{"id":14514,"date":"2026-05-08T22:14:32","date_gmt":"2026-05-08T19:14:32","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=14514"},"modified":"2026-05-08T22:14:32","modified_gmt":"2026-05-08T19:14:32","slug":"ios-exploits-darksword-and-coruna-in-mass-attacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/14514\/","title":{"rendered":"iPhone art\u0131k yenilmez de\u011fil: DarkSword ve Coruna&#8217;ya bir bak\u0131\u015f"},"content":{"rendered":"<p>DarkSword ve Coruna, iOS cihazlar\u0131na y\u00f6nelik g\u00f6r\u00fcnmez sald\u0131r\u0131lar i\u00e7in geli\u015ftirilmi\u015f iki yeni ara\u00e7t\u0131r. Bu sald\u0131r\u0131lar kullan\u0131c\u0131 m\u00fcdahalesi gerektirmez ve k\u00f6t\u00fc niyetli ki\u015filer taraf\u0131ndan halihaz\u0131rda aktif olarak kullan\u0131lmaktad\u0131r. Bu tehditler ortaya \u00e7\u0131kmadan \u00f6nce, \u00e7o\u011fu iPhone kullan\u0131c\u0131s\u0131 veri g\u00fcvenli\u011fi konusunda endi\u015felenmek zorunda kalmazd\u0131. G\u00fcvenlik konusu, asl\u0131nda yaln\u0131zca siyaset\u00e7iler, aktivistler, diplomatlar, \u00fcst d\u00fczey i\u015f adamlar\u0131 ve son derece hassas verilerle u\u011fra\u015fan di\u011fer ki\u015filer gibi, yabanc\u0131 istihbarat te\u015fkilatlar\u0131n\u0131n ilgisini \u00e7ekebilecek dar bir grup i\u00e7in \u00f6nemli bir sorundu. Daha \u00f6nce bu t\u00fcr gruplara kar\u015f\u0131 kullan\u0131lan <a href=\"https:\/\/www.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/55463\/\" target=\"_blank\" rel=\"noopener nofollow\">geli\u015fmi\u015f casus yaz\u0131l\u0131mlar\u0131n\u0131<\/a> ele alm\u0131\u015ft\u0131k ve bu ara\u00e7lar\u0131n ne kadar zor bulunur oldu\u011funu belirtmi\u015ftik.<\/p>\n<p>Ancak, ara\u015ft\u0131rmac\u0131lar taraf\u0131ndan bu y\u0131l\u0131n ba\u015flar\u0131nda ke\u015ffedilen DarkSword ve Coruna, oyunun kurallar\u0131n\u0131 tamamen de\u011fi\u015ftiren unsurlar. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar, s\u0131radan kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131n\u0131 toplu olarak enfekte etmek i\u00e7in kullan\u0131l\u0131yor. Bu yaz\u0131da; bu de\u011fi\u015fimin neden ger\u00e7ekle\u015fti\u011fini, bu ara\u00e7lar\u0131n neden bu kadar tehlikeli olduklar\u0131n\u0131 ve kendinizi nas\u0131l koruyabilece\u011finizi ele al\u0131yoruz.<\/p>\n<h2>DarkSword hakk\u0131nda bildiklerimiz ve bu yaz\u0131l\u0131m\u0131n iPhone\u2019unuzu nas\u0131l hedef alabilece\u011fi<\/h2>\n<p>2026 y\u0131l\u0131n\u0131n Mart ay\u0131 ortas\u0131nda, \u00fc\u00e7 ayr\u0131 ara\u015ft\u0131rma ekibi, DarkSword adl\u0131 <a href=\"https:\/\/www.wired.com\/story\/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild\/\" target=\"_blank\" rel=\"noopener nofollow\">yeni bir casus yaz\u0131l\u0131m t\u00fcr\u00fcyle ilgili bulgular\u0131n\u0131<\/a> e\u015f zamanl\u0131 olarak yay\u0131nlad\u0131. Bu ara\u00e7, kullan\u0131c\u0131 hi\u00e7bir \u015feyin ters gitti\u011fini fark etmeden iOS 18 \u00e7al\u0131\u015ft\u0131ran cihazlar\u0131 gizlice ele ge\u00e7irebiliyor.