{"id":2257,"date":"2016-07-19T04:22:56","date_gmt":"2016-07-19T08:22:56","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=2257"},"modified":"2019-11-15T14:59:36","modified_gmt":"2019-11-15T11:59:36","slug":"industrial-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/industrial-vulnerabilities\/2257\/","title":{"rendered":"Yeme\u011fi, suyu ve elektri\u011fi hacklemek"},"content":{"rendered":"<p>Hep s\u00f6yledi\u011fimiz gibi, en yeni siber g\u00fcvenlik haberleri ve tehditlerine kar\u015f\u0131 bilin\u00e7li olmak \u00e7ok \u00f6nemlidir. Haz\u0131rl\u0131kl\u0131 olmak sava\u015f\u0131n yar\u0131s\u0131ndan \u00e7o\u011funu olu\u015fturur. <\/p>\n<p>Ancak, siber g\u00fcvenlikle ilgili her \u015feyi bilen, <a href=\"https:\/\/www.kaspersky.com\/blog\/remember-strong-passwords\/6386\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">g\u00fcvenli \u015fifreler kullanan<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/passwords-are-like-underwear\/10645\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">d\u00fczenli olarak onlar\u0131 de\u011fi\u015ftiren<\/a>, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/oltalama-saldirisindan-nasil-korunursunuz-10-ipucu\/1857\/\" target=\"_blank\" rel=\"noopener noreferrer\">kimlik av\u0131 ama\u00e7l\u0131 mesajlar\u0131<\/a> ilk bak\u0131\u015fta anlayabilen ve cihazlar\u0131n\u0131 en iyi g\u00fcvenlik \u00e7\u00f6z\u00fcmleriyle koruyan hatta her \u015feyi do\u011fru yapan biri bile tamamen g\u00fcvende de\u011fildir. \u00c7\u00fcnk\u00fc hepimiz b\u00fcy\u00fck bir toplulu\u011fun par\u00e7as\u0131y\u0131z. <\/p>\n<p>Sorun \u015fu ki, ki\u015fisel cihazlar\u0131m\u0131zda kontrol bizdedir ancak end\u00fcstriyel ekipmanlar ula\u015fabilece\u011fimizin \u00f6tesinde.<\/p>\n<p><strong>Siber g\u00fcvenlik mi? Bizim ne i\u015fimiz olur?<\/strong><br>\nSiber g\u00fcvenlik uzmanlar\u0131m\u0131z end\u00fcstriyel sistemlerin kontrol\u00fcne ili\u015fkin bir <a href=\"https:\/\/securelist.com\/analysis\/publications\/75343\/industrial-cybersecurity-threat-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\">ara\u015ft\u0131rma<\/a> yapt\u0131.<\/p>\n<p>Ba\u011fl\u0131 cihazlar i\u00e7in arama motoru olan Shodan bize 170 \u00fclkede 188,019 end\u00fcstriyel sistemin internet \u00fczerinden eri\u015filebilir oldu\u011funu g\u00f6sterdi. Bunlar\u0131n \u00e7o\u011fu Amerika ve Avrupa\u2019da (%30.5), baz\u0131lar\u0131 ise Almanya (%13.9), \u0130spanya (%5.9) ve Fransa\u2019da (%5.6).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Industrial <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#cybersecurity<\/a> threat landscape <a href=\"https:\/\/t.co\/k6q9DAtQyX\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/k6q9DAtQyX<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/klreport?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#klreport<\/a> <a href=\"https:\/\/t.co\/ML6LnxFa9B\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/ML6LnxFa9B<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/752570557200265216?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><a href=\"https:\/\/tr.wikipedia.org\/wiki\/End%C3%BCstriyel_kontrol_sistemi\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">End\u00fcstriyel kontrol sistemleri<\/a>nin (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Industrial_control_system\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ICS<\/a>) %92\u2019sinin (172,982) savunmas\u0131z oldu\u011fu tespit edildi. \u015ea\u015f\u0131rt\u0131c\u0131 olarak, %87\u2019si orta d\u00fczey riskli buglara ve %7\u2019si kritik durumlara sahip.