{"id":3696,"date":"2017-09-06T10:26:07","date_gmt":"2017-09-06T07:26:07","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=3696"},"modified":"2019-11-15T14:48:59","modified_gmt":"2019-11-15T11:48:59","slug":"hacking-industrial-robots","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/hacking-industrial-robots\/3696\/","title":{"rendered":"End\u00fcstriyel robotlar\u0131 hacklemek"},"content":{"rendered":"<p>Ekran\u0131n\u0131zda fidye yaz\u0131l\u0131m\u0131 iletisini g\u00f6rmek ne kadar k\u00f6t\u00fc olsa da WannaCry veya ExPetr\/NotPetya ba\u015f\u0131n\u0131za gelebilecek en k\u00f6t\u00fc \u015fey de\u011fildir. Ara\u015ft\u0131rmac\u0131lar, Black Hat hack konferans\u0131ndadaha fiziksel sald\u0131r\u0131lar\u0131n m\u00fcmk\u00fcn oldu\u011funu g\u00f6sterdi.<\/p>\n<p>D\u00fcnya genelinde binlerce fabrikada \u00f6nceden programlanm\u0131\u015f rutinleri takip ederek mekanik manip\u00fclat\u00f6rlerle kutular\u0131 ta\u015f\u0131yan, par\u00e7alar\u0131 delen ve ba\u015fka i\u015fler yapan robotlar kullan\u0131l\u0131r. Bilgisayar (operat\u00f6r taraf\u0131ndan denetleme i\u00e7in kullan\u0131l\u0131r), kontrol\u00f6r ve mekanik ayg\u0131tlardan olu\u015fan bu robotlar son derece karma\u015f\u0131kt\u0131r. Kontrol bilgisayar\u0131nda &#8220;kutuyu kald\u0131rma&#8221; veya &#8220;kolu d\u00f6nd\u00fcrme&#8221; gibi mant\u0131ksal i\u015flemlere sahip bir program olu\u015fturulur ve kontrol\u00f6r bu i\u015flemleri bir dizi k\u00fc\u00e7\u00fck a\u015famaya b\u00f6ler.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2017\/09\/06101109\/Black-Hat-Industrial-Robot-1.png\" alt=\"\" width=\"1200\" height=\"669\" class=\"alignnone size-full wp-image-3698\" \/><\/p>\n<p>Bir\u00e7ok etkeni kapsayan bu s\u00fcre\u00e7 olduk\u00e7a girifttir. \u00d6rne\u011fin bir kutunun yava\u015f\u00e7a ve belirli bir y\u00fcksekli\u011fe kald\u0131r\u0131lmas\u0131 gerekir. Ayn\u0131 zamanda ta\u015f\u0131nan par\u00e7an\u0131n s\u0131k\u0131ca kavranmas\u0131 i\u00e7in &#8220;parmaklar\u0131n&#8221; s\u0131k\u0131\u015ft\u0131rma g\u00fcc\u00fc belirli bir de\u011ferde sabit kalmal\u0131d\u0131r. Kontrol\u00f6r, tam olarak belirtilen anda servo motorlara belirli bir gerilim uygulamak i\u00e7in gereken verilere sahip yap\u0131land\u0131rma dosyalar\u0131n\u0131 depolar. Bu sayede manip\u00fclat\u00f6r kutuyu do\u011fru \u015fekilde kald\u0131rabilir. <\/p>\n<p>Siber g\u00fcvenli\u011fi y\u00f6netmek<\/p>\n<p>End\u00fcstriyel robot geli\u015ftiricileri bulu\u015flar\u0131n\u0131n g\u00fcvenli bir \u015fekilde \u00e7al\u0131\u015fmas\u0131 i\u00e7in \u00e7ok fazla \u00e7aba harcamaktad\u0131r. \u00c7al\u0131\u015fma sorunlar\u0131 veya robot ar\u0131zas\u0131 durumunda \u00e7e\u015fitli g\u00fcvenlik cihazlar\u0131, mant\u0131ksal kontroller ve kullan\u0131c\u0131 k\u0131lavuzlar\u0131 hem fabrikay\u0131 hem de operat\u00f6rleri maddi zarar ve yaralanmalardan korur. Ayn\u0131 zamanda fabrika altyap\u0131s\u0131n\u0131n &#8220;g\u00fcvenli&#8221; oldu\u011fu varsay\u0131l\u0131r. Yani bir robot kontrol bilgisayar\u0131na tamamen g\u00fcvenir. <\/p>\n<p>Ancak bu varsay\u0131m her zaman i\u00e7in do\u011fru de\u011fildir. Milano Teknik \u00dcniversitesi ve Trend Micro&#8217;dan gelen bir grup