<\/p>\n<p>\u00d6ncelikle, bir kar\u0131\u015f\u0131kl\u0131\u011f\u0131 giderelim: iOS 18, san\u0131ld\u0131\u011f\u0131 kadar eski bir s\u00fcr\u00fcm de\u011fil. <a href=\"https:\/\/tr.wikipedia.org\/wiki\/%C4%B0OS_26\" target=\"_blank\" rel=\"noopener nofollow\">En son s\u00fcr\u00fcm iOS 26 olmas\u0131na ra\u011fmen<\/a>, Apple k\u0131sa s\u00fcre \u00f6nce s\u00fcr\u00fcm numaraland\u0131rma sistemini ba\u015ftan a\u015fa\u011f\u0131 yeniledi ve bu durum herkesi \u015fa\u015fk\u0131na \u00e7evirdi: \u0130\u015fletim sistemi numaras\u0131n\u0131n y\u0131l ile uyumlu olmas\u0131 i\u00e7in sekiz s\u00fcr\u00fcm atlayarak 18\u2019den 26\u2019ya ge\u00e7meye karar verdiler. Bu s\u0131\u00e7ramaya ra\u011fmen Apple, <a href=\"https:\/\/developer.apple.com\/support\/app-store\/\" target=\"_blank\" rel=\"noopener nofollow\">t\u00fcm aktif cihazlar\u0131n yakla\u015f\u0131k d\u00f6rtte birinin h\u00e2l\u00e2 iOS 18 veya daha eski bir s\u00fcr\u00fcm\u00fc kulland\u0131\u011f\u0131n\u0131<\/a> tahmin ediyor.<\/p>\n<p>Bu konuyu a\u00e7\u0131kl\u0131\u011fa kavu\u015fturduktan sonra, DarkSword\u2019a geri d\u00f6nelim. Ara\u015ft\u0131rmalar, bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n, kurbanlar\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 kod yerle\u015ftirilmi\u015f tamamen yasal web sitelerini ziyaret ettiklerinde sistemlerine bula\u015ft\u0131\u011f\u0131n\u0131 g\u00f6stermektedir. Casus yaz\u0131l\u0131m, kullan\u0131c\u0131yla hi\u00e7bir etkile\u015fim kurmadan kendi kendine y\u00fcklenir; tek yapman\u0131z gereken, g\u00fcvenli\u011fi ihlal edilmi\u015f bir sayfaya girmektir. Buna, s\u0131f\u0131r t\u0131klama bula\u015fma tekni\u011fi denir. Ara\u015ft\u0131rmac\u0131lar, bu yolla halihaz\u0131rda birka\u00e7 bin cihaz\u0131n sald\u0131r\u0131ya u\u011frad\u0131\u011f\u0131n\u0131 bildiriyor.<\/p>\n<p>DarkSword, bir cihaz\u0131 ele ge\u00e7irmek i\u00e7in alt\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan olu\u015fan bir k\u00f6t\u00fcye kullan\u0131m zinciri kullanarak sanal ortamdan ka\u00e7ar, ayr\u0131cal\u0131klar\u0131n\u0131 y\u00fckseltir ve kod \u00e7al\u0131\u015ft\u0131r\u0131r. Sistem i\u00e7ine girdikten sonra, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m vir\u00fcs bula\u015fm\u0131\u015f cihazdan \u015fu verileri toplar:<\/p>\n<ul>\n<li>Parolalar<\/li>\n<li>Foto\u011fraflar<\/li>\n<li>iMessage, WhatsApp ve Telegram\u2019dan al\u0131nan sohbetler ve veriler<\/li>\n<li>Taray\u0131c\u0131 ge\u00e7mi\u015fi<\/li>\n<li>Apple\u2019\u0131n Takvim, Notlar ve Sa\u011fl\u0131k uygulamalar\u0131ndan al\u0131nan bilgiler<\/li>\n<\/ul>\n<p>Bunun da \u00f6tesinde, DarkSword sald\u0131rganlar\u0131n kripto c\u00fczdan verilerini ele ge\u00e7irmesine olanak tan\u0131yor; bu da onu hem casusluk arac\u0131 hem de kripto varl\u0131klar\u0131n\u0131z\u0131 bo\u015faltman\u0131n bir yolu olarak i\u015flev g\u00f6ren, temelde \u00e7ift ama\u00e7l\u0131 bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m haline getiriyor.