi ba\u015fard\u0131lar.<\/p>\n<p>Oradan, tj-actions\/changed-files i\u015f ak\u0131\u015f\u0131n\u0131 ele ge\u00e7irerek, bu i\u015f ak\u0131\u015f\u0131n\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 bir Python beti\u011fini \u00e7al\u0131\u015ft\u0131racak \u015fekilde de\u011fi\u015ftirdiler. Bu komut dosyas\u0131, AWS, Azure ve Google Cloud anahtarlar\u0131, GitHub ve NPM belirte\u00e7leri, veri taban\u0131 kimlik bilgileri ve RSA \u00f6zel anahtarlar\u0131 gibi y\u00fcksek de\u011ferli gizli bilgileri tespit etmek \u00fczere tasarlanm\u0131\u015ft\u0131r. Garip bir \u015fekilde, komut dosyas\u0131 buldu\u011fu her \u015feyi do\u011frudan herkesin eri\u015febilece\u011fi derleme g\u00fcnl\u00fcklerine yaz\u0131yordu. Bu, s\u0131zan verilerin sadece sald\u0131rganlar\u0131n de\u011fil, aramay\u0131 bilen herkesin eri\u015fimine a\u00e7\u0131k oldu\u011fu anlam\u0131na geliyordu.<\/p>\n<p>Bu operasyonun as\u0131l hedefi, Coinbase kripto borsas\u0131na ait bir veri deposuydu. Neyse ki, geli\u015ftiriciler bu tehdidi zaman\u0131nda fark etti ve sistemin ele ge\u00e7irilmesini engelledi. Sald\u0131rganlar, tj-actions\/changed-files s\u00fcreciyle ilgili kontrol\u00fc kaybetmek \u00fczere olduklar\u0131n\u0131 fark ettikten sonra, \u201cspray and pray\u201d (\u201cda\u011f\u0131t ve dua et\u201d) y\u00f6ntemine y\u00f6neldiler. Bu durum, 23.000 depoyu gizli bilgilerin s\u0131zmas\u0131 riskiyle kar\u015f\u0131 kar\u015f\u0131ya b\u0131rakt\u0131. Sonu\u00e7 olarak, bu depolardan <a href=\"https:\/\/thehackernews.com\/2025\/03\/github-supply-chain-breach-coinbase.html\" target=\"_blank\" rel=\"noopener nofollow\">birka\u00e7 y\u00fcz tanesinde<\/a> hassas kimlik bilgileri ger\u00e7ekten de kamuoyuna if\u015fa oldu.<\/p>\n<h2>Nisan 2025: 21 Magento eklentisinde bir arka kap\u0131<\/h2>\n<p>Nisan ay\u0131nda, \u00e7evrimi\u00e7i ma\u011faza kurmak i\u00e7in en pop\u00fcler platformlardan biri olan Magento\u2019nun \u00e7ok say\u0131da eklentisinde bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/magento-supply-chain-attack-compromises-hundreds-of-e-stores\/\" target=\"_blank\" rel=\"noopener nofollow\">tespit edildi<\/a>. Arka kap\u0131; Tigren, Meetanshi ve MGS adl\u0131 \u00fc\u00e7 tedarik\u00e7i taraf\u0131ndan geli\u015ftirilen 21 mod\u00fclde yerle\u015fik olarak bulunuyordu. Bu uzant\u0131lar, aralar\u0131nda en az bir tane \u00e7ok uluslu \u015firketin de bulundu\u011fu y\u00fczlerce e-ticaret \u015firketinin altyap\u0131s\u0131n\u0131n bir par\u00e7as\u0131yd\u0131.<\/p>\n<p>Bunu ke\u015ffeden ara\u015ft\u0131rmac\u0131lara g\u00f6re, bu arka kap\u0131 asl\u0131nda 2019 y\u0131l\u0131nda yerle\u015ftirilmi\u015fti. 2025 y\u0131l\u0131n\u0131n Nisan ay\u0131nda, sald\u0131rganlar nihayet bu a\u00e7\u0131\u011f\u0131 kullanarak web sitelerini ele ge\u00e7irdiler ve web kabuklar\u0131 y\u00fcklediler. Bu, uzant\u0131lara yerle\u015fik ve bir lisans dosyas\u0131ndan al\u0131nan rastgele kodu \u00e7al\u0131\u015ft\u0131ran bir i\u015flev arac\u0131l\u0131\u011f\u0131yla ger\u00e7ekle\u015ftirildi.