{"id":14504,"date":"2026-05-06T19:49:39","date_gmt":"2026-05-06T16:49:39","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14504"},"modified":"2026-05-06T19:49:39","modified_gmt":"2026-05-06T16:49:39","slug":"ios-macos-fake-crypto-apps","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ios-macos-fake-crypto-apps\/14504\/","title":{"rendered":"Kripto h\u0131rs\u0131zlar\u0131, Apple kullan\u0131c\u0131lar\u0131na y\u00f6nelik sald\u0131r\u0131lar\u0131n\u0131 art\u0131r\u0131yor"},"content":{"rendered":"<p>Kripto varl\u0131klar\u0131n\u0131z\u0131 bir so\u011fuk c\u00fczdanda sakl\u0131yor ve g\u00fcvenlik konusunda sa\u011flam bir \u00fcne sahip Apple cihazlar\u0131 kullan\u0131yor olsan\u0131z bile, siber su\u00e7lular paran\u0131z\u0131 \u00e7alman\u0131n bir yolunu bulabiliyorlar. Bu k\u00f6t\u00fc niyetli ki\u015filer, bilinen hileleri birle\u015ftirerek yeni sald\u0131r\u0131 zincirleri olu\u015fturuyorlar. Bunlardan biri de, kurbanlar\u0131 do\u011frudan App Store\u2019un i\u00e7inde tuza\u011fa d\u00fc\u015f\u00fcrmek.<\/p>\n<h2>Kripto c\u00fczdan klonlar\u0131<\/h2>\n<p>Ge\u00e7ti\u011fimiz Mart ay\u0131nda, \u00c7in App Store listelerinin en \u00fcst s\u0131ralar\u0131nda, pop\u00fcler kripto c\u00fczdan y\u00f6netim ara\u00e7lar\u0131n\u0131n simgelerini ve adlar\u0131n\u0131 taklit eden kimlik av\u0131 uygulamalar\u0131 tespit ettik. B\u00f6lgesel k\u0131s\u0131tlamalar nedeniyle \u00c7in App Store\u2019unda bir\u00e7ok resmi c\u00fczdan uygulamas\u0131na eri\u015fim engellendi\u011finden, sald\u0131rganlar bu bo\u015flu\u011fu doldurmak i\u00e7in devreye girdiler ve orijinallere benzeyen simgeler ve kas\u0131tl\u0131 yaz\u0131m hatalar\u0131 i\u00e7eren isimler kullanarak sahte uygulamalar olu\u015fturdular. B\u00f6ylece App Store\u2019un denetim s\u00fcrecini atlat\u0131p kullan\u0131c\u0131lar\u0131 kand\u0131rmay\u0131 ama\u00e7lad\u0131lar.<\/p>\n<div id=\"attachment_14507\" style=\"width: 1565px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06193758\/ios-macos-fake-crypto-apps-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14507\" class=\"wp-image-14507 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06193758\/ios-macos-fake-crypto-apps-01.jpg\" alt=\"App Store'da Ledger Wallet (eski ad\u0131yla Ledger Live) arama sonu\u00e7lar\u0131nda g\u00f6r\u00fcnen kimlik av\u0131 ama\u00e7l\u0131 uygulamalar\" width=\"1555\" height=\"752\"><\/a><p id=\"caption-attachment-14507\" class=\"wp-caption-text\">App Store\u2019da Ledger Wallet (eski ad\u0131yla Ledger Live) arama sonu\u00e7lar\u0131nda g\u00f6r\u00fcnen kimlik av\u0131 ama\u00e7l\u0131 uygulamalar<\/p><\/div>\n<p>Bunlar\u0131n yan\u0131 s\u0131ra, isimleri ve simgeleri kripto para birimleriyle hi\u00e7bir ilgisi olmayan bir dizi uygulama da bulduk. Ancak, tan\u0131t\u0131m afi\u015flerinde, bu uygulamalar\u0131n, b\u00f6lgesel App Store\u2019da bulunmayan resmi c\u00fczdan uygulamalar\u0131n\u0131 indirmek ve y\u00fcklemek i\u00e7in kullan\u0131labilece\u011fi iddia ediliyordu.<\/p>\n<div id=\"attachment_14509\" style=\"width: 1778px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06193833\/ios-macos-fake-crypto-apps-02-EN.