{"id":2629,"date":"2016-11-10T09:23:31","date_gmt":"2016-11-10T14:23:31","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=2629"},"modified":"2019-11-15T14:55:17","modified_gmt":"2019-11-15T11:55:17","slug":"attack-on-dyn-explained","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/","title":{"rendered":"\u0130nterneti nas\u0131l &#8216;k\u0131rmazs\u0131n\u0131z&#8217;"},"content":{"rendered":"<p>Ge\u00e7en ay\u0131n en \u00f6nemli olay\u0131 devasa DDoS sald\u0131r\u0131s\u0131yd\u0131. Bu sald\u0131r\u0131 ile 80\u2019den fazla b\u00fcy\u00fck internet sitesi ve online hizme sa\u011flay\u0131c\u0131s\u0131na eri\u015filemedi. Bu sald\u0131r\u0131n\u0131n en \u00f6nemli noktas\u0131, internete ba\u011flanabilen her cihazdan ordu kurup bu ordu ile sald\u0131r\u0131lmas\u0131 oldu. Biz buna Nesnelerin \u0130nterneti (Internet of Things \u2013 IoT) diyoruz.  Bu g\u00f6nderimizde bu kritik konseptten ve ba\u011fl\u0131 olmam\u0131z\u0131n yaratt\u0131\u011f\u0131 durumlardan bahsedece\u011fiz.<\/p>\n<p><strong>Sald\u0131r\u0131<\/strong><br>\n21 Ekim g\u00fcn\u00fc bir\u00e7ok Amerika vatanda\u015f\u0131 sabah uyand\u0131klar\u0131nda internette sorun oldu\u011funu fark etti. Netflix\u2019e girilemiyordu, PayPal\u2019a girilemiyordu, Sony PlayStation\u2019un online platformuna ba\u011flan\u0131lam\u0131yordu. Bu sorunlar hakk\u0131nda twit de at\u0131lam\u0131yordu \u00e7\u00fcnk\u00fc Twitter\u2019a da girilemiyordu. Sald\u0131r\u0131lar\u0131n sonucunda \u00fclkemizden de bir\u00e7ok siteye giri\u015f yapam\u0131yorduk. <\/p>\n<p>Genel olarak, 85 b\u00fcy\u00fck internet sitesine girmeye \u00e7al\u0131\u015fanlar sitelerden cevap alamad\u0131.<\/p>\n<p>Bunun sebebi Amerikan \u0130nternet sistemine yap\u0131lan sald\u0131r\u0131yd\u0131. \u0130lk dalga do\u011fu yakas\u0131n\u0131 etkiledi. \u0130kinci dalga Kaliforniya\u2019daki kullan\u0131c\u0131lar\u0131 ve orta b\u00f6lgelerdeki kullan\u0131c\u0131lar\u0131 etkiledi. Son sald\u0131r\u0131 ise Dyn taraf\u0131ndan engellendi. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Dyn_(company)\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Dyn<\/a> bir DNS servis sa\u011flay\u0131c\u0131 \u015firketidir ve bu \u00fc\u00e7 sald\u0131r\u0131n\u0131n da temel hedefi Dyn\u2019dir. <\/p>\n<p>M\u00fczik servisleri, medya ve <a href=\"http:\/\/gizmodo.com\/this-is-probably-why-half-the-internet-shut-down-today-1788062835\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">bir\u00e7ok<\/a> ba\u015fka kaynak etkilendi. Amazon \u00f6zel bir uyar\u0131 ile Bat\u0131 Avrupa\u2019dan gelen sald\u0131r\u0131lar sebebiyle sitesini bir s\u00fcre i\u00e7in kapatt\u0131. <\/p>\n<p><strong>DNS ve DDoS<\/strong><br>\n\u015eimdi, sadece \u00fc\u00e7 sald\u0131r\u0131 ile bu kadar site nas\u0131l engellenebilir? Bunu anlamak i\u00e7in \u00f6ncelikle DNS\u2019in ne oldu\u011funu bilmek laz\u0131m. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Can't get on a website? This is a live map, right now, of the massive DDoS attacks on Dyn's servers. It is creating many issues right now. <a href=\"https:\/\/t.co\/fekUqNgaL7\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/fekUqNgaL7<\/a><\/p>\n<p>\u2014 Flying With Fish (@flyingwithfish) <a href=\"https:\/\/twitter.com\/flyingwithfish\/status\/789524594017308672?