<\/p>\n<p>\u0130ronik bir \u015fekilde, vir\u00fcs bula\u015fm\u0131\u015f mod\u00fcller aras\u0131nda MGS GDPR ve Meetanshi CookieNotice de vard\u0131. Adlar\u0131ndan da anla\u015f\u0131laca\u011f\u0131 \u00fczere, bu uzant\u0131lar web sitelerinin kullan\u0131c\u0131 gizlili\u011fi ve veri i\u015fleme d\u00fczenlemelerine uymas\u0131na yard\u0131mc\u0131 olmak amac\u0131yla tasarlanm\u0131\u015ft\u0131r. Sonu\u00e7 olarak, bu uygulamalar\u0131n kullan\u0131m\u0131 gizlili\u011fi sa\u011flamak yerine, b\u00fcy\u00fck olas\u0131l\u0131kla <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/illicit-code-on-legitimate-sites\/11612\/\" target=\"_blank\" rel=\"noopener\">web skimming<\/a> yoluyla kullan\u0131c\u0131 verilerinin ve finansal varl\u0131klar\u0131n \u00e7al\u0131nmas\u0131na yol a\u00e7t\u0131.<\/p>\n<h2>May\u0131s 2025: G\u00fcvenli\u011fi ihlal edilmi\u015f bir MSP arac\u0131l\u0131\u011f\u0131yla yay\u0131lan fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>May\u0131s ay\u0131nda, DragonForce \u00e7etesine mensup fidye yaz\u0131l\u0131m\u0131 sald\u0131rganlar\u0131, ad\u0131 a\u00e7\u0131klanmayan bir y\u00f6netilen hizmet sa\u011flay\u0131c\u0131s\u0131n\u0131n (MSP) altyap\u0131s\u0131na <a href=\"https:\/\/www.theregister.com\/2025\/05\/28\/dragonforce_ransomware_gang_sets_fire\/\" target=\"_blank\" rel=\"noopener nofollow\">eri\u015fim sa\u011flad\u0131<\/a> ve bunu fidye yaz\u0131l\u0131mlar\u0131n\u0131 yaymak ve MSP\u2019nin m\u00fc\u015fteri kurulu\u015flar\u0131ndan veri \u00e7almak i\u00e7in kulland\u0131.<\/p>\n<p>G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re sald\u0131rganlar, MSP taraf\u0131ndan kullan\u0131lan uzaktan izleme ve y\u00f6netim arac\u0131 SimpleHelp\u2019teki \u00e7e\u015fitli g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararland\u0131. Bunlar\u0131n aras\u0131nda bir adet kritik g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da bulunuyordu. Bu g\u00fcvenlik a\u00e7\u0131klar\u0131 2024 y\u0131l\u0131nda tespit edilmi\u015f ve <a href=\"https:\/\/thehackernews.com\/2025\/01\/critical-simplehelp-flaws-allow-file.html\" target=\"_blank\" rel=\"noopener nofollow\">Ocak 2025\u2019te<\/a> kamuoyuna duyurulup giderilmi\u015ftir. Ne yaz\u0131k ki, MSP g\u00fcncelleme s\u00fcrecini aceleye getirmemeyi tercih etmi\u015f g\u00f6r\u00fcn\u00fcyor ve fidye yaz\u0131l\u0131m\u0131 \u00e7etesi bu gecikmeden b\u00fcy\u00fck bir memnuniyetle istifade etti.<\/p>\n<h2>Haziran 2025: Bir d\u00fczineden fazla pop\u00fcler npm paketinde bir arka kap\u0131<\/h2>\n<p>Yaz ba\u015f\u0131nda, sald\u0131rganlar Gluestack k\u00fct\u00fcphanesinin bak\u0131m\u0131ndan sorumlu ki\u015filerden birinin hesab\u0131n\u0131 ele ge\u00e7irdi ve \u00e7ald\u0131klar\u0131 belirte\u00e7i kullanarak <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/supply-chain-attack-hits-gluestack-npm-packages-with-960k-weekly-downloads\/\" target=\"_blank\" rel=\"noopener nofollow\">17 npm paketine arka kap\u0131 yerle\u015ftirdi<\/a>. Bu paketler aras\u0131nda en pop\u00fcler olan @react-native-aria\/interactions, haftal\u0131k 125.000 indirme say\u0131s\u0131na ula\u015f\u0131rken, g\u00fcvenli\u011fi ihlal edilen t\u00fcm paketlerin toplam indirme say\u0131s\u0131 bir milyonu a\u015ft\u0131.