{"id":2806,"date":"2016-12-28T02:34:17","date_gmt":"2016-12-28T07:34:17","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=2806"},"modified":"2019-11-15T14:54:04","modified_gmt":"2019-11-15T11:54:04","slug":"botnets-explained","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/botnets-explained\/2806\/","title":{"rendered":"Zombi bilgisayarlar ve korunma yollar\u0131"},"content":{"rendered":"<p>E\u011fer blo\u011fumuzu takip ediyorsan\u0131z botnet dedi\u011fimiz \u015feyler hakk\u0131nda bilginiz vard\u0131r. \u0130nternete ba\u011fl\u0131 bulunan her cihaz botnet\u2019in par\u00e7as\u0131 haline getirilebilir \u2013 zombile\u015ftirilebilir. Bilgisayarlar, ak\u0131ll\u0131 telefonlar, tabletler, modemler, internet \u00f6zelli\u011fi bulunan buzdolaplar\u0131, ak\u0131ll\u0131 oyuncalar ve akl\u0131n\u0131za gelebilecek her t\u00fcrl\u00fc internet eri\u015fimi olan cihaz dahil.<\/p>\n<p>Bu yaz\u0131m\u0131zda sizlere botnet\u2019in ne oldu\u011funuz, yapabilece\u011fi k\u00f6t\u00fc \u015feyleri ve kendi cihazlar\u0131n\u0131z\u0131 bu zombie ordusunun par\u00e7as\u0131 olmaktan nas\u0131l koruyabilece\u011finizi anlataca\u011f\u0131z.<\/p>\n<h1><strong>Botnet nedir?<\/strong><\/h1>\n<p>Botnet, bir grup internete ba\u011flanan cihaz\u0131n \u00f6zel bir zararl\u0131 yaz\u0131l\u0131mdan etkilenmi\u015f olmas\u0131 durumudur. Bu tarz zararl\u0131 yaz\u0131l\u0131mlar bula\u015ft\u0131klar\u0131 cihazlar\u0131 botlara ya da daha a\u00e7\u0131k s\u00f6ylemek gerekirse zombilere \u00e7evirir, gizlice \u00e7al\u0131\u015f\u0131r, kendi yap\u0131s\u0131n\u0131 bozmadan zararl\u0131 yaz\u0131l\u0131m\u0131 bula\u015ft\u0131ran siber su\u00e7luya t\u00fcm y\u00f6netici haklar\u0131n\u0131 verir. Hacklenen cihaz her zamanki gibi normal olarak \u00e7al\u0131\u015f\u0131r \u2013 e\u015f zamanl\u0131 olarak botnet y\u00f6neticisinden ald\u0131\u011f\u0131 emirleri yerine getirir. Zararl\u0131 yaz\u0131l\u0131m bula\u015fm\u0131\u015f b\u00fct\u00fcn cihazlar hep birlikte siber su\u00e7 i\u015flemek i\u00e7in g\u00fc\u00e7l\u00fc bir altyap\u0131 olu\u015fturur.<\/p>\n<p>Baz\u0131 botnet y\u00f6neticileri sadece destekleme ve geli\u015ftirme konusunda uzmanla\u015fm\u0131\u015ft\u0131r. Su\u00e7lulara zararl\u0131 programlar kiralayarak k\u00f6t\u00fc emellerine ula\u015fmalar\u0131n\u0131 kolayla\u015ft\u0131r\u0131r. Botnet\u2019i kullanman\u0131n en yayg\u0131n d\u00f6rt yolundan bahsedece\u011fiz.<\/p>\n<p><strong>DDoS <\/strong><br>\nBotnet\u2019i kullan\u0131n en yayg\u0131n yolu <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">DDoS<\/a> sald\u0131r\u0131s\u0131 d\u00fczenlemektir. K\u0131saca botnet ordusu sunucuyu l\u00fczumsuz taleplerle doldurur. Bu taleplerle dolan sunucu i\u015flemleri ger\u00e7ekle\u015ftirememeye ba\u015flar var kullan\u0131lmaz hale gelir.<br>\nBotnet ordusunda ne kadar ba\u011fl\u0131 cihaz varsa, DDoS sald\u0131r\u0131s\u0131 da o kadar g\u00fc\u00e7l\u00fc olur. Garip olan, neredeyse internete ba\u011fl\u0131 olan her cihaz bu sald\u0131r\u0131larda kullan\u0131labilir. Hatta interneti tam anlam\u0131yla kullanmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fc\u011f\u00fcn\u00fcz gizli kameralar, wi-fi yaz\u0131c\u0131lar da botnet\u2019in par\u00e7as\u0131 haline gelip sald\u0131r\u0131lara kat\u0131labilirler.<\/p>\n<p>Bug\u00fcn internete ba\u011flanabilen milyonlarca cihaz var ama yak\u0131nda bu say\u0131 milyarlara y\u00fckselecek. Hepsi \u00e7ok iyi korunuyor olmayacak ve ka\u00e7\u0131n\u0131lmaz \u015fekilde bir\u00e7o\u011fu botnet\u2019in par\u00e7as\u0131 haline gelecek.