{"id":5079,"date":"2018-07-11T09:43:08","date_gmt":"2018-07-11T06:43:08","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5079"},"modified":"2018-12-14T11:14:09","modified_gmt":"2018-12-14T08:14:09","slug":"rakhni-miner-cryptor","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rakhni-miner-cryptor\/5079\/","title":{"rendered":"Rakhni Truva At\u0131: \u015eifreleme ve madencilik"},"content":{"rendered":"<p>Yak\u0131n zamanda fidye yaz\u0131l\u0131mlar\u0131n\u0131n, \u00e7evrimi\u00e7i tehdit s\u0131ralamas\u0131nda birincili\u011fi madencilere kapt\u0131rd\u0131\u011f\u0131 hakk\u0131nda bir yaz\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cryptominers-almost-double\/5049\/\" target=\"_blank\" rel=\"noopener\">yay\u0131nlam\u0131\u015ft\u0131k<\/a>. Bu e\u011filimle birlikte, 2013 y\u0131l\u0131ndan beri izlemekte oldu\u011fumuz Truva at\u0131 fidye yaz\u0131l\u0131m\u0131 Rakhni, cephanesine bir de kripto para birimi madencili\u011fi mod\u00fcl\u00fc ekledi. \u0130lgin\u00e7 olan; bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fckleyicisinin, cihaza g\u00f6re hangi bile\u015fenin y\u00fcklenece\u011fini se\u00e7ebiliyor olmas\u0131. Ara\u015ft\u0131rmac\u0131lar\u0131m\u0131z bu g\u00fcncellenmi\u015f k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ve tehlikenin nerede yatt\u0131\u011f\u0131n\u0131 \u00e7\u00f6zd\u00fc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5080\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2018\/07\/11092005\/rakhni-miner-cryptor-featured.jpg\" alt=\"\" width=\"1460\" height=\"958\"><\/p>\n<p>\u00dcr\u00fcnlerimiz Rusya\u2019da, Kazakistan\u2019da, Ukrayna\u2019da, Almanya\u2019da ve Hindistan\u2019da Rakhni\u2019ye rastlad\u0131. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, genel olarak k\u00f6t\u00fc ama\u00e7l\u0131 eklere sahip olan istenmeyen postalar yoluyla da\u011f\u0131t\u0131l\u0131yor. \u00d6rne\u011fin; uzmanlar\u0131m\u0131z\u0131n \u00fczerinde \u00e7al\u0131\u015ft\u0131\u011f\u0131 \u00f6rneklem, mali bir belge gibi g\u00f6r\u00fcn\u00fcyordu. Bu g\u00f6r\u00fcn\u00fcm, olay\u0131n arkas\u0131ndaki siber su\u00e7lular\u0131n kurumsal \u201cm\u00fc\u015fteriler\u201d ile ilgilendi\u011fini g\u00f6steriyor.<\/p>\n<p>DOCX ekli bir istenmeyen e-posta, bir PDF belgesi i\u00e7erir. Kullan\u0131c\u0131 d\u00fczenlemeye izin verip PDF\u2019i a\u00e7arsa sistem, bilinmeyen bir yay\u0131mc\u0131dan y\u00fcr\u00fct\u00fclebilir dosya \u00e7al\u0131\u015ft\u0131rmak i\u00e7in izin ister. Kullan\u0131c\u0131n\u0131n izniyle birlikte Rakhni harekete ge\u00e7er.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5081\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2018\/07\/11092032\/180706-rakhni-screenshot-1.png\" alt=\"\" width=\"728\" height=\"403\"><\/p>\n<h2>Karanl\u0131ktaki bir h\u0131rs\u0131z gibi<\/h2>\n<p>\u0130lk ba\u015flad\u0131\u011f\u0131nda, bu k\u00f6t\u00fc ama\u00e7l\u0131 PDF dosyas\u0131, belge g\u00f6r\u00fcnt\u00fcleyici olarak g\u00f6r\u00fcn\u00fcr. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, kurbana \u00f6nce neden hi\u00e7bir \u015feyin a\u00e7\u0131lmad\u0131\u011f\u0131n\u0131 a\u00e7\u0131klayan bir hata mesaj\u0131 g\u00f6sterir. Daha sonra, Windows Defender\u2019\u0131 devre d\u0131\u015f\u0131 b\u0131rakarak sahte dijital sertifikalar y\u00fckler. Her \u015fey yolunda gidince de vir\u00fcs bula\u015ft\u0131rd\u0131\u011f\u0131 cihazla ne yapaca\u011f\u0131na karar verir: Dosyalar\u0131 \u015fifreleyip fidye ister veya madenci y\u00fckler.