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14509\" class=\"wp-image-14509 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06193833\/ios-macos-fake-crypto-apps-02-EN.jpg\" alt=\"Uygulama sayfalar\u0131ndaki, yerel App Store'da bulunmayan resmi TokenPocket uygulamas\u0131n\u0131 indirmek i\u00e7in kullan\u0131labilece\u011fini iddia eden reklamlar\" width=\"1768\" height=\"1409\"><\/a><p id=\"caption-attachment-14509\" class=\"wp-caption-text\">Uygulama sayfalar\u0131ndaki, yerel App Store\u2019da bulunmayan resmi TokenPocket uygulamas\u0131n\u0131 indirmek i\u00e7in kullan\u0131labilece\u011fini iddia eden reklamlar<\/p><\/div>\n<p>Toplamda, a\u015fa\u011f\u0131daki pop\u00fcler c\u00fczdanlar\u0131 taklit eden 26 adet kimlik av\u0131 uygulamas\u0131 tespit ettik:<\/p>\n<ul>\n<li>MetaMask<\/li>\n<li>Ledger<\/li>\n<li>Trust Wallet<\/li>\n<li>Coinbase<\/li>\n<li>TokenPocket<\/li>\n<li>imToken<\/li>\n<li>Bitpie<\/li>\n<\/ul>\n<p>Di\u011fer birka\u00e7 benzer uygulama hen\u00fcz kimlik av\u0131 i\u015flevselli\u011fi i\u00e7ermese de t\u00fcm i\u015faretler bunlar\u0131n ayn\u0131 sald\u0131rganlarla ba\u011flant\u0131l\u0131 oldu\u011funa i\u015faret ediyor. B\u00fcy\u00fck olas\u0131l\u0131kla gelecekteki g\u00fcncellemelerde k\u00f6t\u00fc ama\u00e7l\u0131 \u00f6zellikler eklemeyi planl\u0131yorlar.<\/p>\n<p>Bu uygulamalar\u0131n App Store\u2019da onaylanabilmesi i\u00e7in geli\u015ftiriciler; oyun, hesap makinesi veya g\u00f6rev planlay\u0131c\u0131 gibi temel i\u015flevler eklemi\u015fler.<\/p>\n<p>Bu klonlardan herhangi birini y\u00fcklemek, kripto varl\u0131klar\u0131n\u0131z\u0131 kaybetmenin ilk ad\u0131m\u0131. Uygulamalar\u0131n kendisi kripto para, kurtarma ifadesi veya parola \u00e7alm\u0131yor olsa da resmi App Store\u2019da yer almalar\u0131 sayesinde kullan\u0131c\u0131lar\u0131n g\u00fcvenini kazanan birer yem g\u00f6revi g\u00f6r\u00fcyorlar. Ancak uygulama y\u00fcklendikten ve ba\u015flat\u0131ld\u0131ktan sonra, kurban\u0131n taray\u0131c\u0131s\u0131nda App Store\u2019a benzeyecek \u015fekilde tasarlanm\u0131\u015f bir kimlik av\u0131 sitesi a\u00e7\u0131l\u0131yor ve bu site, kullan\u0131c\u0131dan ilgili kripto c\u00fczdan\u0131n\u0131n g\u00fcvenli\u011fi ihlal edilmi\u015f bir s\u00fcr\u00fcm\u00fcn\u00fc y\u00fcklemesini istiyor. Sald\u0131rganlar, her biri belirli bir c\u00fczdana \u00f6zel olarak tasarlanm\u0131\u015f bu zararl\u0131 mod\u00fcllerin bir\u00e7ok s\u00fcr\u00fcm\u00fcn\u00fc olu\u015fturmu\u015flar. Bu sald\u0131r\u0131n\u0131n ayr\u0131nt\u0131l\u0131 teknik analizini <a href=\"https:\/\/securelist.com\/fakewallet-cryptostealer-ios-app-store\/119474\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a> yaz\u0131m\u0131zda bulabilirsiniz.<\/p>\n<p>Bu tuza\u011fa d\u00fc\u015fen kurbandan, \u00f6ncelikle bir provizyon profili y\u00fcklemesi isteniyor. Bu profil, uygulamalar\u0131n App Store d\u0131\u015f\u0131ndan bir iPhone\u2019a y\u00fcklenmesine olanak tan\u0131yor. Bu profil daha sonra k\u00f6t\u00fc ama\u00e7l\u0131 uygulaman\u0131n kendisini y\u00fcklemek i\u00e7in kullan\u0131l\u0131yor.