<\/p>\n<p>B\u00fcy\u00fck botnet ordular\u0131 ger\u00e7ekten b\u00fcy\u00fck i\u015fler ba\u015farabilir. Mesela yakla\u015f\u0131k bir ay \u00f6nce siber su\u00e7lular 80\u2019den fazla b\u00fcy\u00fck internet servisine (\u0130nternet servis sa\u011flay\u0131c\u0131lar\u0131, Twitter, Amazon, PayPal ve Netflix dahil) sald\u0131r\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/attack-on-dyn-explained\/2629\/\" target=\"_blank\" rel=\"noopener noreferrer\">d\u00fczenlediler<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"tr\" dir=\"ltr\">\u0130nterneti nas\u0131l \u2018k\u0131rmazs\u0131n\u0131z\u2019 <a href=\"https:\/\/t.co\/3GkYKeaY4R\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/3GkYKeaY4R<\/a> <a href=\"https:\/\/t.co\/DGxZSV82yR\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/DGxZSV82yR<\/a><\/p>\n<p>\u2014 Kaspersky T\u00fcrkiye (@KasperskyTR) <a href=\"https:\/\/twitter.com\/KasperskyTR\/status\/796951837077307392?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 11, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><strong>Spam <\/strong><br>\nE\u011fer spam fitreniz yoksa ya da do\u011fru \u00e7al\u0131\u015fm\u0131yorsa, spam maillerinin mail kutunuzu nas\u0131l dolduraca\u011f\u0131n\u0131 tahmin edemezsiniz. Peki spam kampanyalar\u0131nda zombi ordusunu nas\u0131l kulland\u0131klar\u0131n\u0131 biliyor musunuz? Su\u00e7lular\u0131n botnetlerinin IP\u2019lerini ve e-maillerini engelleyen \u00f6zel kurulu\u015flar\u0131n ve sa\u011flay\u0131c\u0131lar\u0131 a\u015fmas\u0131 laz\u0131m.<\/p>\n<p>Bir bilgisayara bi zararl\u0131 yaz\u0131l\u0131m bula\u015ft\u0131\u011f\u0131 zaman siber su\u00e7lular mail g\u00f6ndermek i\u00e7in bilgisayar sahibinin mail adresini kullan\u0131r. Ek olarak mail adresinizi sonraki i\u015flerinde de kullanmak i\u00e7in ellerindeki veri taban\u0131na eklerler.<\/p>\n<p><strong>Veri h\u0131rs\u0131zl\u0131\u011f\u0131<\/strong><br>\nTabi, ki\u015fi listeleri her hacklenmi\u015f cihazdan \u00e7al\u0131nabilecek \u015feyler de\u011fillerdir. Bilgisayara bula\u015fan zararl\u0131 yaz\u0131l\u0131mlar bilgisayara ba\u015fka ek \u00f6zellikler ekleyebilir. Bazen mobil cihazlardan ve bilgisayarlardan internet bankac\u0131l\u0131\u011f\u0131 parolalar\u0131n\u0131 \u00e7alarlar. Baz\u0131 Trojanlar ziyaret etti\u011finiz bankac\u0131l\u0131k sitelerini de\u011fi\u015ftirerek kredi kart\u0131 ve PIN kodu gibi bilgilerinizi \u00e7almaya \u00e7al\u0131\u015f\u0131r.<\/p>\n<p><strong>Orduya adam toplama <\/strong><br>\nBotnetler ayr\u0131ca Trojan, vir\u00fcs bula\u015ft\u0131rmak, ba\u015fka cihazlar\u0131 da botnet\u2019e dahil etmek i\u00e7in ba\u015fka cihazlar\u0131n a\u00e7\u0131klar\u0131n\u0131 ararlar.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Statistics?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Statistics<\/a> for botnet-assisted <a href=\"https:\/\/twitter.com\/hashtag\/DDoS?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#DDoS<\/a> attacks <a href=\"https:\/\/t.co\/YWaSGz0RCp\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YWaSGz0RCp<\/a> via <a href=\"https:\/\/twitter.com\/Securelist?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@Securelist<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/KLReport?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#KLReport<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/netsec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#netsec<\/a> <a href=\"https:\/\/t.co\/ebouvPvIqE\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/ebouvPvIqE<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/793107844270854145?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 31, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2><strong>Nas\u0131l g\u00fcvende kal\u0131n\u0131r<\/strong><\/h2>\n<p>Bu basit kurallar size bula\u015fma \u015fans\u0131n\u0131 d\u00fc\u015f\u00fcrecektir.<\/p>\n<p>1. T\u00fcm y\u00f6nlendiricilerinizin (router), web kameralar\u0131n\u0131z\u0131n, yaz\u0131c\u0131lar\u0131n\u0131z\u0131n, ak\u0131ll\u0131 ev aletlerinizin ve di\u011fer ba\u011fl\u0131 cihazlar\u0131n\u0131z\u0131n varsay\u0131lan parolalar\u0131n\u0131 de\u011fi\u015ftirin.<\/p>\n<p>2. Bilgisayar\u0131n\u0131zda bulunan i\u015fletim sistemini ve programlar\u0131n\u0131z\u0131 g\u00fcncel tutun.