<\/p>\n<p>Bu olayda \u00f6zellikle dikkat \u00e7eken husus, Gluestack geli\u015ftiricilerinin <a href=\"https:\/\/github.com\/gluestack\/gluestack-ui\/issues\/2894423issuecomment-2955003750\" target=\"_blank\" rel=\"noopener nofollow\">olay\u0131n ard\u0131ndan att\u0131\u011f\u0131 ad\u0131mlard\u0131r<\/a>: \u0130lk olarak, ikincil katk\u0131c\u0131lar\u0131n GitHub depolar\u0131na eri\u015fimini k\u0131s\u0131tlad\u0131lar. \u0130kinci olarak, yeni s\u00fcr\u00fcmlerin yay\u0131nlanmas\u0131 i\u00e7in iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 (2FA) etkinle\u015ftirdiler. \u00dc\u00e7\u00fcnc\u00fc olarak ise; \u00e7ekme iste\u011fi tabanl\u0131 i\u015f ak\u0131\u015f\u0131, sistematik kod incelemeleri, denetim g\u00fcnl\u00fc\u011f\u00fc gibi g\u00fcvenli geli\u015ftirme uygulamalar\u0131n\u0131 hayata ge\u00e7ireceklerine s\u00f6z verdiler. Di\u011fer bir deyi\u015fle, olaydan \u00f6nce haftada y\u00fcz binlerce kez indirilen bir projede bu t\u00fcr \u00f6nlemler al\u0131nmam\u0131\u015ft\u0131.<\/p>\n<h2>Temmuz 2025: Bir kimlik av\u0131 sald\u0131r\u0131s\u0131 yoluyla bula\u015fm\u0131\u015f pop\u00fcler npm paketleri<\/h2>\n<p>Temmuz ay\u0131nda, <a href=\"https:\/\/www.theregister.com\/2025\/07\/24\/not_pretty_not_windowsonly_npm\/\" target=\"_blank\" rel=\"noopener nofollow\">npm paketleri<\/a> bir kez daha g\u00f6zde paketler oldu. Bunlar aras\u0131nda, haftada 2,7 milyon kez indirilen, yayg\u0131n olarak kullan\u0131lan ve k\u0131sa ve \u00f6z bir isme sahip \u201cis\u201d paketi de yer al\u0131yordu. Bu JavaScript yard\u0131mc\u0131 k\u00fct\u00fcphanesi, \u00e7ok \u00e7e\u015fitli t\u00fcr denetimi ve de\u011fer do\u011frulama i\u015flevleri sunar. Proje sahiplerinden birine y\u00f6nelik bir kimlik av\u0131 sald\u0131r\u0131s\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in sald\u0131rganlar, bu alandaki en eski numaray\u0131 ba\u015far\u0131yla kulland\u0131lar: <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/typosquatting\/\" target=\"_blank\" rel=\"noopener\">Yaz\u0131m hatas\u0131 avc\u0131l\u0131\u011f\u0131<\/a> (npmjs.com yerine npnjs.com alan ad\u0131n\u0131 kullanmak) ve resmi npm web sitesinin bir kopyas\u0131.<\/p>\n<p>Daha sonra ele ge\u00e7irdikleri hesab\u0131 kullanarak, i\u00e7ine yerle\u015fik arka kap\u0131 bulunan paketin kendi versiyonlar\u0131ndan birka\u00e7\u0131n\u0131 yay\u0131nlad\u0131lar. Vir\u00fcs alt\u0131 saat boyunca fark edilmeden kald\u0131. Bu s\u00fcre, \u00e7ok say\u0131da geli\u015ftiricinin zararl\u0131 npm paketlerini indirmesine yetecek kadar uzun bir zamand\u0131.<\/p>\n<p>Ayn\u0131 kimlik av\u0131 takti\u011fi di\u011fer geli\u015ftiricilere kar\u015f\u0131 da kullan\u0131ld\u0131. Sald\u0131rganlar, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/popular-npm-linter-packages-hijacked-via-phishing-to-drop-malware\/\" target=\"_blank\" rel=\"noopener nofollow\">k\u00f6t\u00fc ama\u00e7l\u0131 y\u00fcklerinin farkl\u0131 varyantlar\u0131n\u0131<\/a> yaymak i\u00e7in ele ge\u00e7irilmi\u015f birka\u00e7 geli\u015ftirici hesab\u0131n\u0131 kulland\u0131. Ayr\u0131ca, ele ge\u00e7irdikleri mallar\u0131n bir k\u0131sm\u0131n\u0131 gelecekteki sald\u0131r\u0131lar i\u00e7in saklam\u0131\u015f olabileceklerine dair g\u00fc\u00e7l\u00fc bir \u015f\u00fcphe var.