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 21, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>DNS, Domain Name System\u2019in k\u0131salt\u0131lm\u0131\u015f halidir ve T\u00fcrk\u00e7e kar\u015f\u0131l\u0131\u011f\u0131 Alan Ad\u0131\u2019d\u0131r. \u0130nternet taray\u0131c\u0131n\u0131z ile gitmek istedi\u011finiz siteyi ba\u011flayan sistemdir. Temel olarak, her internet sitesi dijital bir adrese sahiptir. Bu adres internet sitesinin nerede ya\u015fad\u0131\u011f\u0131n\u0131 g\u00f6sterir. \u00d6rne\u011fin blog.kaspersky.com 161.47.21.156 IP adresinde ya\u015f\u0131yor. <\/p>\n<p>DNS sunucusu bir nevi adres defteridir \u2013 internet taray\u0131c\u0131n\u0131za gitmek istedi\u011finiz internet sitesinin adresini s\u00f6yler. E\u011fer DNS sunucusu sorunuza cevap vermezse, taray\u0131c\u0131n\u0131z internet sitesini nas\u0131l bulaca\u011f\u0131n\u0131 bilemez. Bu sebeple DNS sa\u011flay\u0131c\u0131lar\u0131 (\u00f6zellikle b\u00fcy\u00fck firmalar) \u0130nternet yap\u0131s\u0131 i\u00e7in son derece \u00f6nemlidir. <\/p>\n<p>\u015eimdi s\u0131ra DDoS\u2019ta. <\/p>\n<p>DDoS (Distributed Denial of Service \u2013 Da\u011f\u0131n\u0131k Hizmet Engelleme) sald\u0131r\u0131lar\u0131, hizmete s\u00fcrekli soru sorarak sistemi \u00e7al\u0131\u015fmaz hale getirene kadar yap\u0131l\u0131r. DDoS sald\u0131r\u0131s\u0131 i\u00e7in, su\u00e7lular\u0131n inan\u0131lmaz say\u0131da sorgu g\u00f6ndermesi laz\u0131m. Bunun i\u00e7in de \u00e7ok cihaza ihtiya\u00e7lar\u0131 var. DDoS sald\u0131r\u0131lar genelde hacklenmi\u015f bilgisayalar, ak\u0131ll\u0131 telefonlar, cihazlar ve internete ba\u011flanabilen di\u011fer \u015feylerden olu\u015fturulmu\u015f orduyla yap\u0131l\u0131r. Beraber \u00e7al\u0131\u015fan (ama cihaz sahibinin haberi olmaz) cihazlar <a href=\"https:\/\/www.kaspersky.com\/blog\/simda-botnet-check\/8304\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">botnet<\/a> olu\u015ftururlar. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Chinese manufacturer <a href=\"https:\/\/twitter.com\/hashtag\/recall?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#recall<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/IOT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IOT<\/a> gear following <a href=\"https:\/\/twitter.com\/hashtag\/Dyn?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Dyn<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/DDoS?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#DDoS<\/a> via <a href=\"https:\/\/twitter.com\/Mike_Mimoso?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Mike_Mimoso<\/a> <a href=\"https:\/\/t.co\/SQBo8adUIi\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/SQBo8adUIi<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/t.co\/bCtqwuSRmm\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/bCtqwuSRmm<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/790657145268232192?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 24, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>Dyn\u2019i patlatmak <\/strong><br>\nNas\u0131l oldu\u011funu anlad\u0131n\u0131z de\u011fil mi? Birileri Dyn\u2019ye sald\u0131rmak i\u00e7in devasa bir botnet a\u011f\u0131 kulland\u0131. \u0130nternete ba\u011flanabilen milyonlarca cihaz kullan\u0131ld\u0131 \u2013 IP kameralardan, reouterlara, yaz\u0131c\u0131lardan akl\u0131n\u0131za gelebilecek her cihaza kadar. Dyn\u2019nin sitesini saniyede 1.2 terabit sorgu ile <a href=\"http:\/\/www.cbsnews.com\/news\/new-world-hackers-claims-responsibility-internet-disruption-cyberattack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">doldurdular<\/a>. Ortalama