{"id":4793,"date":"2018-03-15T11:20:55","date_gmt":"2018-03-15T08:20:55","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=4793"},"modified":"2018-09-18T15:31:40","modified_gmt":"2018-09-18T12:31:40","slug":"miners-threaten-your-business","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/miners-threaten-your-business\/4793\/","title":{"rendered":"Gizli madencilik \u015firketinizi nas\u0131l tehdit ediyor"},"content":{"rendered":"<p><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-end-of-the-year-2017\/4514\/\" target=\"_blank\" rel=\"noopener\">2017 y\u0131l\u0131n\u0131 g\u00f6z \u00f6n\u00fcnde bulundurarak<\/a> <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/from-ransomware-to-webminers\/4437\/\" target=\"_blank\" rel=\"noopener\">\u00f6n\u00fcm\u00fczdeki y\u0131l i\u00e7in sihirli k\u00fcremize bak\u0131nca<\/a>, kripto para madencisi g\u00f6r\u00fcn\u00fcm\u00fcndeki daha yeni ve geli\u015fmi\u015f siber tehditlerin 2017 y\u0131l\u0131nda ortal\u0131\u011f\u0131 sallayan fidye yaz\u0131l\u0131mlar\u0131n\u0131 taht\u0131ndan edece\u011fini \u015fimdiden g\u00f6rebiliyoruz. Yapt\u0131\u011f\u0131m\u0131z <a href=\"https:\/\/securelist.com\/mining-is-the-new-black\/84232\/\" target=\"_blank\" rel=\"noopener\">son ara\u015ft\u0131rman\u0131n sonu\u00e7lar\u0131na g\u00f6re<\/a> madenciler beklentileri kar\u015f\u0131lamakla kalmay\u0131p bunlar\u0131n \u00fczerine bile \u00e7\u0131km\u0131\u015f.<\/p>\n<p>Siber su\u00e7lular, ge\u00e7ti\u011fimiz alt\u0131 ayda kripto madenler \u00fczerinden 7 milyon dolardan daha y\u00fcksek miktarda kazan\u00e7 sa\u011flam\u0131\u015f. Bu yaz\u0131m\u0131zda madencilerin kullan\u0131c\u0131lar\u0131n bilgisayar\u0131 \u00fczerinde nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131, neden (\u00f6zellikle \u015firketler i\u00e7in) bu denli b\u00fcy\u00fck bir tehdit haline geldiklerini ve altyap\u0131n\u0131z\u0131 su\u00e7lulara kar\u015f\u0131 koruman\u0131n yollar\u0131n\u0131 a\u00e7\u0131klayaca\u011f\u0131z.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4794\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2018\/03\/15104253\/malicious-crypto-miners-featured-1024x672.png\" alt=\"\" width=\"1024\" height=\"672\"><\/p>\n<h2>Madencilerin y\u00fckseli\u015fi<\/h2>\n<p>2017 y\u0131l\u0131nda Bitcoin ve altcoin (alternatif kripto paralar) d\u00f6viz kurlar\u0131 stratosfere kadar y\u00fckselince, elinde ger\u00e7ek paraya da d\u00f6n\u00fc\u015ft\u00fcr\u00fclebilen bu kripto paralardan bulundurman\u0131n ne derece kazan\u00e7l\u0131 bir i\u015f oldu\u011funu herkes g\u00f6rm\u00fc\u015f oldu. Kripto para ekonomisinin en cazip yanlar\u0131ndan biri de, ger\u00e7ek paran\u0131n aksine, isteyen herkesin matematiksel hesaplamalar ile blok zincir \u00fczerine eklemeler yaparak kar\u015f\u0131l\u0131\u011f\u0131nda \u00f6d\u00fcller kazanabilme \u015fans\u0131n\u0131n bulunmas\u0131. (<a href=\"https:\/\/www.kaspersky.com\/blog\/bitcoin-blockchain-issues\/18019\/\" target=\"_blank\" rel=\"noopener nofollow\">Buradan<\/a> blok zincirlerin nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 daha detayl\u0131 \u015fekilde \u00f6\u011frenebilirsiniz.)<\/p>\n<p>Maden havuzlar\u0131n\u0131n (madencileri birle\u015ftiren kurumlar) genel kural\u0131, herkese yapt\u0131\u011f\u0131 hesaplamalar kadar kripto para kazanma f\u0131rsat\u0131 verilmesi. Ancak sorun \u015fu ki; ne kadar fazla hesaplama ger\u00e7ekle\u015ftirmek isterseniz o kadar y\u00fcksek bir bilgisayar g\u00fcc\u00fcne ihtiya\u00e7 duyuyorsunuz ve bu oran y\u00fckseldik\u00e7e daha fazla elektrik t\u00fcketiyorsunuz.