<\/p>\n<h2>A\u011fustos 2025: Singularity sald\u0131r\u0131s\u0131 ve y\u00fczlerce geli\u015ftiricinin gizli bilgilerinin s\u0131zd\u0131r\u0131lmas\u0131<\/h2>\n<p>A\u011fustos ay\u0131n\u0131n sonlar\u0131nda, <a href=\"https:\/\/www.kaspersky.com\/blog\/nx-build-s1ngularity-supply-chain-attack\/54223\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201cs1ngularity\u201d olarak adland\u0131r\u0131lan bir olay<\/a>, JavaScript geli\u015ftiricilerini hedef alma e\u011filimini s\u00fcrd\u00fcrd\u00fc. Sald\u0131rganlar, pop\u00fcler bir derleme sistemi ve CI\/CD s\u00fcre\u00e7 optimizasyon arac\u0131 olan Nx\u2019i ele ge\u00e7irdi. Paketlere yerle\u015ftirilen k\u00f6t\u00fc ama\u00e7l\u0131 kod, vir\u00fcs bula\u015fm\u0131\u015f geli\u015ftirici sistemlerinde kripto c\u00fczdan anahtarlar\u0131, npm ve GitHub belirte\u00e7leri, SSH anahtarlar\u0131, API anahtarlar\u0131 ve daha pek \u00e7ok hassas veriyi arad\u0131.<\/p>\n<p>\u0130lgin\u00e7 bir \u015fekilde, sald\u0131rganlar kurbanlar\u0131n bilgisayarlar\u0131ndaki gizli bilgileri ele ge\u00e7irmek i\u00e7in Claude Code, Gemini CLI ve Amazon Q gibi yerel olarak y\u00fcklenmi\u015f yapay zeka ara\u00e7lar\u0131n\u0131 kulland\u0131lar. Bulduklar\u0131 her \u015fey daha sonra, kurbanlar\u0131n adlar\u0131na olu\u015fturulan ve \u201cs1ngularity-repository\u201d, \u201cs1ngularity-repository-0\u201d ve \u201cs1ngularity-repository-1\u201d ba\u015fl\u0131klar\u0131n\u0131 ta\u015f\u0131yan halka a\u00e7\u0131k GitHub depolar\u0131na y\u00fcklendi. Tahmin edebilece\u011finiz gibi, sald\u0131r\u0131n\u0131n ad\u0131 da buradan geliyor.<\/p>\n<p>Sonu\u00e7 olarak, y\u00fczlerce geli\u015ftiricinin ki\u015fisel verileri herkesin g\u00f6z\u00fc \u00f6n\u00fcnde kalm\u0131\u015f ve bu verilere sadece sald\u0131rganlar de\u011fil, internet ba\u011flant\u0131s\u0131 olan herkes eri\u015febilecek duruma gelmi\u015fti.<\/p>\n<h2>Eyl\u00fcl 2025: Haftada 2,6 milyar kez indirilen npm paketlerine bir kripto h\u0131rs\u0131z\u0131 sald\u0131rd\u0131<\/h2>\n<p>Npm paketlerine y\u00f6nelik g\u00fcvenlik ihlalleri e\u011filimi Eyl\u00fcl ay\u0131na da sarkt\u0131. JavaScript geli\u015ftiricilerini hedef alan yeni bir kimlik av\u0131 sald\u0131r\u0131 kampanyas\u0131n\u0131n ard\u0131ndan, sald\u0131rganlar birka\u00e7 d\u00fczine tan\u0131nm\u0131\u015f projeye k\u00f6t\u00fc ama\u00e7l\u0131 kod yerle\u015ftirebildi. Bunlardan baz\u0131lar\u0131, \u00f6zellikle \u201cchalk\u201d ve \u201cdebug\u201d, haftada <em>y\u00fcz milyonlarca<\/em> kez indiriliyor. Sald\u0131r\u0131 ger\u00e7ekle\u015fti\u011fi s\u0131rada, vir\u00fcs bula\u015fm\u0131\u015f paketlerin toplam indirilme say\u0131s\u0131 <a href=\"https:\/\/www.kaspersky.com\/blog\/npm-packages-trojanized\/54280\/\" target=\"_blank\" rel=\"noopener nofollow\">haftada 2,6 milyar\u0131n \u00fczerine<\/a> \u00e7\u0131km\u0131\u015ft\u0131 \u2014 ve o g\u00fcnden bu yana pop\u00fclerlikleri giderek artt\u0131.<\/p>\n<p>Y\u00fck, bir kripto h\u0131rs\u0131z\u0131yd\u0131: Kripto para i\u015flemlerini ele ge\u00e7irip sald\u0131rganlar\u0131n c\u00fczdanlar\u0131na y\u00f6nlendirmek \u00fczere tasarlanm\u0131\u015f bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131. Neyse ki, d\u00fcnyan\u0131n en pop\u00fcler projelerinden baz\u0131lar\u0131n\u0131 ba\u015far\u0131yla sabote etmelerine ra\u011fmen, sald\u0131rganlar bir \u015fekilde operasyonlar\u0131n\u0131n son a\u015famas\u0131n\u0131 mahvetmeyi ba\u015fard\u0131lar. Sonunda, sadece <a href=\"https:\/\/www.theregister.com\/2025\/09\/09\/npm_supply_chain_attack\/\" target=\"_blank\" rel=\"noopener nofollow\">925 $<\/a> ile ayr\u0131ld\u0131lar.