ara\u015ft\u0131rmac\u0131 baz\u0131 robotlar\u0131n do\u011frudan \u0130nternet&#8217;e (\u00f6rne\u011fin \u00fcreticiden g\u00fcncellemeleri almak veya \u015firket merkezine telemetri verilerini g\u00f6ndermek i\u00e7in) veya yeterince izole edilmemi\u015f fabrika Wi-Fi a\u011f\u0131na ba\u011fl\u0131 oldu\u011funu ke\u015ffetti. Bu durum k\u00f6t\u00fc niyetli ki\u015filerin \u00f6zel bir taray\u0131c\u0131 yard\u0131m\u0131yla robotlar\u0131 ke\u015ffetmesini kolayla\u015ft\u0131r\u0131r. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2017\/09\/06101237\/Black-Hat-Industrial-Robot-2.png\" alt=\"\" width=\"1200\" height=\"660\" class=\"alignnone size-full wp-image-3699\" \/><\/p>\n<p>Robotlar kolay avd\u0131r. \u00dcr\u00fcn yaz\u0131l\u0131m\u0131 g\u00fcncellenirken hi\u00e7bir \u015fifreleme kullan\u0131lmaz, dijital olarak imzalanm\u0131\u015f \u00fcr\u00fcn yaz\u0131l\u0131mlar\u0131 yoktur ve varsay\u0131lan kullan\u0131c\u0131 adlar\u0131 ve \u015fifreler kullan\u0131l\u0131r. Dolay\u0131s\u0131yla bir robotun IP adresini bulan herhangi bir ki\u015fi robotun yap\u0131land\u0131rma dosyalar\u0131n\u0131 ve \u00e7al\u0131\u015fma mant\u0131\u011f\u0131n\u0131 de\u011fi\u015ftirebilir. <\/p>\n<p>Robotlar neden hacklenir?<\/p>\n<p>Hacker&#8217;\u0131n ama\u00e7lar\u0131na ba\u011fl\u0131 olarak bu f\u0131rsat hem casusluk (\u00fcretim s\u0131rlar\u0131n\u0131 ke\u015ffetmek i\u00e7in mevcut yap\u0131land\u0131rma dosyalar\u0131n\u0131 indirerek) hem de sabotaj i\u00e7in kullan\u0131labilir. Ara\u015ft\u0131rmac\u0131lar d\u00fcz \u00e7izgiler \u00e7izmesi gereken bir robota (ger\u00e7ek hayatta elektrik ark kayna\u011f\u0131 i\u015flemi ger\u00e7ekle\u015ftirebilir) zekice bir sald\u0131r\u0131 d\u00fczenledi. Robot hacklendi\u011finde manip\u00fclat\u00f6r\u00fc \u00e7ok hafif bir \u015fekilde, bir milimetreden bile daha k\u00fc\u00e7\u00fck bir oranda kayd\u0131rd\u0131. Bu hata \u00e7\u0131plak g\u00f6zle fark edilememesine ra\u011fmen ortaya \u00e7\u0131kan \u00fcr\u00fcn\u00fcn kusurlu olmas\u0131na sebep oldu. Robotun programlamas\u0131 de\u011fi\u015ftirilmedi. Etkilenen tek \u015fey kontrol\u00f6r\u00fcn parametreleriydi.<\/p>\n<p><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='640' height='390' src='https:\/\/www.youtube.com\/embed\/ufLyfUnzZRY?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span><\/p>\n<p>Di\u011fer sald\u0131r\u0131lar hen\u00fcz varsay\u0131m niteli\u011finde olsa da bu sald\u0131r\u0131lar\u0131n baz\u0131lar\u0131 operat\u00f6r i\u00e7in tehlikeli olabilir. \u00d6rne\u011fin hareket eden bir robot, hareket e\u015fi\u011fi de\u011fi\u015ftirilecek \u015fekilde yeniden programlanabilir. B\u00f6yle bir de\u011fi\u015fim feci sonu\u00e7lar do\u011furabilir.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2017\/09\/06101345\/Black-Hat-Industrial-Robot-3.png\" alt=\"\" width=\"1200\" height=\"684\" class=\"alignnone size-full wp-image-3700\" \/><\/p>\n<p>K\u0131sa vadede bu t\u00fcr sald\u0131r\u0131lara kar\u015f\u0131 savunma i\u00e7in bilinen siber g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapatacak \u00fcretici yamalar\u0131 uygulaman\u0131n yan\u0131 s\u0131ra d\u0131\u015f d\u00fcnyan\u0131n robotlara eri\u015fimini azaltarak mevcut