<\/p>\n<p>Tek iyi haber, casus yaz\u0131l\u0131m\u0131n bilgisayar\u0131n yeniden ba\u015flat\u0131lmas\u0131ndan sonra \u00e7al\u0131\u015fmaya devam edememesi. DarkSword, dosyas\u0131z bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m; yani cihaz\u0131n RAM\u2019inde bulunuyor ve dosya sistemine hi\u00e7bir zaman yerle\u015fmiyor.<\/p>\n<h2>Coruna: Eski iOS s\u00fcr\u00fcmleri nas\u0131l hedef al\u0131n\u0131yor?<\/h2>\n<p>DarkSword bulgular\u0131n\u0131n kamuoyuna a\u00e7\u0131klanmas\u0131ndan sadece iki hafta \u00f6nce, ara\u015ft\u0131rmac\u0131lar <a href=\"https:\/\/www.wired.com\/story\/coruna-iphone-hacking-toolkit-us-government\/\" target=\"_blank\" rel=\"noopener nofollow\">Coruna<\/a> adl\u0131 ba\u015fka bir iOS tehdidini tespit ettiler. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, eski s\u00fcr\u00fcm yaz\u0131l\u0131mlar\u0131 \u00e7al\u0131\u015ft\u0131ran cihazlar\u0131 ele ge\u00e7irebiliyor; \u00f6zellikle de iOS 13 ile 17.2.1 aras\u0131 s\u00fcr\u00fcmleri. Coruna, DarkSword ile tamamen ayn\u0131 kitap\u00e7\u0131\u011f\u0131 kullan\u0131yor: Kurbanlar, k\u00f6t\u00fc ama\u00e7l\u0131 kod yerle\u015ftirilmi\u015f yasal bir siteyi ziyaret ediyor ve bu kod, cihazlara k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 yerle\u015ftiriyor. T\u00fcm s\u00fcre\u00e7 tamamen g\u00f6r\u00fcnmez ve kullan\u0131c\u0131dan hi\u00e7bir m\u00fcdahale gerektirmiyor.<\/p>\n<p>Coruna\u2019n\u0131n kodunun detayl\u0131 bir incelemesi, uygulaman\u0131n toplam 23 farkl\u0131 iOS g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 istismar etti\u011fini ortaya \u00e7\u0131kard\u0131; bunlar\u0131n bir\u00e7o\u011fu Apple\u2019\u0131n WebKit\u2019inde gizli bulunuyor. Genel olarak (<a href=\"https:\/\/developer.apple.com\/support\/alternative-browser-engines\/\" target=\"_blank\" rel=\"noopener nofollow\">AB<\/a> d\u0131\u015f\u0131nda) t\u00fcm iOS taray\u0131c\u0131lar\u0131n\u0131n WebKit motorunu kullanmas\u0131 gerekti\u011fi unutulmamal\u0131. Bu, s\u00f6z konusu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n yaln\u0131zca Safari kullan\u0131c\u0131lar\u0131n\u0131 etkilemedi\u011fi anlam\u0131na geliyor; iPhone\u2019lar\u0131nda \u00fc\u00e7\u00fcnc\u00fc taraf taray\u0131c\u0131 kullanan herkes i\u00e7in de bir tehdit niteli\u011fi ta\u015f\u0131yor.<\/p>\n<p>Coruna\u2019n\u0131n en son s\u00fcr\u00fcm\u00fc, DarkSword\u2019a \u00e7ok benzer \u015fekilde, kripto c\u00fczdanlar\u0131n\u0131 bo\u015faltmak \u00fczere tasarlanm\u0131\u015f de\u011fi\u015fiklikler i\u00e7eriyor. Ayr\u0131ca foto\u011fraflar\u0131 ve baz\u0131 durumlarda e-posta verilerini de toplayabiliyor. Anlad\u0131\u011f\u0131m\u0131z kadar\u0131yla, kripto para \u00e7almak Coruna\u2019n\u0131n yayg\u0131n olarak kullan\u0131lmas\u0131n\u0131n ard\u0131ndaki ba\u015fl\u0131ca neden gibi g\u00f6r\u00fcn\u00fcyor.<\/p>\n<h2>Coruna ve DarkSword\u2019u kim tasarlad\u0131 ve bunlar nas\u0131l yayg\u0131nla\u015ft\u0131?