<\/p>\n<p>3. Bilgisayar\u0131n\u0131zdan y\u00f6netici hesab\u0131n\u0131 kullanmay\u0131n. Mobil cihazlar\u0131n\u0131zda k\u00f6k dizin eri\u015fimini s\u00fcrekli kapal\u0131 tutun ya da hi\u00e7 kullanmay\u0131n \u2013 emin olun daha iyi olacak.<\/p>\n<p>4. \u00dc\u00e7\u00fcnc\u00fc parti internet sitelerinden bir \u015feyler indirirken \u00e7ok dikkatli olun (\u00f6zellikle korsan i\u00e7erik indiriyorsan\u0131z). Su\u00e7lular genellikle bu tarz programlar\u0131 oyun ve program torrentlerine y\u00fcklerler.<\/p>\n<p>5. Torrentten ya da ba\u015fka bir yerden i\u00e7erik indirecekseniz (kesinlikle \u00f6nermiyoruz), t\u00fcm dosyalar\u0131 \u00f6nce iyi bir anti vir\u00fcs program\u0131 ile taray\u0131n.<\/p>\n<p>6. E\u011fer bu tarz \u015feylerden uzak duruyorsan\u0131z bile g\u00fc\u00e7l\u00fc bir <a href=\"http:\/\/kas.pr\/kdkistr\" target=\"_blank\" rel=\"noopener noreferrer\">g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> y\u00fckleyin ve bilgisayar\u0131n\u0131z\u0131 g\u00fcvende tutun.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>E\u011fer blo\u011fumuzu takip ediyorsan\u0131z botnet dedi\u011fimiz \u015feyler hakk\u0131nda bilginiz vard\u0131r. \u0130nternete ba\u011fl\u0131 bulunan her cihaz botnet\u2019in par\u00e7as\u0131 haline getirilebilir \u2013 zombile\u015ftirilebilir. Bilgisayarlar, ak\u0131ll\u0131 telefonlar, tabletler, modemler, internet \u00f6zelli\u011fi bulunan buzdolaplar\u0131, ak\u0131ll\u0131 oyuncalar ve akl\u0131n\u0131za gelebilecek her t\u00fcrl\u00fc internet eri\u015fimi olan cihaz dahil.<\/p>\n","protected":false},"author":40,"featured_media":2807,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351],"tags":[1039,392,1033,744,777,610,677,537,607],"class_list":{"0":"post-2806","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"tag-ag","10":"tag-botnet","11":"tag-ddos","12":"tag-guvenlik","13":"tag-internet","14":"tag-ipucu","15":"tag-oneri","16":"tag-tehditler","17":"tag-veri"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/botnets-explained\/2806\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/botnets-explained\/5729\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/botnets-explained\/4045\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/botnets-explained\/10538\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/botnets-explained\/8054\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/botnets-explained\/8086\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/botnets-explained\/9630\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/botnets-explained\/9434\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/botnets-explained\/13682\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/botnets-explained\/13554\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/botnets-explained\/6393\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/botnets-explained\/6782\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/botnets-explained\/5794\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/botnets-explained\/9318\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/botnets-explained\/13377\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/botnets-explained\/13682\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/botnets-explained\/13554\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/botnets-explained\/13554\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/botnet\/","name":"botnet"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=2806"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2806\/revisions"}],"predecessor-version":[{"id":7099,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/2806\/revisions\/7099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/2807"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=2806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=2806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=2806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}