robotlar\u0131n g\u00fcvenli\u011fini artt\u0131rmak kullan\u0131labilir. Uzun vadede ise robot \u00fcreticileri yaln\u0131zca fiziksel ve elektriksel g\u00fcvenli\u011fe de\u011fil ayn\u0131 zamanda siber g\u00fcvenli\u011fe de \u00f6ncelik vererek yeni yakla\u015f\u0131mlar bulmal\u0131 ve \u00fcr\u00fcn standartlar\u0131n\u0131 g\u00fcncellemelidir. Bu noktada, Kaspersky Lab&#8217;in bu hedeflere ula\u015fmak i\u00e7in kritik altyap\u0131 g\u00fcvenlik \u00e7\u00f6z\u00fcmleri sundu\u011funu belirtmek gerekir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ekran\u0131n\u0131zda fidye yaz\u0131l\u0131m\u0131 iletisini g\u00f6rmek ne kadar k\u00f6t\u00fc olsa da WannaCry veya ExPetr\/NotPetya ba\u015f\u0131n\u0131za gelebilecek en k\u00f6t\u00fc \u015fey de\u011fildir. Ara\u015ft\u0131rmac\u0131lar, Black Hat hack konferans\u0131ndadaha fiziksel sald\u0131r\u0131lar\u0131n m\u00fcmk\u00fcn oldu\u011funu g\u00f6sterdi.<\/p>\n","protected":false},"author":32,"featured_media":3697,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1194,1727,1351],"tags":[1317,1318,950,1319,282,1326,906,1325],"class_list":{"0":"post-3696","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-business","9":"category-smb","10":"category-threats","11":"tag-bhusa","12":"tag-klbh17","13":"tag-black-hat","14":"tag-black-hat-2017","15":"tag-cybersecurity","16":"tag-endustriyel-siber-guvenlik","17":"tag-ics","18":"tag-industrial-cybersecurity"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hacking-industrial-robots\/3696\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacking-industrial-robots\/11081\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacking-industrial-robots\/12267\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacking-industrial-robots\/11118\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacking-industrial-robots\/14019\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacking-industrial-robots\/14043\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacking-industrial-robots\/18152\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacking-industrial-robots\/17879\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hacking-industrial-robots\/9595\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hacking-industrial-robots\/7187\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacking-industrial-robots\/14314\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/hacking-industrial-robots\/8273\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacking-industrial-robots\/17481\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacking-industrial-robots\/17651\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/black-hat\/","name":"black hat"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=3696"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3696\/revisions"}],"predecessor-version":[{"id":7036,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/3696\/revisions\/7036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/3697"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=3696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=3696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=3696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}