<\/p>\n<p>Durum b\u00f6yle olunca, siber su\u00e7lular yak\u0131n zamanda kripto para madencili\u011fi i\u00e7in di\u011fer kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131ndan yararlanma fikrini buldu; sonu\u00e7ta \u0130nternet teknolojilerinin a\u00e7\u0131klar\u0131n\u0131 bularak para kazanmak art\u0131k bu insanlar\u0131n genlerine i\u015flemi\u015f. Tabii ki ideal olan, bilgisayarlar sahiplerinin ya da y\u00f6neticilerinin haberi olmadan hesaplamalar\u0131 kurbanlar\u0131n bilgisayarlar\u0131 \u00fczerinden yapmakt\u0131. Bariz sebeplerden \u00f6t\u00fcr\u00fc, siber su\u00e7lular \u00f6zellikle y\u00fczlerce makineyi i\u00e7eren geni\u015f \u015firket a\u011flar\u0131n\u0131 g\u00f6zlerine kestirdiler.<\/p>\n<p>Ve bu kurnaz planlar\u0131n\u0131 hayata ge\u00e7irmede git gide ustala\u015f\u0131yorlar. Bahsetti\u011fimiz gibi, d\u00fcnya \u00e7ap\u0131nda 2.7 milyondan fazla kullan\u0131c\u0131, \u201ck\u00f6t\u00fc niyetli madenciler\u201d taraf\u0131ndan sald\u0131r\u0131ya u\u011frad\u0131. B\u00f6ylece kurbanlar\u0131n say\u0131s\u0131 2016 y\u0131l\u0131na g\u00f6re 1.5 kat artt\u0131 ve y\u00fckselmeye de devam ediyor. \u015eimdi biraz sald\u0131rganlar\u0131n kulland\u0131\u011f\u0131 teknolojilerden bahsedelim.<\/p>\n<h2>Gizli tehdit<\/h2>\n<p>\u0130lk y\u00f6ntem, <a href=\"https:\/\/securelist.com\/threats\/apt-advanced-persistent-threats-glossary\/\" target=\"_blank\" rel=\"noopener\">geli\u015fmi\u015f kal\u0131c\u0131 tehditler<\/a> (APT) i\u00e7in kullan\u0131lan teknolojilerin b\u00fct\u00fcn karakteristik \u00f6zelliklerini ta\u015f\u0131yor. Bu tehditleri yak\u0131n zamanda ger\u00e7ekle\u015fen b\u00fcy\u00fck \u00e7apl\u0131 <a href=\"https:\/\/securelist.com\/threats\/ransomware-glossary\/\" target=\"_blank\" rel=\"noopener\">fidye yaz\u0131l\u0131m<\/a> sald\u0131r\u0131lar\u0131ndan hat\u0131rlayabilirsiniz. T\u0131pk\u0131 me\u015fhur EternalBlue g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olay\u0131ndaki gibi, burada da ayn\u0131 y\u00f6ntemler kullan\u0131larak gizli madencilerin da\u011f\u0131l\u0131m\u0131 sa\u011flan\u0131yor.<\/p>\n<p>Kurban\u0131n bilgisayar\u0131na bir gizli madenci yerle\u015ftirmenin bir di\u011fer yolu ise, kullan\u0131c\u0131y\u0131 sonunda bilgisayara madenciyi y\u00fckleyen bir <a href=\"https:\/\/securelist.com\/threats\/dropper-glossary\/\" target=\"_blank\" rel=\"noopener\">dropper (dosya y\u00fckleyici)<\/a> y\u00fcklemeye ikna etmek. Siber su\u00e7lular genelde dropper\u2019lar\u0131 reklam veya \u00fccretsiz \u00fcr\u00fcn s\u00fcr\u00fcm\u00fc g\u00f6r\u00fcn\u00fcm\u00fcnde gizleyerek kullan\u0131c\u0131lara cazip hale getiriyor ya da \u00e7e\u015fitli kimlik av\u0131 teknikleri kullan\u0131yorlar.<\/p>\n<p>Dropper, y\u00fcklemenin ard\u0131ndan bilgisayarda \u00e7al\u0131\u015fmaya ba\u015fl\u0131yor ve esas madenci ile bu madenciyi sistemde gizlemeye yarayan \u00f6zel arac\u0131 y\u00fckl\u00fcyor. Paket i\u00e7inde otomatik ba\u015flatma ve otomatik yap\u0131land\u0131rma ara\u00e7lar\u0131 da bulunabiliyor. Bu ara\u00e7lar, \u00f6rne\u011fin \u00e7al\u0131\u015fmakta olan di\u011fer programlara g\u00f6re madencinin kullanabilece\u011fi i\u015flem g\u00fcc\u00fc miktar\u0131n\u0131 yap\u0131land\u0131rarak sistemin yava\u015flamas\u0131n\u0131 ya da kullan\u0131c\u0131n\u0131n durumdan \u015f\u00fcphelenmesini engelleyebiliyor.