verdikleri <a href=\"http:\/\/ktla.com\/2016\/10\/22\/unprecedented-cyberattack-involved-tens-of-millions-of-ip-addresses\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">hasar<\/a> 110 milyon dolar civar\u0131. Buna ra\u011fmen su\u00e7lular fidye ya da kendi yararlar\u0131na ba\u015fka hi\u00e7bir \u015fey istemediler. <\/p>\n<p>Asl\u0131na bakarsan\u0131z sald\u0131rmaktan ba\u015fka hi\u00e7bir \u015fey yapmad\u0131lar, ipucu dahi b\u0131rakmad\u0131lar. New World Hackers ve RedCult isimli hack gruplar\u0131 sald\u0131r\u0131y\u0131 \u00fcstlendi. Ayr\u0131ca RedCult daha b\u00fcy\u00fck bir sald\u0131r\u0131 yapacaklar\u0131n\u0131n s\u00f6z\u00fcn\u00fc verdi. <\/p>\n<p><strong>S\u0131radan kullan\u0131c\u0131lar bunlar\u0131 niye \u00f6nemsesin ki? <\/strong><br>\nDyn sald\u0131r\u0131s\u0131 sizi etkilememi\u015f olabilir ama siz bu sald\u0131r\u0131n\u0131n par\u00e7as\u0131 olmu\u015f olabilirsiniz. <\/p>\n<p>Botnet kurabilmek i\u00e7in su\u00e7lular internete ba\u011fl\u0131 \u00e7ok cihaza ihtiya\u00e7 duyar. \u0130nternete ba\u011flanabilen ka\u00e7 tane cihaz\u0131n\u0131z var? Olaya T\u00fcrkiye standartlar\u0131nda bakal\u0131m. En az bir tane ak\u0131ll\u0131 telefon. B\u00fcy\u00fck ihtimalle bir tane de bilgisayar. Belki bir ak\u0131ll\u0131 TV? Sizinle beraber ya\u015fayanlar\u0131n telefonlar\u0131? Peki onlar\u0131n bilgisayarlar\u0131? Hadi biraz daha ileri gidelim. \u0130nternete ba\u011flanabilen buzdolab\u0131? Ele ge\u00e7irilmi\u015f cihazlar ayn\u0131 anda iki ki\u015fiye hizmet ederler: Kendi kullan\u0131c\u0131lar\u0131na ve hackerlara. Normal \u00e7al\u0131\u015farak kullan\u0131c\u0131n\u0131n istediklerini yaparlar ama arkadan hackerlar\u0131n istedikleri sitelere sald\u0131r\u0131rlar. Bu \u015fekilde ele ge\u00e7ilmi\u015f milyonlarca cihazdan olu\u015fan botnet Dyn\u2019ye sald\u0131rd\u0131. <\/p>\n<p>Bu devasa botnet Miari vir\u00fcs\u00fc sayesinde kuruldu. Bu vir\u00fcs\u00fcn yapt\u0131\u011f\u0131 \u015fey gayet basit: internete ba\u011flanabilen cihazlar\u0131 tar\u0131yor ve bulduklar\u0131nda parola deniyor. \u0130nsanlar cihazlar\u0131ndaki parolalar\u0131 genellikle de\u011fi\u015ftirmedikleri i\u00e7in, bu cihazlar kolayca hacklenebiliyor \u2013 bu sayede Miari ve benzeri zararl\u0131 yaz\u0131l\u0131mlar ile kolayl\u0131kla bir zombi internete ba\u011fl\u0131 cihazlar ordusu olu\u015fturulabiliyor. <\/p>\n<p>Bu ayn\u0131 zamanda \u015fu anlama geliyor, internete ba\u011flanabilen televizyonunuz botnetin bir par\u00e7as\u0131 olabilir, daha k\u00f6t\u00fcs\u00fc bunu asla \u00f6\u011frenemeyebilirsiniz. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A timely reminder: These 60 dumb passwords can hijack over 500,000 IoT devices into the Mirai botnet <a href=\"https:\/\/t.co\/RgjgRIJFy8\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/RgjgRIJFy8<\/a><\/p>\n<p>\u2014 Graham Cluley (@gcluley) <a href=\"https:\/\/twitter.com\/gcluley\/status\/790621888842199040?