<\/h2>\n<p>Her iki araca ait kod analizleri, Coruna ve DarkSword\u2019un muhtemelen farkl\u0131 geli\u015ftiriciler taraf\u0131ndan yaz\u0131ld\u0131\u011f\u0131n\u0131 g\u00f6steriyor. Ancak her iki durumda da, muhtemelen ABD\u2019den devlet ba\u011flant\u0131l\u0131 \u015firketler taraf\u0131ndan geli\u015ftirilmi\u015f yaz\u0131l\u0131mlarla kar\u015f\u0131 kar\u015f\u0131yay\u0131z. Kodun y\u00fcksek kalitesi bunu g\u00f6steriyor; bunlar rastgele par\u00e7alardan derme \u00e7atma bir \u015fekilde bir araya getirilmi\u015f Frankenstein kitleri de\u011fil, titizlikle tasarlanm\u0131\u015f istismar ara\u00e7lar\u0131. Bir \u015fekilde bu ara\u00e7lar siber su\u00e7 \u00e7etelerinin eline ge\u00e7ti.<\/p>\n<p>Kaspersky\u2019nin GReAT ekibindeki uzmanlar, Coruna\u2019n\u0131n t\u00fcm bile\u015fenlerini incelediler ve bu istismar kitinin asl\u0131nda <a href=\"https:\/\/securelist.com\/coruna-framework-updated-operation-triangulation-exploit\/119228\/\" target=\"_blank\" rel=\"noopener\">Operation Triangulation operasyonunda kullan\u0131lan \u00e7er\u00e7evenin g\u00fcncellenmi\u015f bir versiyonu<\/a> oldu\u011funu do\u011frulad\u0131lar. \u00d6nceki sald\u0131r\u0131 Kaspersky \u00e7al\u0131\u015fanlar\u0131n\u0131 hedef alm\u0131\u015ft\u0131; <a href=\"https:\/\/www.kaspersky.com\/blog\/triangulation-37c3-talk\/50166\/\" target=\"_blank\" rel=\"noopener nofollow\">bu konunun ayr\u0131nt\u0131lar\u0131n\u0131 bu blogda ele alm\u0131\u015ft\u0131k<\/a>.<\/p>\n<p>Bir teoriye g\u00f6re, Coruna\u2019y\u0131 geli\u015ftiren \u015firketteki bir \u00e7al\u0131\u015fan, program\u0131 <a href=\"https:\/\/techcrunch.com\/2026\/03\/10\/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine\/\" target=\"_blank\" rel=\"noopener nofollow\">bilgisayar korsanlar\u0131na satm\u0131\u015f<\/a>. O zamandan beri bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, \u00c7in\u2019deki kullan\u0131c\u0131lar\u0131n kripto c\u00fczdanlar\u0131n\u0131 bo\u015faltmak i\u00e7in kullan\u0131l\u0131yor; uzmanlar, yaln\u0131zca bu \u00fclkede en az 42.000 cihaza bula\u015ft\u0131\u011f\u0131n\u0131 tahmin ediyor.<\/p>\n<p>DarkSword\u2019a gelince, siber su\u00e7lular bu yaz\u0131l\u0131m\u0131 Suudi Arabistan, T\u00fcrkiye ve Malezya\u2019daki kullan\u0131c\u0131lar\u0131n sistemlerini ele ge\u00e7irmek i\u00e7in \u00e7oktan kullanm\u0131\u015f durumda. Sorun, DarkSword\u2019u ilk kez kullanan sald\u0131rganlar\u0131n enfekte olmu\u015f web sitelerinde program\u0131n tam kaynak kodunu b\u0131rakm\u0131\u015f olmalar\u0131 nedeniyle daha da a\u011f\u0131rla\u015f\u0131yor. Bu durum, di\u011fer su\u00e7 gruplar\u0131n\u0131n bu kodu kolayca ele ge\u00e7irebilece\u011fi anlam\u0131na geliyor.<\/p>\n<p>Kodda ayr\u0131ca her bir bile\u015fenin tam olarak ne i\u015fe yarad\u0131\u011f\u0131n\u0131 a\u00e7\u0131klayan ayr\u0131nt\u0131l\u0131 \u0130ngilizce a\u00e7\u0131klamalar da yer al\u0131yor, bu da kodun Bat\u0131 k\u00f6kenli oldu\u011fu tezini destekliyor. Bu ad\u0131m ad\u0131m talimatlar, di\u011fer bilgisayar korsanlar\u0131n\u0131n bu arac\u0131 kendi ama\u00e7lar\u0131 do\u011frultusunda uyarlamas\u0131n\u0131 kolayla\u015ft\u0131r\u0131yor.<\/p>\n<h2>Coruna ve DarkSword\u2019dan nas\u0131l korunabilirsiniz?