<\/p>\n<p>Bu ara\u00e7lar ayr\u0131ca kullan\u0131c\u0131n\u0131n madenciyi engellemesinin de \u00f6n\u00fcne ge\u00e7iyor. Kullan\u0131c\u0131 madenciyi fark ederse ve engellemeye \u00e7al\u0131\u015f\u0131rsa bilgisayar hemen yeniden ba\u015flat\u0131l\u0131yor; b\u00f6ylece madenci, i\u015fine kald\u0131\u011f\u0131 yerden devam edebiliyor. \u0130lgin\u00e7 bir \u015fekilde, gizli madencilerin \u00e7o\u011fu, yasal kopyalar\u0131n\u0131n kodlar\u0131n\u0131 yeniden kullan\u0131yor; bu \u015fekilde tespit edilmeleri daha da g\u00fc\u00e7 hale geliyor.<\/p>\n<p>\u0130llegal kripto para madencili\u011finin bir yolu daha var: <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/from-ransomware-to-webminers\/4437\/\" target=\"_blank\" rel=\"noopener\">web madencili\u011fi<\/a>, ya da di\u011fer ad\u0131yla, taray\u0131c\u0131 madencili\u011fi. Bu i\u015flem, site y\u00f6neticisinin kurbanlar siteyi ziyaret etti\u011fi zaman taray\u0131c\u0131da \u00e7al\u0131\u015fmaya ba\u015flayan bir madencilik komut dosyas\u0131n\u0131 siteye gizlemesiyle ger\u00e7ekle\u015fiyor. Ayn\u0131 i\u015flemi site y\u00f6netimine eri\u015fim sa\u011flayan sald\u0131rganlar da uygulayabiliyor. Kullan\u0131c\u0131 sitedeyken, bilgisayar zincirler kurmaya ba\u015fl\u0131yor ve komut dosyas\u0131n\u0131 yerle\u015ftiren su\u00e7lular, bu zincirler \u00fczerinden para kazan\u0131yor.<\/p>\n<h2>\u015eirketler cihazlar\u0131n\u0131 madencilerden nas\u0131l koruyabilir?<\/h2>\n<p>G\u00fcn\u00fcm\u00fcz\u00fcn geli\u015fmi\u015f sald\u0131r\u0131 teknolojileri ve bunlar\u0131n olduk\u00e7a zor tespit ediliyor olmas\u0131, siber su\u00e7lular\u0131n kurbanlar\u0131n bilgisayarlar\u0131 \u00fczerinden eksiksiz <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/hidden-miners-botnet-threat\/3741\/\" target=\"_blank\" rel=\"noopener\">botnet<\/a>\u2018ler yaratarak bunlar\u0131 gizli madencilik i\u00e7in kullanmas\u0131na olanak tan\u0131yor. Beklendi\u011fi \u00fczere, b\u00fcy\u00fck i\u015flem kapasitesine sahip \u015firket altyap\u0131lar\u0131, siber su\u00e7lular i\u00e7in bulunmaz nimet. Sizin \u015firketinizin cihazlar\u0131 da tehdit alt\u0131nda olabilir. Bu y\u00fczden, \u015firketinizi korumak i\u00e7in a\u015fa\u011f\u0131daki \u00f6nlemleri alman\u0131z\u0131 \u00f6neriyoruz:<\/p>\n<ul>\n<li>Altyap\u0131n\u0131z\u0131 sald\u0131r\u0131lara kar\u015f\u0131 tamamen korumal\u0131 hale getirmek i\u00e7in, b\u00fct\u00fcn bilgisayar ve sunuculara g\u00fcvenlik \u00e7\u00f6z\u00fcmleri y\u00fckleyin;<\/li>\n<li>Anormallikleri saptamak i\u00e7in \u015firket a\u011f\u0131n\u0131z \u00fczerinde d\u00fczenli olarak <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security?redef=1&amp;reseller=gl_kdaily_acq_ona_smm__onl_b2b_kasperskydaily_lnk_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik denetimleri ger\u00e7ekle\u015ftirin<\/a>;<\/li>\n<li>Sald\u0131rganlar G\u00f6rev Y\u00f6neticisini k\u00f6t\u00fc ama\u00e7l\u0131 i\u015flemler i\u00e7in kullanabilir. G\u00f6rev Y\u00f6neticisini d\u00fczenli olarak kontrol edin;<\/li>\n<li>Kuyruk y\u00f6netim sistemleri, POS terminalleri ve hatta otomatlar gibi pek olas\u0131 g\u00f6r\u00fcnmeyen hedefleri de es ge\u00e7meyin. EternalBlue g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalanan madenci \u00f6rne\u011finde de g\u00f6r\u00fcld\u00fc\u011f\u00fc gibi, bu gibi aletler de kripto para madencili\u011fi i\u00e7in kullan\u0131labiliyor;<\/li>\n<li>\u00d6zel cihazlar\u0131 Ba\u015ftan Yasakl\u0131 modunda kullan\u0131n, b\u00f6ylece bu cihazlar\u0131 madencilerin yan\u0131nda daha pek \u00e7ok farkl\u0131 tehdide kar\u015f\u0131 da koruyabilirsiniz. \u00d6rne\u011fin; Ba\u015ftan Yasakl\u0131 modunu, Kaspersky Endpoint Security for Business ile yap\u0131land\u0131rabilirsiniz.