<\/p>\n<p>Tam bir hafta sonra, bir ba\u015fka b\u00fcy\u00fck olay ya\u015fand\u0131: <a href=\"https:\/\/www.kaspersky.com\/blog\/tinycolor-shai-hulud-supply-chain-attack\/54315\/\" target=\"_blank\" rel=\"noopener nofollow\">Kendi kendine yay\u0131lan Shai-Hulud k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n\u0131n ilk dalgas\u0131,<\/a> CrowdStrike\u2019\u0131n projeleri de dahil olmak \u00fczere yakla\u015f\u0131k 150 npm paketini etkiledi. Ancak, birka\u00e7 ay sonra gelen ikinci dalga, \u00e7ok daha y\u0131k\u0131c\u0131 oldu. Yaz\u0131n\u0131n devam\u0131nda Great Worm\u2019a daha yak\u0131ndan bakaca\u011f\u0131z.<\/p>\n<h2>Ekim 2025: GlassWorm, Visual Studio Code ekosistemini ele ge\u00e7iriyor<\/h2>\n<p>Shai-Hulud sald\u0131r\u0131s\u0131ndan yakla\u015f\u0131k bir ay sonra, <a href=\"https:\/\/thehackernews.com\/2025\/10\/self-spreading-glassworm-infects-vs.html\" target=\"_blank\" rel=\"noopener nofollow\">GlassWorm<\/a> olarak adland\u0131r\u0131lan benzer bir kendi kendine yay\u0131lan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, hem Open VSX Registry hem de Microsoft Extension Marketplace\u2019teki Visual Studio Code uzant\u0131lar\u0131n\u0131 etkilemeye ba\u015flad\u0131. Sald\u0131rganlar, GitHub, Git, npm ve OpenVSX hesaplar\u0131n\u0131n yan\u0131 s\u0131ra kripto c\u00fczdan anahtarlar\u0131n\u0131 da hedef al\u0131yordu.<\/p>\n<p>GlassWorm\u2019un yarat\u0131c\u0131lar\u0131, komuta ve kontrol altyap\u0131lar\u0131nda son derece yarat\u0131c\u0131 bir yakla\u015f\u0131m benimsedi: Solana blok zincirindeki bir kripto c\u00fczdan\u0131n\u0131 birincil C2 olarak kulland\u0131lar ve Google Takvim\u2019i yedek ileti\u015fim kanal\u0131 olarak kulland\u0131lar.<\/p>\n<p>Sald\u0131rganlar; kurbanlar\u0131n kripto c\u00fczdanlar\u0131n\u0131 bo\u015falt\u0131p hesaplar\u0131n\u0131 ele ge\u00e7irerek solucan\u0131 daha da yaymakla kalmad\u0131lar, ayn\u0131 zamanda vir\u00fcs bula\u015fm\u0131\u015f cihazlara \u201cZombi\u201d adl\u0131 bir RAT yerle\u015ftirdiler ve bu sayede ele ge\u00e7irilen sistemler \u00fczerinde tam kontrol elde ettiler.<\/p>\n<h2>Kas\u0131m 2025: IndonesianFoods sald\u0131r\u0131 kampanyas\u0131 ve npm\u2019de 150.000 spam paketi<\/h2>\n<p>Kas\u0131m ay\u0131nda, npm kay\u0131t defterinde yeni bir sorun <a href=\"https:\/\/www.kaspersky.com\/blog\/indonesianfoods-npm-spam-campaign\/55453\/\" target=\"_blank\" rel=\"noopener nofollow\">ortaya \u00e7\u0131kt\u0131<\/a>. \u201cIndonesianFoods\u201d olarak adland\u0131r\u0131lan koordineli bir k\u00f6t\u00fc niyetli sald\u0131r\u0131 kampanyas\u0131 kapsam\u0131nda, sald\u0131rganlar kay\u0131t defterini on binlerce gereksiz paketle doldurdu.