<\/h2>\n<p>Kullan\u0131c\u0131n\u0131n hi\u00e7bir m\u00fcdahalesini gerektirmeden iPhone\u2019lar\u0131 toplu olarak enfekte etmeyi sa\u011flayan ciddi bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, art\u0131k say\u0131s\u0131z siber su\u00e7lunun eline ge\u00e7mi\u015f durumda. Coruna ya da DarkSword\u2019u kapmak i\u00e7in, tek yapman\u0131z gereken yanl\u0131\u015f zamanda yanl\u0131\u015f siteyi ziyaret etmek. Yani bu, sadece y\u00fcksek risk grubundaki kullan\u0131c\u0131lar\u0131n de\u011fil, t\u00fcm kullan\u0131c\u0131lar\u0131n iOS g\u00fcvenli\u011fini ciddiye almas\u0131 gereken durumlardan biri.<\/p>\n<p>Coruna ve DarkSword\u2019dan korunmak i\u00e7in yapabilece\u011finiz en iyi \u015fey, cihazlar\u0131n\u0131z\u0131 m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede iOS veya iPadOS 26\u2019n\u0131n en son s\u00fcr\u00fcm\u00fcne g\u00fcncellemektir. En yeni yaz\u0131l\u0131ma g\u00fcncelleme yapam\u0131yorsan\u0131z (\u00f6zelikle cihaz\u0131n\u0131z eskiyse ve iOS 26\u2019y\u0131 desteklemiyorsa), yine de kullanabilece\u011finiz en son s\u00fcr\u00fcm\u00fc y\u00fcklemelisiniz. \u00d6zellikle, <a href=\"https:\/\/support.apple.com\/tr-tr\/126632\" target=\"_blank\" rel=\"noopener nofollow\">15.8.7<\/a>, <a href=\"https:\/\/support.apple.com\/tr-tr\/126646\" target=\"_blank\" rel=\"noopener nofollow\">16.7.15<\/a> veya <a href=\"https:\/\/support.apple.com\/tr-tr\/126793\" target=\"_blank\" rel=\"noopener nofollow\">18.7.7<\/a> s\u00fcr\u00fcmlerini aray\u0131n. Apple, nadir g\u00f6r\u00fclen bir ad\u0131m atarak \u00e7ok say\u0131da eski i\u015fletim sistemi i\u00e7in yama yay\u0131nlad\u0131.<\/p>\n<p>Apple cihazlar\u0131n\u0131z\u0131 gelecekte ortaya \u00e7\u0131kmas\u0131 muhtemel benzer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlardan korumak i\u00e7in \u015funlar\u0131 \u00f6neririz:<\/p>\n<ul>\n<li><strong>T\u00fcm Apple cihazlar\u0131n\u0131za g\u00fcncellemeleri derhal y\u00fckleyin. <\/strong>\u015eirket, bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 d\u00fczelten i\u015fletim sistemi s\u00fcr\u00fcmlerini d\u00fczenli olarak yay\u0131n\u0131yor, bunlar\u0131 atlamay\u0131n.<\/li>\n<li><strong>Arka Plan G\u00fcvenlik \u0130yile\u015ftirmelerini etkinle\u015ftirin.<\/strong> Bu \u00f6zellik, cihaz\u0131n\u0131z\u0131n \u00f6nemli g\u00fcvenlik d\u00fczeltmelerini tam iOS g\u00fcncellemelerinden ayr\u0131 olarak almas\u0131n\u0131 sa\u011flayarak, bilgisayar korsanlar\u0131n\u0131n g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlanma s\u00fcresini k\u0131salt\u0131r. Etkinle\u015ftirmek i\u00e7in <em>Ayarlar<\/em> \u2192 <em>Gizlilik ve G\u00fcvenlik<\/em> \u2192 <em>Arka Plan G\u00fcvenlik \u0130yile\u015ftirmeleri<\/em> b\u00f6l\u00fcm\u00fcne gidin ve <em>Otomatik Olarak Y\u00fckle<\/em> anahtar\u0131n\u0131 a\u00e7\u0131k duruma getirin.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/apple-lockdown-mode\/10905\/\" target=\"_blank\" rel=\"noopener\"><strong>Kilitleme Modunu<\/strong><\/a><strong> kullanmay\u0131 deneyin.