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>2017 y\u0131l\u0131n\u0131 g\u00f6z \u00f6n\u00fcnde bulundurarak \u00f6n\u00fcm\u00fczdeki y\u0131l i\u00e7in sihirli k\u00fcremize bak\u0131nca, kripto para madencisi g\u00f6r\u00fcn\u00fcm\u00fcndeki daha yeni ve geli\u015fmi\u015f siber tehditlerin 2017 y\u0131l\u0131nda ortal\u0131\u011f\u0131 sallayan fidye yaz\u0131l\u0131mlar\u0131n\u0131 taht\u0131ndan edece\u011fini \u015fimdiden g\u00f6rebiliyoruz. Yapt\u0131\u011f\u0131m\u0131z son ara\u015ft\u0131rman\u0131n sonu\u00e7lar\u0131na g\u00f6re madenciler beklentileri kar\u015f\u0131lamakla kalmay\u0131p bunlar\u0131n \u00fczerine bile \u00e7\u0131km\u0131\u015f.<\/p>\n","protected":false},"author":2455,"featured_media":4795,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1566,493,374,392,612,744,777,1572,1336,1339,337,333,537,1569],"class_list":{"0":"post-4793","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-thesas2018","10":"tag-apt","11":"tag-bitcoin","12":"tag-botnet","13":"tag-dolandiricilik","14":"tag-guvenlik","15":"tag-internet","16":"tag-kaspersky-endpoint-security","17":"tag-kripto-para-birimi","18":"tag-madencilik","19":"tag-sas","20":"tag-security-analyst-summit","21":"tag-tehditler","22":"tag-the-sas-2018"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/miners-threaten-your-business\/4793\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/miners-threaten-your-business\/12728\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/miners-threaten-your-business\/10538\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/miners-threaten-your-business\/14848\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/miners-threaten-your-business\/13160\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/miners-threaten-your-business\/12598\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/miners-threaten-your-business\/15479\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/miners-threaten-your-business\/15149\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/miners-threaten-your-business\/19851\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/miners-threaten-your-business\/21482\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/miners-threaten-your-business\/9045\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/miners-threaten-your-business\/16048\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/miners-threaten-your-business\/19832\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/miners-threaten-your-business\/19763\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/miners-threaten-your-business\/19789\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tehditler\/","name":"tehditler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2455"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=4793"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4793\/revisions"}],"predecessor-version":[{"id":4796,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/4793\/revisions\/4796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/4795"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=4793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=4793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=4793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}