<\/p>\n<p>Ge\u00e7ti\u011fimiz be\u015f y\u0131l i\u00e7erisinde, uzmanlar\u0131m\u0131z\u0131n etrafl\u0131ca yapt\u0131\u011f\u0131 ara\u015ft\u0131rmalar sonucunda b\u00f6yle sistemlerin bir\u00e7ok g\u00fcvenlik a\u00e7\u0131\u011f\u0131 oldu\u011funu ke\u015ffettiler: bu s\u00fcre zarf\u0131nda end\u00fcstriyel kontrol sistemlerinin temel bile\u015fenlerindeki a\u00e7\u0131klar on kat artt\u0131. <\/p>\n<p>Uzmanlar\u0131m\u0131z\u0131n analiz etti\u011fi sistemlerden %91.6\u2019s\u0131 g\u00fcvenli olmayan protokoller kullanarak su\u00e7lulara <a href=\"https:\/\/www.kaspersky.com\/blog\/man-in-the-middle-attack\/1613\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">man-in-the-middle<\/a> kullanarak verileri kesme ve d\u00fczenleme etme f\u0131rsat\u0131 verdi. <\/p>\n<p>Sistemlerin %7.2\u2019si (13,700 kadar) havac\u0131l\u0131k, ta\u015f\u0131mac\u0131l\u0131k, enerji, petrol, gaz, metal\u00fcrji, i\u00e7ki ve g\u0131da \u00fcretimi, in\u015faat ve di\u011fer kritik alanlarda \u00e7al\u0131\u015fan \u015firketlere ait.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Maritime industry is easy meat for cyber criminals \u2013 <a href=\"http:\/\/t.co\/arylkFBOTc\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/arylkFBOTc<\/a> <a href=\"http:\/\/t.co\/v6QKzcjJXM\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/v6QKzcjJXM<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/601876502058262528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 22, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Di\u011fer bir deyi\u015fle, yetenekli siber su\u00e7lular herhangi bir ekonomik sekt\u00f6re sald\u0131rabilir. Kurbanlar\u0131 yani hacklenmi\u015f \u015firketler milyonlarca insan\u0131 pis sularla, yenmeyecek g\u0131dalarla ya da k\u0131\u015f\u0131n do\u011fal gaz\u0131n\u0131 keserek zarar verebilir.  <\/p>\n<p><strong>Bu hepimiz i\u00e7in ne anlama geliyor? <\/strong><br>\nMuhtemel etkiler siber su\u00e7lular\u0131n hangi \u015firketleri hedef olarak se\u00e7ti\u011fine ve bu \u015firketlerin hangi end\u00fcstriyel kontrol sistemini kulland\u0131\u011f\u0131na ba\u011fl\u0131.<\/p>\n<p>End\u00fcstriyel sald\u0131r\u0131lar\u0131n birka\u00e7\u0131n\u0131 \u00e7oktan g\u00f6rd\u00fck. Aral\u0131k 2015\u2019de Ukrayna\u2019n\u0131n bir \u015fehri olan Ivano-Frankivsk\u2019de bulunan evlerin yar\u0131s\u0131 <a href=\"https:\/\/www.wired.com\/2016\/01\/everything-we-know-about-ukraines-power-plant-hack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">APT Black Energy sald\u0131r\u0131s\u0131<\/a> y\u00fcz\u00fcnden elektrik kesintisine u\u011fram\u0131\u015ft\u0131. Ayn\u0131 sene, <a href=\"http:\/\/www.securityweek.com\/attackers-alter-water-treatment-systems-utility-hack-report\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kemuri Water Company<\/a>\u2018ye yap\u0131lan bir sald\u0131r\u0131 a\u00e7\u0131\u011fa \u00e7\u0131kt\u0131. Siber su\u00e7lular a\u011fa girerek sistemleri manip\u00fcle edip temiz suya kimyasal madde katt\u0131ld\u0131\u011f\u0131n\u0131 da g\u00f6rd\u00fck.<\/p>\n<p>Ek olarak, Warsaw\u2019da bulunan Chopin Havaalan\u0131 siber su\u00e7lular taraf\u0131ndan sald\u0131r\u0131ya u\u011frad\u0131. Dahas\u0131, bir sene \u00f6ncesinde su\u00e7lular Almanya\u2019da bir \u00e7elik fabrikas\u0131nda \u00fcfleme f\u0131r\u0131n\u0131n\u0131n \u00e7al\u0131\u015fmas\u0131n\u0131 kesintiye u\u011fratt\u0131. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Black Hat and DEF CON: Hacking a chemical plant \u2013 <a href=\"https:\/\/t.co\/KSnCTtLt5U\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/KSnCTtLt5U<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/634086251205926913?