<\/strong> Bu, baz\u0131 cihaz \u00f6zelliklerini k\u0131s\u0131tlayan ancak ayn\u0131 zamanda sald\u0131r\u0131lar\u0131 engelleyen veya \u00f6nemli \u00f6l\u00e7\u00fcde zorla\u015ft\u0131ran, daha s\u0131k\u0131 bir g\u00fcvenlik ayar\u0131d\u0131r. Bunu etkinle\u015ftirmek i\u00e7in <em>Ayarlar<\/em> \u2192 <em>Gizlilik ve G\u00fcvenlik<\/em> \u2192 <em>Kilitleme Modu<\/em> \u2192 <em>Kilitleme Modunu A\u00e7<\/em>\u2018a gidin.<\/li>\n<li><strong>Cihaz\u0131n\u0131z\u0131 g\u00fcnde bir kez (veya daha s\u0131k) yeniden ba\u015flat\u0131n.<\/strong> Bu, dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 an\u0131nda durdurur; zira bu tehditler sistemde yerle\u015fik de\u011fildir ve yeniden ba\u015flatma ile yok olurlar.<\/li>\n<li><strong>Hassas veriler i\u00e7in \u015fifreli depolama alan\u0131 kullan\u0131n.<\/strong> Kripto c\u00fczdan anahtarlar\u0131, kimlik foto\u011fraflar\u0131 ve gizli bilgiler gibi verileri g\u00fcvenli bir kasada saklay\u0131n. <a href=\"https:\/\/www.kaspersky.com.tr\/password-manager?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a> bu i\u015f i\u00e7in bi\u00e7ilmi\u015f kaftand\u0131r; t\u00fcm cihazlar\u0131n\u0131zda parolalar\u0131n\u0131z\u0131, iki fakt\u00f6rl\u00fc kimlik do\u011frulama belirte\u00e7lerinizi ve ge\u00e7i\u015f anahtarlar\u0131n\u0131z\u0131 y\u00f6netirken, notlar\u0131n\u0131z\u0131, foto\u011fraflar\u0131n\u0131z\u0131 ve belgelerinizi de senkronize \u015fekilde ve \u015fifreli olarak saklar.<\/li>\n<\/ul>\n<blockquote><p>Apple cihazlar\u0131n\u0131n kusursuz oldu\u011fu d\u00fc\u015f\u00fcncesi bir efsanedir. Bu uygulamalar; s\u0131f\u0131r t\u0131klama sald\u0131r\u0131lar\u0131na, truva atlar\u0131na ve ClickFix bula\u015fma y\u00f6ntemlerine kar\u015f\u0131 savunmas\u0131zd\u0131r; hatta k\u00f6t\u00fc ama\u00e7l\u0131 uygulamalar\u0131n App Store\u2019a birden fazla kez s\u0131zd\u0131\u011f\u0131n\u0131 da g\u00f6rd\u00fck. Daha fazla bilgiyi a\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131zda bulabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/predator-spyware-ios-recording-indicator-bypass\/55463\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Predator ve iPhone: G\u00f6r\u00fcnmez g\u00f6zetleme sanat\u0131<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/airborne-wormable-zero-click-vulnerability-in-apple-airplay\/13376\/\" target=\"_blank\" rel=\"noopener\"><strong>AirBorne: AirPlay\u2019deki g\u00fcvenlik a\u00e7\u0131klar\u0131 \u00fczerinden Apple cihazlar\u0131na sald\u0131r\u0131lar<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/whisperpair-blueooth-headset-location-tracking\/14210\/\" target=\"_blank\" rel=\"noopener\"><strong>Bluetooth kulakl\u0131klar\u0131n\u0131z sizi g\u00f6zetliyor mu?