<\/p>\n<div id=\"attachment_14510\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06193905\/ios-macos-fake-crypto-apps-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14510\" class=\"wp-image-14510 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06193905\/ios-macos-fake-crypto-apps-03.jpg\" alt=\"Kullan\u0131c\u0131y\u0131 Ledger Wallet k\u0131l\u0131\u011f\u0131na girmi\u015f bir uygulamay\u0131 y\u00fcklemeye y\u00f6nlendiren sahte bir App Store sitesi\" width=\"591\" height=\"1156\"><\/a><p id=\"caption-attachment-14510\" class=\"wp-caption-text\">Kullan\u0131c\u0131y\u0131 Ledger Wallet k\u0131l\u0131\u011f\u0131na girmi\u015f bir uygulamay\u0131 y\u00fcklemeye y\u00f6nlendiren sahte bir App Store sitesi<\/p><\/div>\n<p>Yukar\u0131daki \u00f6rnekte, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, Truva at\u0131 i\u015flevselli\u011fi eklenmi\u015f orijinal Ledger uygulamas\u0131 \u00fczerine geli\u015ftirilmi\u015f. Uygulama orijinaliyle tamamen ayn\u0131 g\u00f6r\u00fcn\u00fcyor, ancak bir donan\u0131m c\u00fczdan\u0131na ba\u011fland\u0131\u011f\u0131nda, s\u00f6zde eri\u015fimi geri y\u00fcklemek amac\u0131yla bir kurtarma ifadesi girilmesini isteyen bir pencere a\u00e7\u0131yor. Bu standart bir prosed\u00fcr de\u011fil: Genellikle sadece bir PIN girmeniz gerekir, asla kurtarma ifadesi girmeniz gerekmez. Ma\u011fdur, uygulaman\u0131n g\u00f6r\u00fcn\u00fcrdeki me\u015fruiyetine kanarak kurtarma ifadesini girerse, bu ifade an\u0131nda sald\u0131rganlar\u0131n sunucusuna g\u00f6nderilir ve bu sayede sald\u0131rganlar ma\u011fdurun kripto varl\u0131klar\u0131na tam eri\u015fim hakk\u0131 elde ederler.<\/p>\n<h2>App Store d\u0131\u015f\u0131nda uygulama y\u00fckleme<\/h2>\n<p>Bu plan\u0131n en \u00f6nemli unsurlar\u0131ndan biri, App Store\u2019u ve onun do\u011frulama s\u00fcrecini atlayarak kurban\u0131n iPhone\u2019una k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fcklemektir. Bu, daha \u00f6nce ke\u015ffetti\u011fimiz <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-stealer-sparkkitty\/13490\/\" target=\"_blank\" rel=\"noopener\">SparkKitty iOS bilgi h\u0131rs\u0131z\u0131<\/a> ile b\u00fcy\u00fck \u00f6l\u00e7\u00fcde benzer \u015fekilde \u00e7al\u0131\u015f\u0131r. Sald\u0131rganlar, <a href=\"https:\/\/developer.apple.com\/programs\/enterprise\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">Apple Developer Enterprise Program<\/a>\u2018\u0131na eri\u015fim sa\u011flamay\u0131 ba\u015fard\u0131lar. Y\u0131ll\u0131k sadece 299 $ kar\u015f\u0131l\u0131\u011f\u0131nda (ve bir g\u00f6r\u00fc\u015fme ile kurumsal do\u011frulama s\u00fcrecinin ard\u0131ndan), bu program kurulu\u015flar\u0131n kendi yap\u0131land\u0131rma profillerini ve uygulamalar\u0131n\u0131 App Store\u2019da yay\u0131nlamadan do\u011frudan kullan\u0131c\u0131 cihazlar\u0131na indirilebilecek \u015fekilde sunmalar\u0131na olanak tan\u0131r.<\/p>\n<div id=\"attachment_14511\" style=\"width: 601px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06194311\/ios-macos-fake-crypto-apps-04.