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">August 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Yani end\u00fcstriyel kontrol sistemleri su\u00e7lular\u0131n sald\u0131rmas\u0131 i\u00e7in a\u00e7\u0131k hedef haline gelmi\u015f durumda. Kaspersky Lab bu konu hakk\u0131nda s\u00fcrekli uyar\u0131 yapt\u0131 ancak muhalifler \u201cBu a\u00e7\u0131klar\u0131n s\u00f6m\u00fcr\u00fcld\u00fc\u011f\u00fc ger\u00e7ek bir olay anlat\u201d diyerek bizi ge\u00e7i\u015ftirdi. Ne yaz\u0131k ki, \u015fimdi anlatabiliyoruz.<\/p>\n<p>Tabiki tek bir ki\u015finin elinden sistematik bir problemi \u00e7\u00f6zmek i\u00e7in \u00e7ok az \u015fey gelir. End\u00fcstriyel ekipmanlar bir g\u00fcnde hatta bir senede bile de\u011fi\u015ftirilemiyor. Ancak, daha \u00f6nce de belirtti\u011fimiz gibi, en \u00f6nemli siber g\u00fcvenlik korumas\u0131 bilgidir. Bu problem hakk\u0131nda ne kadar \u00e7ok insan bilgi sahibi olursa berbat bir olay ya\u015fanmadan end\u00fcstriyel altyap\u0131n\u0131n d\u00fczeltilmesinin \u015fans\u0131 o kadar artar.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hep s\u00f6yledi\u011fimiz gibi, en yeni siber g\u00fcvenlik haberleri ve tehditlerine kar\u015f\u0131 bilin\u00e7li olmak \u00e7ok \u00f6nemlidir. Haz\u0131rl\u0131kl\u0131 olmak sava\u015f\u0131n yar\u0131s\u0131ndan \u00e7o\u011funu olu\u015fturur. Ancak, siber g\u00fcvenlikle ilgili her \u015feyi bilen, g\u00fcvenli \u015fifreler<\/p>\n","protected":false},"author":696,"featured_media":2258,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[909,907,744,906,908,820],"class_list":{"0":"post-2257","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-acik","9":"tag-endustriyel-kontrol-sistemi","10":"tag-guvenlik","11":"tag-ics","12":"tag-shodan","13":"tag-tehdit"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/industrial-vulnerabilities\/2257\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/industrial-vulnerabilities\/7410\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/industrial-vulnerabilities\/7435\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/industrial-vulnerabilities\/7392\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/industrial-vulnerabilities\/8724\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/industrial-vulnerabilities\/8624\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/industrial-vulnerabilities\/12466\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/industrial-vulnerabilities\/12596\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/industrial-vulnerabilities\/6418\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/industrial-vulnerabilities\/5130\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/industrial-vulnerabilities\/8187\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/industrial-vulnerabilities\/12466\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/industrial-vulnerabilities\/12596\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/industrial-vulnerabilities\/12596\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/acik\/","name":"a\u00e7\u0131k"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=2257"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2257\/revisions"}],"predecessor-version":[{"id":7173,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2257\/revisions\/7173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/2258"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=2257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=2257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=2257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}