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 24, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Bu y\u0131l Eyl\u00fcl ay\u0131nda biri Mirai <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">kullanarak<\/a> BT g\u00fcvenlik habercesi Brian Krebs\u2019in blo\u011funu kullan\u0131lmaz hale getirmeye \u00e7al\u0131\u015ft\u0131. Sunucuya 380,000 zombile\u015fmi\u015f cihaz ile sald\u0131ran sald\u0131rgan saniyede 665 gigabyte sorgu yapt\u0131. Sa\u011flay\u0131c\u0131 dayanmay\u0131 denedi ama sonunda pes etmek zorunda kald\u0131. Blog \u00e7al\u0131\u015fmaya Google\u2019\u0131n dahil olup korumas\u0131 ile tekrar ba\u015flad\u0131. <\/p>\n<p>Bu sald\u0131r\u0131dan k\u0131sa s\u00fcre sonra, Anna-senpai kullan\u0131c\u0131 isimli biri Mirai zararl\u0131 yaz\u0131l\u0131m\u0131n\u0131n kaynak kodunu bir yeralt\u0131 forumunda payla\u015ft\u0131. Bu forumu takip eden b\u00fct\u00fcn su\u00e7lular bu kodu ald\u0131lar. O zamandan beri Mirai botlar\u0131n\u0131n say\u0131s\u0131 d\u00fczenli olarak art\u0131yor, olay\u0131n \u00fczerinden bir ay ge\u00e7meden Dyn sald\u0131r\u0131s\u0131 yap\u0131ld\u0131.<br>\n<strong><br>\nNesnelerin \u0130nterneti ile birle\u015ftirme<\/strong><br>\nDDoS <a href=\"https:\/\/www.hackread.com\/ovh-hosting-suffers-1tbps-ddos-attack\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u00e7ok<\/a> <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">pop\u00fcler<\/a> bir sald\u0131r\u0131 t\u00fcr\u00fc. Bu tarz sald\u0131r\u0131larda ak\u0131ll\u0131 cihazlar\u0131 kullanmak siber su\u00e7lular i\u00e7in olay\u0131 daha ilgi \u00e7ekici hale getiriyor \u2013 <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-things-and-cybersecurity-of-infrastructure\/8088\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">daha \u00f6nce de bahsetti\u011fimiz gibi<\/a> Nesnelerin \u0130nterneti <a href=\"https:\/\/www.kaspersky.com\/blog\/surviving-iot\/10480\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">a\u00e7\u0131k<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/iot-state-of-mind\/11577\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">hata doludur<\/a>. Ki bu da yak\u0131n bir zamanda de\u011fi\u015fecek bir \u015fey de\u011fil.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How will the Internet of Things affect cybersecurity? \u2013 <a href=\"http:\/\/t.co\/fWScmf4QfQ\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/fWScmf4QfQ<\/a> <a href=\"http:\/\/t.co\/sAk1mcZPg5\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/sAk1mcZPg5<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/586174972156108800?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 9, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>K\u00fc\u00e7\u00fck cihazlar\u0131n geli\u015ftiricileri, \u00fcr\u00fcnleri i\u00e7in k\u00fc\u00e7\u00fck bir g\u00fcvenlik ayarlarlar ama kullan\u0131c\u0131lara bu k\u00fc\u00e7\u00fck cihazlar\u0131n (kameralar\u0131n, routerlar\u0131n, yaz\u0131c\u0131lar\u0131n ve di\u011ferlerinin) parolalar\u0131n\u0131 de\u011fi\u015ftirmeleri gerekti\u011fini s\u00f6ylemezler. Hatta b\u00fcy\u00fck bir \u00e7o\u011funlu\u011fu kullan\u0131c\u0131lar\u0131n cihaz parolas\u0131n\u0131 de\u011fi\u015ftirmesine dahi izin vermez. Bu da Nesnelerin \u0130nterneti\u2019ni sald\u0131r\u0131 i\u00e7in m\u00fckemmel hale getiriyor. <\/p>\n<p>Bug\u00fcn 7 ila 19 milyar aras\u0131nda internete <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/22\/city-banks-plan-to-hoard-bitcoins-to-help-them-pay-cyber-ransoms\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">ba\u011fl\u0131 cihaz<\/a> var. Yap\u0131lan hesaplamalara g\u00f6re \u00f6n\u00fcm\u00fczdeki be\u015f y\u0131l i\u00e7erisinde bu say\u0131 30 ila 50 milyar aras\u0131na ula\u015facak. Ve y\u00fcksek ihtimalle bu cihazlar\u0131n b\u00fcy\u00fck bir \u00e7o\u011funlu\u011fu