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14511\" class=\"wp-image-14511 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06194311\/ios-macos-fake-crypto-apps-04.jpg\" alt=\"Uygulamay\u0131 y\u00fcklemek i\u00e7in, kurban\u0131n \u00f6ncelikle k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n App Store'u atlayarak do\u011frudan indirilmesini sa\u011flayan bir yap\u0131land\u0131rma profilini y\u00fcklemesi gerekir. Ye\u015fil onay i\u015faretine dikkat edin\" width=\"591\" height=\"760\"><\/a><p id=\"caption-attachment-14511\" class=\"wp-caption-text\">Uygulamay\u0131 y\u00fcklemek i\u00e7in, kurban\u0131n \u00f6ncelikle k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n App Store\u2019u atlayarak do\u011frudan indirilmesini sa\u011flayan bir yap\u0131land\u0131rma profilini y\u00fcklemesi gerekir. Ye\u015fil onay i\u015faretine dikkat edin<\/p><\/div>\n<p>Genel olarak, kurumsal profiller, kurulu\u015flar\u0131n \u00e7al\u0131\u015fanlar\u0131n cihazlar\u0131na \u015firket i\u00e7i uygulamalar\u0131 y\u00fcklemelerine olanak sa\u011flamak \u00fczere tasarlanm\u0131\u015ft\u0131r. Bu uygulamalar App Store\u2019da yay\u0131nlanmas\u0131na gerek yoktur ve s\u0131n\u0131rs\u0131z say\u0131da cihaza y\u00fcklenebilir. Ne yaz\u0131k ki, bu \u00f6zellik s\u0131kl\u0131kla k\u00f6t\u00fcye kullan\u0131lmaktad\u0131r. Bu profiller, \u00e7evrimi\u00e7i kumarhaneler, korsan modlar ve tabii ki k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar gibi Apple\u2019\u0131n ilkelere uymayan yaz\u0131l\u0131mlar i\u00e7in s\u0131kl\u0131kla kullan\u0131l\u0131r.<\/p>\n<p>\u0130\u015fte tam da bu nedenle, Apple Store\u2019u taklit eden sahte site, kullan\u0131c\u0131dan bir yap\u0131land\u0131rma profili y\u00fcklemesini istiyor ve ancak bu profil ile imzalanm\u0131\u015f uygulamay\u0131 sunuyor.<\/p>\n<h2>macOS uygulamalar\u0131 ve uzant\u0131lar\u0131 arac\u0131l\u0131\u011f\u0131yla kripto para \u00e7almak<\/h2>\n<p>Bir\u00e7ok kripto para sahibi, c\u00fczdanlar\u0131n\u0131 ak\u0131ll\u0131 telefon yerine bilgisayardan y\u00f6netmeyi tercih eder ve bu i\u015f i\u00e7in genellikle Mac bilgisayarlar\u0131 se\u00e7er. Bu durumda, en yayg\u0131n macOS bilgi h\u0131rs\u0131zlar\u0131n\u0131n bir \u015fekilde kripto c\u00fczdan verilerini hedef almas\u0131 hi\u00e7 de \u015fa\u015f\u0131rt\u0131c\u0131 de\u011fildir. Ancak son zamanlarda yeni bir k\u00f6t\u00fc niyetli taktik yayg\u0131nla\u015fmaya ba\u015flad\u0131: Sald\u0131rganlar, kaydedilmi\u015f verileri \u00e7alman\u0131n yan\u0131 s\u0131ra, kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131nda halihaz\u0131rda y\u00fckl\u00fc olan yasal c\u00fczdan uygulamalar\u0131na do\u011frudan kimlik av\u0131 pencereleri yerle\u015ftiriyorlar. Bu y\u0131l\u0131n ba\u015flar\u0131nda, <a href=\"https:\/\/www.cloudsek.com\/blog\/inside-macsyncs-script-driven-stealer-and-hardware-wallet-app-trojanization\" target=\"_blank\" rel=\"noopener nofollow\">MacSync bilgi h\u0131rs\u0131z\u0131<\/a> bu \u00f6zelli\u011fi benimsedi. <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-clickfix\/53348\/\" target=\"_blank\" rel=\"noopener nofollow\">ClickFix sald\u0131r\u0131lar\u0131 yoluyla sistemlere s\u0131zan<\/a> bilgi h\u0131rs\u0131z\u0131; yaz\u0131l\u0131m arayan kullan\u0131c\u0131lar\u0131, Terminal\u2019de komutlar \u00e7al\u0131\u015ft\u0131rarak uygulamay\u0131 y\u00fcklemeleri y\u00f6n\u00fcnde sahte talimatlar i\u00e7eren sahte sitelere y\u00f6nlendirir. Bu i\u015flem, Chrome\u2019da kaydedilmi\u015f parolalar\u0131 ve \u00e7erezleri, pop\u00fcler mesajla\u015fma uygulamalar\u0131ndaki sohbetleri ve taray\u0131c\u0131 tabanl\u0131 kripto c\u00fczdan eklentilerindeki verileri toplayan bilgi h\u0131rs\u0131z\u0131n\u0131 \u00e7al\u0131\u015ft\u0131r\u0131r.