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\"><strong>SparkCat truva at\u0131 h\u0131rs\u0131z\u0131 App Store ve Google Play\u2019e s\u0131zarak foto\u011fraflardan veri \u00e7al\u0131yor<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/banshee-stealer-targets-macos-users\/13135\/\" target=\"_blank\" rel=\"noopener\"><strong>Banshee: macOS kullan\u0131c\u0131lar\u0131n\u0131 hedef alan bir h\u0131rs\u0131zl\u0131k<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm\">\n","protected":false},"excerpt":{"rendered":"<p>iOS&#8217;u hedef alan yeni k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar DarkSword ve Coruna&#8217;n\u0131n ortaya \u00e7\u0131k\u0131\u015f\u0131, devlet istihbarat ara\u00e7lar\u0131n\u0131n siber su\u00e7lular i\u00e7in nas\u0131l birer silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fcld\u00fc\u011f\u00fcn\u00fc a\u00e7\u0131k\u00e7a ortaya koyuyor. Bu sald\u0131r\u0131lar\u0131n nas\u0131l i\u015fledi\u011fini, neden bu kadar tehlikeli olduklar\u0131n\u0131 ve vir\u00fcs bula\u015fmas\u0131n\u0131 \u00f6nlemek i\u00e7in neler yapabilece\u011finizi ayr\u0131nt\u0131l\u0131 olarak a\u00e7\u0131kl\u0131yoruz.<\/p>\n","protected":false},"author":2726,"featured_media":14515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351],"tags":[14,1900,790,750,100,2533,26,728,1500,1525,1969,2783,1749],"class_list":{"0":"post-14514","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"tag-apple","10":"tag-casus-yazilim","11":"tag-guvenlik-aciklari","12":"tag-ios","13":"tag-ipad","14":"tag-ipados","15":"tag-iphone","16":"tag-kotu-amacli-yazilim","17":"tag-kripto-para-birimleri","18":"tag-parolalar","19":"tag-safari","20":"tag-sifir-tiklama","21":"tag-tarayicilar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/14514\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/30414\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/25463\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/13352\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/30261\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/29149\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/32029\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/30629\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/41717\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/55622\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/23875\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/24925\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/33422\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ios-exploits-darksword-and-coruna-in-mass-attacks\/30568\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/36148\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ios-exploits-darksword-and-coruna-in-mass-attacks\/35799\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ios\/","name":"iOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=14514"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14514\/revisions"}],"predecessor-version":[{"id":14517,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/14514\/revisions\/14517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/14515"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=14514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=14514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=14514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}