<\/p>\n<p>Buradaki temel ama\u00e7, a\u00e7\u0131k kaynakl\u0131 yaz\u0131l\u0131m geli\u015ftiricilerini \u00f6d\u00fcllendirmek \u00fczere tasarlanm\u0131\u015f bir blok zinciri platformu olan tea.xyz\u2019de, istatistikleri \u015fi\u015firmek ve belirte\u00e7 toplamak i\u00e7in sistemi suistimal etmekti. Bunu ba\u015farmak i\u00e7in sald\u0131rganlar, zul-<a href=\"https:\/\/en.wikipedia.org\/wiki\/Tapai\" target=\"_blank\" rel=\"noopener nofollow\">tapai9<\/a>-kyuki veya andi-<a href=\"https:\/\/en.wikipedia.org\/wiki\/Rendang\" target=\"_blank\" rel=\"noopener nofollow\">rendang<\/a>23-breki gibi Endonezya mutfa\u011f\u0131na at\u0131fta bulunan isimlere sahip, birbirine ba\u011fl\u0131 projelerden olu\u015fan devasa bir a\u011f kurdular.<\/p>\n<p>Bu sald\u0131r\u0131 kampanyas\u0131n\u0131n yarat\u0131c\u0131lar\u0131, hesaplar\u0131 ele ge\u00e7irme zahmetine girmedi. Asl\u0131nda, spam paketleri k\u00f6t\u00fc ama\u00e7l\u0131 bir i\u00e7erik bile bar\u0131nd\u0131rm\u0131yordu. Tabii, her yedi saniyede bir otomatik olarak yeni paketler olu\u015fturmak \u00fczere tasarlanm\u0131\u015f bir komut dosyas\u0131n\u0131 saymazsak. Bununla birlikte, bu olay npm altyap\u0131s\u0131n\u0131n b\u00fcy\u00fck \u00e7apl\u0131 spam sald\u0131r\u0131 kampanyalar\u0131na kar\u015f\u0131 ne kadar savunmas\u0131z oldu\u011funu a\u00e7\u0131k\u00e7a ortaya koydu.<\/p>\n<h2>Aral\u0131k 2025: Shai-Hulud 2.0 ve 400.000 geli\u015ftirici s\u0131rr\u0131n\u0131n s\u0131zd\u0131r\u0131lmas\u0131<\/h2>\n<p>Y\u0131l\u0131n en \u00f6nemli olay\u0131, sadece tedarik zinciri sald\u0131r\u0131lar\u0131 a\u00e7\u0131s\u0131ndan de\u011fil, muhtemelen t\u00fcm siber g\u00fcvenlik alan\u0131 a\u00e7\u0131s\u0131ndan da geli\u015ftiricileri hedef alan kendi kendine yay\u0131lan <a href=\"https:\/\/securelist.com\/shai-hulud-worm-infects-500-npm-packages-in-a-supply-chain-attack\/117547\/\" target=\"_blank\" rel=\"noopener\">Shai-Hulud<\/a> (Sha1-Hulud olarak da bilinir) adl\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131md\u0131.<\/p>\n<p>Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, daha \u00f6nce bahsetti\u011fimiz s1ngularity sald\u0131r\u0131s\u0131n\u0131n mant\u0131ksal bir devam\u0131 niteli\u011findeydi; o da sistemlerde her t\u00fcrl\u00fc gizli bilgiyi tar\u0131yor ve bunlar\u0131 a\u00e7\u0131k GitHub depolar\u0131nda yay\u0131nl\u0131yordu. Ancak Shai-Hulud, bu temel yap\u0131ya kendi kendine yay\u0131lma mekanizmas\u0131 ekledi. Solucan, halihaz\u0131rda ele ge\u00e7irilmi\u015f geli\u015ftiricilerin kontrol\u00fcndeki projelere, \u00e7al\u0131nan kimlik bilgilerini kullanarak bula\u015f\u0131yordu.<\/p>\n<p>Shai-Hulud\u2019un ilk dalgas\u0131 Eyl\u00fcl ay\u0131nda ortaya \u00e7\u0131kt\u0131 ve y\u00fczlerce npm paketini etkiledi. Ancak y\u0131l\u0131n sonlar\u0131na do\u011fru, <a href=\"https:\/\/securelist.com\/shai-hulud-2-0\/118214\/\" target=\"_blank\" rel=\"noopener\">Shai-Hulud 2.0<\/a> olarak adland\u0131r\u0131lan ikinci bir dalga geldi.<\/p>\n<p>Bu sefer, solucan silici i\u015fleviyle g\u00fcncellendi. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, vir\u00fcs bula\u015fm\u0131\u015f bir sistemde ge\u00e7erli npm veya GitHub belirte\u00e7lerini bulamad\u0131\u011f\u0131nda, kullan\u0131c\u0131 dosyalar\u0131n\u0131 silen y\u0131k\u0131c\u0131 bir y\u00fck\u00fc tetikledi.