<\/p>\n<p>Ama en ilgin\u00e7 k\u0131sm\u0131, bundan sonra olanlar. Ma\u011fdurun cihaz\u0131nda halihaz\u0131rda yasal bir Trezor veya Ledger uygulamas\u0131 y\u00fckl\u00fc ise, bilgi h\u0131rs\u0131z\u0131 ek mod\u00fcller indirir ve\u2026 uygulaman\u0131n baz\u0131 b\u00f6l\u00fcmlerini kendi trojan koduyla de\u011fi\u015ftirir. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m daha sonra de\u011fi\u015ftirilen dosyay\u0131 yeniden imzalar; b\u00f6ylece bu \u201cd\u00fczeltmeler\u201d yap\u0131ld\u0131ktan sonra Gatekeeper (macOS\u2019ta yerle\u015fik bir koruma mekanizmas\u0131), kullan\u0131c\u0131dan ek izin talebinde bulunmadan uygulaman\u0131n \u00e7al\u0131\u015fmas\u0131na izin verir. Bu y\u00f6ntem her zaman i\u015fe yaramasa da, pop\u00fcler <a href=\"https:\/\/www.kaspersky.com\/blog\/electron-framework-security-issues\/49035\/\" target=\"_blank\" rel=\"noopener nofollow\">Electron \u00e7er\u00e7evesine<\/a> dayal\u0131 daha basit uygulamalar i\u00e7in etkilidir.<\/p>\n<div id=\"attachment_14512\" style=\"width: 1062px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06194340\/ios-macos-fake-crypto-apps-05.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-14512\" class=\"wp-image-14512 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2026\/05\/06194340\/ios-macos-fake-crypto-apps-05.jpg\" alt=\"Truva at\u0131 bula\u015fm\u0131\u015f uygulama, kullan\u0131c\u0131dan c\u00fczdan\u0131n\u0131n kurtarma ifadesini girmesini ister\" width=\"1052\" height=\"602\"><\/a><p id=\"caption-attachment-14512\" class=\"wp-caption-text\">Truva at\u0131 bula\u015fm\u0131\u015f uygulama, kullan\u0131c\u0131dan c\u00fczdan\u0131n\u0131n kurtarma ifadesini girmesini ister<\/p><\/div>\n<p>Trojan bula\u015fm\u0131\u015f uygulama a\u00e7\u0131ld\u0131\u011f\u0131nda, sahte bir hata mesaj\u0131 g\u00f6stererek bir \u201ckurtarma i\u015flemi\u201d ba\u015flat\u0131r ve kullan\u0131c\u0131dan c\u00fczdan kurtarma ifadesini girmesini ister.<\/p>\n<p>MacSync\u2019in yan\u0131 s\u0131ra, di\u011fer pop\u00fcler macOS bilgi h\u0131rs\u0131z\u0131 yaz\u0131l\u0131mlar\u0131n\u0131n geli\u015ftiricileri de ayn\u0131 trojanla\u015ft\u0131rma y\u00f6ntemini benimsemi\u015ftir. Daha \u00f6nce, <a href=\"https:\/\/securelist.com\/new-macos-backdoor-crypto-stealer\/111778\/\" target=\"_blank\" rel=\"noopener\">Exodus ve Bitcoin-Qt c\u00fczdanlar\u0131n\u0131 ele ge\u00e7irmek i\u00e7in kullan\u0131lan benzer bir mekanizman\u0131n<\/a> ayr\u0131nt\u0131lar\u0131n\u0131 a\u00e7\u0131klam\u0131\u015ft\u0131k.<\/p>\n<h2>Kripto varl\u0131klar\u0131n\u0131z\u0131 nas\u0131l g\u00fcvende tutabilirsiniz?<\/h2>\n<p>Sald\u0131rganlar defalarca, hi\u00e7bir cihaz\u0131n ger\u00e7ekten yenilmez olmad\u0131\u011f\u0131n\u0131 kan\u0131tlam\u0131\u015ft\u0131r. \u00c7ok say\u0131da yaz\u0131l\u0131m geli\u015ftirici ve kripto para kullan\u0131c\u0131s\u0131n\u0131n macOS ve iOS\u2019u tercih etmesi nedeniyle, siber su\u00e7lular her iki platform i\u00e7in de end\u00fcstriyel \u00f6l\u00e7ekte sald\u0131r\u0131lar tasarlay\u0131p hayata ge\u00e7irmi\u015ftir. G\u00fcvenli kalmak, \u015f\u00fcphecilik ve uyan\u0131kl\u0131kla desteklenen \u00e7ok katmanl\u0131 bir savunma gerektirir.