korunamayacak olacak. Ek olarak, Mirai\u2019den etkilenen cihazlar hala kullan\u0131labilir durumdalar \u2013 ordular\u0131na her ge\u00e7en g\u00fcn yeni cihazlar ekleniyor. <\/p>\n<p><strong>Uzun vadede neler olacak? <\/strong><br>\nSu\u00e7lular genellikle<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/industrial-vulnerabilities\/2257\/\" target=\"_blank\" rel=\"noopener noreferrer\"> end\u00fcstriyel yap\u0131lara<\/a>, <a href=\"http:\/\/www.news.com.au\/technology\/online\/hacking\/hackers-send-half-of-the-homes-in-ukraines-ivanofrankivsk-region-into-darkness\/news-story\/6e7fb4b8dc576f0ececfdd6bcb8d1b69\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">elektrik istasyonlar\u0131na<\/a>, <a href=\"http:\/\/www.securityweek.com\/attackers-alter-water-treatment-systems-utility-hack-report\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">su tesislerine<\/a> ve DNS sunucular\u0131na sald\u0131r\u0131rken botnet\u2019i kullan\u0131r. G\u00fcvenlik ara\u015ft\u0131rmac\u0131s\u0131 Bruce Schneier\u2019in g\u00f6zlemlerine ve d\u00fc\u015f\u00fcncelerine g\u00f6re, \u00e7ok g\u00fc\u00e7l\u00fc DDoS sald\u0131r\u0131s\u0131 yapabilecek biri t\u00fcm interneti kapatabilecek. <\/p>\n<p>Botnetler gittik\u00e7e b\u00fcy\u00fcyor ve test sald\u0131r\u0131lar\u0131 bittikten t\u00fcm g\u00fc\u00e7leri ile yapabilecekleri sald\u0131r\u0131n\u0131n \u015fiddetini tahmin etmek pek zor de\u011fil. Dyn\u2019ye yap\u0131lan sald\u0131r\u0131 kadar g\u00fc\u00e7l\u00fc bir d\u00fczine sald\u0131r\u0131n\u0131n ayn\u0131 anda yap\u0131ld\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcn. D\u00fcnyan\u0131n bir\u00e7ok yerinde internet kullan\u0131lmaz hale gelebilir. <\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The <a href=\"https:\/\/twitter.com\/hashtag\/Mirai?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Mirai<\/a> botnet has recruited nearly 500,000 <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#IoT<\/a> devices since its source code was released \u2013 <a href=\"https:\/\/t.co\/m8ooWKrjph\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/m8ooWKrjph<\/a><\/p>\n<p>\u2014 Threatpost (@threatpost) <a href=\"https:\/\/twitter.com\/threatpost\/status\/788736768455639040?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 19, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br>\n<strong><br>\nBotnet\u2019in par\u00e7as\u0131 olmak istemiyorum, ne yapabilirim?<\/strong><br>\nBir ki\u015fi Botnet\u2019e kar\u015f\u0131 hi\u00e7bir \u015fey yapamaz \u2013 ancak hep beraber olur ve Botnet\u2019e dahil olmazsak, o zaman g\u00fczel \u015feyler ba\u015farabiliriz. \u00d6ncelikle cihazlar\u0131n\u0131z\u0131n Mirai ya da benzeri bir yaz\u0131l\u0131m taraf\u0131ndan kontrol edilemez yapman\u0131z laz\u0131m. E\u011fer herkes bunu yaparsa, Botnet ordusu \u00f6nemsizle\u015ferek azal\u0131k. <\/p>\n<p>Router\u0131n\u0131z\u0131n, yaz\u0131c\u0131n\u0131z\u0131n ya da buzdolab\u0131n\u0131z\u0131n bu internetin karanl\u0131\u011f\u0131ndan kurtarmak i\u00e7in yapabilece\u011finiz birka\u00e7 basit ad\u0131m var. <\/p>\n<p>1.T\u00fcm cihazlar\u0131n\u0131zdaki varsay\u0131lan parolalar\u0131 de\u011fi\u015ftirin. <a href=\"https:\/\/www.kaspersky.com\/blog\/false-perception-of-it-security-passwords\/7036\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Sa\u011flam kombinasyonlar<\/a> kullan\u0131n. <\/p>\n<p>2.Cihazlar\u0131n\u0131z\u0131n \u2018varsa\u2019 g\u00fcncellemelerini s\u00fcrekli yap\u0131n. <\/p>\n<p>3.Ak\u0131ll\u0131 cihaz se\u00e7erken kendinize sorun: Ger\u00e7ekten internet ba\u011flant\u0131s\u0131na ihtiyac\u0131m var m\u0131? E\u011fer cevab\u0131n\u0131z \u201cevet!