<\/p>\n<p>Sald\u0131r\u0131 sonucunda toplamda yakla\u015f\u0131k <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/shai-hulud-20-npm-malware-attack-exposed-up-to-400-000-dev-secrets\/\" target=\"_blank\" rel=\"noopener nofollow\">400.000 gizli bilgi<\/a> s\u0131zd\u0131r\u0131ld\u0131. \u015eunu belirtmek gerekir ki, t\u0131pk\u0131 s1ngularity vakas\u0131nda oldu\u011fu gibi, t\u00fcm bu hassas veriler, sald\u0131rganlar taraf\u0131ndan de\u011fil, herhangi bir ki\u015fi taraf\u0131ndan indirilebilecek \u015fekilde halka a\u00e7\u0131k depolara d\u00fc\u015fm\u00fc\u015ft\u00fcr. Ayr\u0131ca, bu sald\u0131r\u0131n\u0131n etkilerinin uzun bir s\u00fcre daha hissedilece\u011fi de son derece muhtemel.<\/p>\n<p>Shai-Hulud taraf\u0131ndan s\u0131zd\u0131r\u0131lan gizli bilgileri kullanan bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ilk teyit edilmi\u015f vakalar\u0131ndan biri, birka\u00e7 bin Trust Wallet kullan\u0131c\u0131s\u0131n\u0131 hedef alan bir kripto para h\u0131rs\u0131zl\u0131\u011f\u0131yd\u0131. Sald\u0131rganlar, Noel arifesinde bu gizli bilgileri kullanarak, yerle\u015fik bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/what-is-a-crypto-wallet-drainer\/12037\/\" target=\"_blank\" rel=\"noopener\">kripto para h\u0131rs\u0131zl\u0131\u011f\u0131<\/a> \u00f6zelli\u011fine sahip Trust Wallet uzant\u0131s\u0131n\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 bir s\u00fcr\u00fcm\u00fcn\u00fc Chrome Web Ma\u011fazas\u0131\u2019na y\u00fcklediler. Sonunda, 8,5 milyon dolarl\u0131k kripto paray\u0131 ele ge\u00e7irip ka\u00e7may\u0131 ba\u015fard\u0131lar.<\/p>\n<h2>Tedarik zinciri sald\u0131r\u0131lar\u0131na kar\u015f\u0131 nas\u0131l korunulur?<\/h2>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-in-2024\/52965\/\" target=\"_blank\" rel=\"noopener nofollow\">2024 y\u0131l\u0131 i\u00e7in benzer bir geriye d\u00f6n\u00fck de\u011ferlendirme<\/a> haz\u0131rlarken, \u201cbir ay, bir tehdit\u201d yap\u0131s\u0131na sad\u0131k kalman\u0131n olduk\u00e7a kolay oldu\u011funu g\u00f6rd\u00fck. Ancak 2025 i\u00e7in b\u00f6yle bir hedef \u00e7ok daha zorluydu. Ge\u00e7en y\u0131l o kadar \u00e7ok b\u00fcy\u00fck \u00e7apl\u0131 tedarik zinciri sald\u0131r\u0131s\u0131 ya\u015fand\u0131 ki, hepsini bu tek genel bak\u0131\u015fa s\u0131\u011fd\u0131rmam\u0131z m\u00fcmk\u00fcn olmad\u0131.<\/p>\n<p>2026 y\u0131l\u0131 da en az bu y\u0131l kadar yo\u011fun ge\u00e7ecek gibi g\u00f6r\u00fcn\u00fcyor; bu nedenle, <a href=\"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-what-are-they-and-how-to-manage-the-risk\/52852\/\" target=\"_blank\" rel=\"noopener nofollow\">tedarik zinciri sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemeye<\/a> y\u00f6nelik \u00f6zel yaz\u0131m\u0131z\u0131 okuman\u0131z\u0131 tavsiye ederiz. O zamana kadar, i\u015fte \u00f6ne \u00e7\u0131kan noktalar:<\/p>\n<ul>\n<li>Tedarik\u00e7ilerinizi kapsaml\u0131 bir \u015fekilde de\u011ferlendirin ve kendi projelerinize entegre etti\u011finiz kodlar\u0131 titizlikle denetleyin.<\/li>\n<li>Hizmet s\u00f6zle\u015fmelerinize s\u0131k\u0131 g\u00fcvenlik \u015fartlar\u0131n\u0131 do\u011frudan dahil edin.<\/li>\n<li>Kapsaml\u0131 bir olay m\u00fcdahale plan\u0131 haz\u0131rlay\u0131n.<\/li>\n<li>Bir <a href=\"https:\/\/www.kaspersky.com.tr\/next-xdr-optimum?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____838427475c1a389d\" target=\"_blank\" rel=\"noopener\">XDR \u00e7\u00f6z\u00fcm\u00fc <\/a> kullanarak kurumsal altyap\u0131n\u0131z\u0131 \u015f\u00fcpheli faaliyetlere kar\u015f\u0131 izleyin.