<\/p>\n<ul>\n<li>Uygulamalar\u0131 yaln\u0131zca g\u00fcvenilir kaynaklardan; ya geli\u015ftiricinin resmi web sitesinden ya da App Store sayfas\u0131ndan, indirin. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar resmi uygulama ma\u011fazalar\u0131na bile s\u0131zabilece\u011finden, uygulaman\u0131n yay\u0131nc\u0131s\u0131n\u0131 her zaman kontrol edin.<\/li>\n<li>Uygulaman\u0131n puan\u0131n\u0131, yay\u0131n tarihini ve indirme say\u0131s\u0131n\u0131 kontrol edin.<\/li>\n<li>Yorumlar\u0131 okuyun, \u00f6zellikle de olumsuz olanlar\u0131. Yorumlar\u0131 tarihe g\u00f6re s\u0131ralay\u0131n ve en son s\u00fcr\u00fcm\u00fc de\u011ferlendirin. Sald\u0131rganlar genellikle, y\u00fcksek puanlar alan tamamen masum bir uygulama ile i\u015fe ba\u015flar ve daha sonraki bir g\u00fcncellemede k\u00f6t\u00fc ama\u00e7l\u0131 i\u015flevler eklerler.<\/li>\n<li>Komutlar\u0131n ne i\u015fe yarad\u0131\u011f\u0131ndan %100 emin olmad\u0131k\u00e7a, bunlar\u0131 asla Terminal\u2019e kopyalay\u0131p yap\u0131\u015ft\u0131rmay\u0131n. Genellikle Claude Code veya OpenClaw gibi <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/fake-ai-agents-infostealers\/14390\/\" target=\"_blank\" rel=\"noopener\">yapay zeka uygulamalar\u0131n\u0131n<\/a> y\u00fckleme ad\u0131mlar\u0131 k\u0131l\u0131\u011f\u0131na giren bu sald\u0131r\u0131lar, son zamanlarda olduk\u00e7a yayg\u0131n hale geldiler.<\/li>\n<li>T\u00fcm bilgisayarlar\u0131n\u0131zda ve ak\u0131ll\u0131 telefonlar\u0131n\u0131zda kapsaml\u0131 bir g\u00fcvenlik sistemi kullan\u0131n. Biz <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0\u00f6neriyoruz. Bu, kimlik av\u0131 sitelerini ziyaret etme veya zararl\u0131 uygulamalar\u0131 y\u00fckleme riskini b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalt\u0131r.<\/li>\n<li>Kurtarma ifadenizi asla bir donan\u0131m c\u00fczdan\u0131 uygulamas\u0131na, bir web sitesine veya bir sohbet ortam\u0131na girmeyin. Yeni bir c\u00fczdana ge\u00e7i\u015f yaparken, uygulamalar\u0131 yeniden y\u00fcklerken veya bir c\u00fczdan\u0131 kurtar\u0131rken, kurtarma ifadesi <strong>yaln\u0131zca donan\u0131m cihaz\u0131n\u0131n kendisinde girilmelidir<\/strong>, asla mobil veya masa\u00fcst\u00fc uygulamalar\u0131nda girilmemelidir.<\/li>\n<li>Adres de\u011fi\u015ftirme sald\u0131r\u0131lar\u0131n\u0131 \u00f6nlemek i\u00e7in her zaman donan\u0131m c\u00fczdan\u0131n\u0131n ekran\u0131nda al\u0131c\u0131n\u0131n adresini kontrol edin.<\/li>\n<li>Kurtarma ifadelerinizi m\u00fcmk\u00fcn olan en g\u00fcvenli \u015fekilde; \u00f6rne\u011fin <a href=\"https:\/\/coincodex.com\/article\/23147\/best-metal-crypto-wallets-for-seed-phrase-storage\/\" target=\"_blank\" rel=\"noopener nofollow\">metal bir levha \u00fczerinde<\/a> veya bir kasa i\u00e7indeki m\u00fch\u00fcrl\u00fc bir zarf\u0131n i\u00e7inde saklay\u0131n. Bunlar\u0131 bilgisayarda saklamamak en iyisidir, ancak ba\u015fka se\u00e7ene\u011finiz yoksa <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>\u00a0gibi g\u00fcvenli ve \u015fifreli bir kasa kullan\u0131n.