<br>\nSon olarak, k\u00f6t\u00fc ama\u00e7l\u0131 program, yerel a\u011fdaki di\u011fer bilgisayarlara da bula\u015fmaya \u00e7al\u0131\u015f\u0131r. \u015eirket \u00e7al\u0131\u015fanlar\u0131 kendi bilgisayarlar\u0131ndaki Kullan\u0131c\u0131lar klas\u00f6r\u00fcnde ortak eri\u015fim sunuyorsa k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kendini kopyalamaya ba\u015flar.<\/p>\n<h2>Maden mi, \u015fifreleme mi?<\/h2>\n<p>Se\u00e7im kriteri basittir: K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, kurban\u0131n bilgisayar\u0131nda Bitcoin isimli bir hizmet dosyas\u0131 bulursa dosyalar\u0131 (Office belgeleri, PDF\u2019ler, resimler ve yedekler dahil) \u015fifreleyen ve \u00fc\u00e7 g\u00fcn i\u00e7inde fidye \u00f6demesi talep eden bir fidye yaz\u0131l\u0131m\u0131 \u00e7al\u0131\u015ft\u0131r\u0131r. Siber su\u00e7lular, fidye \u00fccreti dahil olmak \u00fczere di\u011fer b\u00fct\u00fcn ayr\u0131nt\u0131lar\u0131 belirten bir posta g\u00f6ndereceklerine dair \u201cnazik\u201d bir s\u00f6z verir.<\/p>\n<p>Cihazda Bitcoin ile ilgili herhangi bir dosya yoksa ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, cihaz\u0131n kripto para madencili\u011fini kald\u0131rabilecek g\u00fc\u00e7te oldu\u011funa inan\u0131rsa; arka planda gizlice, Monero, Monero Original veya Dashcoin \u00fcreten bir madenci indirir.<\/p>\n<h2>Kurban olmay\u0131n<\/h2>\n<p>Rakhni\u2019den etkilenmemek ve \u015firketinizi as\u0131l zarardan korumak i\u00e7in \u00f6zellikle bilinmeyen e-posta adreslerinden gelen mesajlara dikkat edin. Bir eki a\u00e7\u0131p a\u00e7mama konusunda emin de\u011filseniz, o eki a\u00e7may\u0131n. Ayr\u0131ca i\u015fletim sistemi uyar\u0131lar\u0131na \u00e7ok dikkat edin: Bilinmeyen yay\u0131mc\u0131lardan uygulama \u00e7al\u0131\u015ft\u0131rmay\u0131n; \u00f6zellikle de bu yay\u0131mc\u0131lar\u0131n isimleri pop\u00fcler programlar\u0131n isimlerini and\u0131r\u0131yorsa.<\/p>\n<p>Kurumsal a\u011fdaki madencilere ve \u015fifrecilere kar\u015f\u0131 verilen sava\u015fta, a\u015fa\u011f\u0131daki \u00f6nlemleri alman\u0131z sizin a\u00e7\u0131n\u0131zdan olduk\u00e7a faydal\u0131 olacakt\u0131r:<\/p>\n<ul>\n<li>Bilgi g\u00fcvenli\u011fi ekibinizi e\u011fitin ve teknik bilgilerini d\u00fczenli olarak kontrol edin. Bu konuyla ilgili yard\u0131ma ihtiya\u00e7 duyarsan\u0131z uzmanlar\u0131m\u0131z size yard\u0131mc\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\" target=\"_blank\" rel=\"noopener\">olabilir<\/a>.<\/li>\n<li>Hassas verilerin yedek kopyalar\u0131n\u0131 ayr\u0131 bir depolama ortam\u0131nda saklay\u0131n.<\/li>\n<li>Davran\u0131\u015f analizi \u00f6zelli\u011fi bulunan g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc kullan\u0131n: \u00d6rne\u011fin, Kaspersky Endpoint Security for Business.<\/li>\n<li>\u015eirket a\u011f\u0131n\u0131 anormal durumlara kar\u015f\u0131 d\u00fczenli olarak inceleyin.