<\/li>\n<li>\u015eirket i\u00e7i g\u00fcvenlik ekibinizin kapasitesi yetersizse, proaktif tehdit avc\u0131l\u0131\u011f\u0131 ve zaman\u0131nda m\u00fcdahale i\u00e7in <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">harici bir hizmetten faydalan\u0131n<\/a>.<\/li>\n<\/ul>\n<p>Tedarik zinciri sald\u0131r\u0131lar\u0131 hakk\u0131nda daha fazla bilgi edinmek istiyorsan\u0131z, <a href=\"https:\/\/kas.pr\/k8rs\" target=\"_blank\" rel=\"noopener\">Tedarik Zinciri Reaksiyonu: Kar\u015f\u0131l\u0131kl\u0131 Ba\u011f\u0131ml\u0131l\u0131k \u00c7a\u011f\u0131nda K\u00fcresel Dijital Ekosistemin G\u00fcvenli\u011fi<\/a> ba\u015fl\u0131kl\u0131 analiz raporumuzu okuyun. Bu rapor, teknik uzmanlar\u0131n g\u00f6r\u00fc\u015flerine dayanmaktad\u0131r ve kurulu\u015flar\u0131n tedarik zinciri ve g\u00fcvenilir ili\u015fkilerle ilgili risklerle ne s\u0131kl\u0131kla kar\u015f\u0131la\u015ft\u0131klar\u0131n\u0131, hangi alanlarda koruma eksiklikleri bulundu\u011funu ve bu t\u00fcr tehditlere kar\u015f\u0131 dayan\u0131kl\u0131l\u0131\u011f\u0131 art\u0131rmak i\u00e7in hangi stratejilerin uygulanmas\u0131 gerekti\u011fini ortaya koymaktad\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>2025 y\u0131l\u0131nda, bir \u00f6nceki y\u0131l oldu\u011fu gibi, tedarik zinciri sald\u0131r\u0131lar\u0131 kurulu\u015flar\u0131n kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu en \u00f6nemli tehditlerden biri olmaya devam etti. \u0130\u015fte ge\u00e7en y\u0131l\u0131n en dikkat \u00e7ekici olaylar\u0131n\u0131n \u00f6zeti.<\/p>\n","protected":false},"author":2726,"featured_media":14441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1781,2190,2855,2227,2228,790,2321,2856,901,1109,1611,1588,537],"class_list":{"0":"post-14440","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-acik-kaynak","11":"tag-arka-kapilar","12":"tag-bilgi-hirsizligi-yazilimlari","13":"tag-devops","14":"tag-gelistirme","15":"tag-guvenlik-aciklari","16":"tag-is-dunyasi","17":"tag-open-source","18":"tag-riskler","19":"tag-saldirilar","20":"tag-tedarik-zinciri","21":"tag-tedarik-zinciri-saldirisi","22":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/supply-chain-attacks-in-2025\/14440\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/supply-chain-attacks-in-2025\/31975\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/supply-chain-attacks-in-2025\/41594\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/supply-chain-attacks-in-2025\/55522\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/supply-chain-attacks-in-2025\/24864\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/supply-chain-attacks-in-2025\/33349\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/supply-chain-attacks-in-2025\/30458\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tedarik-zinciri-saldirisi\/","name":"Tedarik zinciri sald\u0131r\u0131s\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14440"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14440\/revisions"}],"predecessor-version":[{"id":14443,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14440\/revisions\/14443"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14441"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}