<\/li>\n<\/ul>\n<p>H\u00e2l\u00e2 Apple cihazlar\u0131n\u0131n kusursuz oldu\u011funa m\u0131 inan\u0131yorsunuz? A\u015fa\u011f\u0131dakileri okurken bir kez daha d\u00fc\u015f\u00fcn\u00fcn:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/55622\/\" target=\"_blank\" rel=\"noopener nofollow\">iPhone art\u0131k yenilmez de\u011fil: DarkSword ve Coruna\u2019ya bir bak\u0131\u015f<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/55463\/\" target=\"_blank\" rel=\"noopener nofollow\">Predator ve iPhone: G\u00f6r\u00fcnmez g\u00f6zetleme sanat\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/whisperpair-blueooth-headset-location-tracking\/14210\/\" target=\"_blank\" rel=\"noopener\">Bluetooth kulakl\u0131klar\u0131n\u0131z sizi g\u00f6zetliyor mu?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/13376\/\" target=\"_blank\" rel=\"noopener\">AirBorne: AirPlay\u2019deki g\u00fcvenlik a\u00e7\u0131klar\u0131 \u00fczerinden Apple cihazlar\u0131na sald\u0131r\u0131lar<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/banshee-stealer-targets-macos-users\/13135\/\" target=\"_blank\" rel=\"noopener\">Banshee: macOS kullan\u0131c\u0131lar\u0131n\u0131 hedef alan bir h\u0131rs\u0131zl\u0131k<\/a><\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"premium-geek\" value=\"13108\">\n","protected":false},"excerpt":{"rendered":"<p>Resmi App Store&#8217;da, pop\u00fcler kripto c\u00fczdanlar\u0131n\u0131 taklit eden iki d\u00fczineden fazla kimlik av\u0131 uygulamas\u0131 tespit ettik. \u0130\u015fte iPhone ve Mac kullan\u0131c\u0131lar\u0131n\u0131 ve kripto varl\u0131klar\u0131n\u0131 hedef alan yeni sald\u0131r\u0131 dalgalar\u0131n\u0131n ayr\u0131nt\u0131lar\u0131.<\/p>\n","protected":false},"author":2749,"featured_media":14505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[14,2786,2797,612,750,2628,1500,1170,537,1986],"class_list":{"0":"post-14504","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-bilgi-hirsizlari","10":"tag-clickfix","11":"tag-dolandiricilik","12":"tag-ios","13":"tag-kripto-cuzdanlari","14":"tag-kripto-para-birimleri","15":"tag-macos","16":"tag-tehditler","17":"tag-truva-atlari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-macos-fake-crypto-apps\/14504\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-macos-fake-crypto-apps\/30449\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-macos-fake-crypto-apps\/25495\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-macos-fake-crypto-apps\/30293\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-macos-fake-crypto-apps\/41766\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-macos-fake-crypto-apps\/55665\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-macos-fake-crypto-apps\/30602\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-macos-fake-crypto-apps\/36180\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-macos-fake-crypto-apps\/35831\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2749"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14504"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14504\/revisions"}],"predecessor-version":[{"id":14508,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14504\/revisions\/14508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14505"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}