\u201d ise, cihaz\u0131 almadan \u00f6nce \u00f6zelliklerini ve yapabileceklerini \u00e7ok iyi ara\u015ft\u0131r\u0131n. E\u011fer parolas\u0131 de\u011fi\u015ftirilemeyen bir modelse, ba\u015fkas\u0131n\u0131 almaya \u00e7al\u0131\u015f\u0131n. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ge\u00e7en ay\u0131n en \u00f6nemli olay\u0131 devasa DDoS sald\u0131r\u0131s\u0131yd\u0131. Bu sald\u0131r\u0131 ile 80\u2019den fazla b\u00fcy\u00fck internet sitesi ve online hizme sa\u011flay\u0131c\u0131s\u0131na eri\u015filemedi. Bu sald\u0131r\u0131n\u0131n en \u00f6nemli noktas\u0131, internete ba\u011flanabilen her cihazdan<\/p>\n","protected":false},"author":522,"featured_media":2630,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[720,1033,1062,744,777,628,629,1063,634,510],"class_list":{"0":"post-2629","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-bagli-cihazlar","9":"tag-ddos","10":"tag-endustriyel-yapilar","11":"tag-guvenlik","12":"tag-internet","13":"tag-internet-of-things","14":"tag-iot","15":"tag-nesnelerin-interneti","16":"tag-parola","17":"tag-siber-suclular"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/attack-on-dyn-explained\/5641\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/attack-on-dyn-explained\/3940\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/attack-on-dyn-explained\/7925\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/attack-on-dyn-explained\/7867\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/attack-on-dyn-explained\/7901\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/attack-on-dyn-explained\/9420\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/attack-on-dyn-explained\/9237\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/attack-on-dyn-explained\/13471\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/attack-on-dyn-explained\/13325\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/attack-on-dyn-explained\/6240\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/attack-on-dyn-explained\/6764\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/attack-on-dyn-explained\/5587\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/attack-on-dyn-explained\/9074\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/attack-on-dyn-explained\/13047\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/attack-on-dyn-explained\/13471\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/attack-on-dyn-explained\/13325\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/attack-on-dyn-explained\/13325\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/nesnelerin-interneti\/","name":"nesnelerin interneti"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/522"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=2629"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2629\/revisions"}],"predecessor-version":[{"id":7114,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2629\/revisions\/7114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/2630"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=2629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=2629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=2629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}