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n<p>Kaspersky Lab\u2019in kurumsal \u00e7\u00f6z\u00fcmlerini kullanmasan\u0131z bile verilerinizi fidye yaz\u0131l\u0131mc\u0131lar\u0131na b\u0131rakman\u0131z gerekmez. \u00d6zel bir \u00e7\u00f6z\u00fcm\u00fcm\u00fcz var: \u00c7o\u011fu \u00fc\u00e7\u00fcnc\u00fc taraf tedarik\u00e7inin g\u00fcvenlik \u00fcr\u00fcnlerini geli\u015ftirebilen <a href=\"https:\/\/kas.pr\/karttr\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Ransomware Tool<\/a>. Bu \u00fcr\u00fcn, en yeni davran\u0131\u015fsal tespit teknolojilerini ve bulut mekanizmalar\u0131m\u0131z\u0131 kullanarak fidye yaz\u0131l\u0131mlar\u0131n\u0131 avlamaya \u00e7al\u0131\u015f\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n","protected":false},"excerpt":{"rendered":"<p>Yak\u0131n zamanda fidye yaz\u0131l\u0131mlar\u0131n\u0131n, \u00e7evrimi\u00e7i tehdit s\u0131ralamas\u0131nda birincili\u011fi madencilere kapt\u0131rd\u0131\u011f\u0131 hakk\u0131nda bir yaz\u0131 yay\u0131nlam\u0131\u015ft\u0131k. Bu e\u011filimle birlikte, 2013 y\u0131l\u0131ndan beri izlemekte oldu\u011fumuz Truva at\u0131 fidye yaz\u0131l\u0131m\u0131 Rakhni, cephanesine bir de kripto para birimi madencili\u011fi mod\u00fcl\u00fc ekledi. <\/p>\n","protected":false},"author":2484,"featured_media":5082,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[1657,591,1656,1336,1661,1339,1658,1659,447,794,935,1660,537,889],"class_list":{"0":"post-5079","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-dashcoin","10":"tag-fidye-yazilimi","11":"tag-isletme","12":"tag-kripto-para-birimi","13":"tag-kurumsal-tehditler","14":"tag-madencilik","15":"tag-monero","16":"tag-rakhni","17":"tag-ransomware","18":"tag-sifreleme","19":"tag-sifreleyiciler","20":"tag-sosyal-muhendislik","21":"tag-tehditler","22":"tag-trojanlar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rakhni-miner-cryptor\/5079\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/rakhni-miner-cryptor\/13634\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/rakhni-miner-cryptor\/11401\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/rakhni-miner-cryptor\/15700\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/rakhni-miner-cryptor\/13937\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rakhni-miner-cryptor\/13114\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rakhni-miner-cryptor\/16418\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rakhni-miner-cryptor\/15902\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rakhni-miner-cryptor\/20880\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rakhni-miner-cryptor\/22988\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rakhni-miner-cryptor\/10552\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rakhni-miner-cryptor\/9370\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rakhni-miner-cryptor\/17183\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rakhni-miner-cryptor\/20733\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rakhni-miner-cryptor\/16918\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/rakhni-miner-cryptor\/20571\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/rakhni-miner-cryptor\/20561\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5079"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5079\/revisions"}],"predecessor-version":[{"id":5085,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5079\/revisions\/5085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5082"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}