{"id":5172,"date":"2018-08-08T11:18:14","date_gmt":"2018-08-08T08:18:14","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5172"},"modified":"2018-08-08T11:18:14","modified_gmt":"2018-08-08T08:18:14","slug":"mobile-malware-part-two","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-two\/5172\/","title":{"rendered":"Mobil canavarlar ve yuvalar\u0131 &#8211; ikinci b\u00f6l\u00fcm"},"content":{"rendered":"<p>Mobil hainlere dair bu hikayenin <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-1\/5045\/\" target=\"_blank\" rel=\"noopener\">son g\u00fcncellemesinde<\/a>, ak\u0131ll\u0131 telefonunuza veya tabletinize girebilecek nispeten zarars\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 ele alm\u0131\u015ft\u0131k. Bug\u00fcn, sizi be\u015f kuru\u015fsuz veya paras\u0131z b\u0131rakmas\u0131 \u00e7ok daha olas\u0131 olan \u00e7ok daha tehlikeli canavarlardan bahsedece\u011fiz.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5173\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2018\/08\/08101821\/mobile-malware-part-2-featured-1024x672.jpg\" alt=\"\" width=\"1024\" height=\"672\"><\/p>\n<h2>Mobil fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>Daha \u00f6nce de s\u00f6ylemi\u015f oldu\u011fumuz gibi, insanlar ak\u0131ll\u0131 telefonlar\u0131na o kadar ba\u011f\u0131ml\u0131 ki, onlar\u0131 geri almak i\u00e7in k\u0131zg\u0131n korlar\u0131n \u00fczerinde bile y\u00fcr\u00fcrler. Bunu bilen k\u00f6t\u00fc niyetli yaz\u0131l\u0131mc\u0131lar, ma\u011fdur ki\u015filerin cihazlar\u0131n\u0131 engellemek i\u00e7in mobil fidye yaz\u0131l\u0131m\u0131 vir\u00fcsleri yarat\u0131r ve yeniden eri\u015fime a\u00e7mak i\u00e7in para talep eder.<\/p>\n<p>Masa\u00fcst\u00fc versiyonu gibi, mobil fidye yaz\u0131l\u0131mlar\u0131n\u0131n da iki t\u00fcr\u00fc vard\u0131r: engelleyiciler ve \u015fifreleyiciler. \u0130simlerinden de anla\u015f\u0131laca\u011f\u0131 \u00fczere; \u015fifreleyiciler dosyalar\u0131 \u015fifreler, engelleyiciler ise eri\u015fimi engeler. Bunu genellikle ekrana \u015f\u00fcpheli bir sembol koyarak veya bir P\u0130N talep ederek yaparlar.<\/p>\n<p>Bu arada, k\u00f6t\u00fc ama\u00e7l\u0131 mobil yaz\u0131l\u0131mlar genellikle \u015fifreler ve engeller. \u00d6rne\u011fin, eski dostumuz <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/mobile-ransomware-2016\/2238\/\" target=\"_blank\" rel=\"noopener\">Svpeng Truva At\u0131<\/a>\u2018n\u0131n modifikasyonlar\u0131ndan bir tanesi tam olarak bu \u015fekilde para kazan\u0131r.<\/p>\n<p>Masa\u00fcst\u00fc engelleyiciler her \u015feyi yok ederken (a\u015f\u0131lmalar\u0131 kolayd\u0131r), mobil cihazlarda bunlar \u00e7\u0131\u011f gibi b\u00fcy\u00fcr. \u00d6rne\u011fin, 2017\u2019de tespit edilen fidye yaz\u0131l\u0131mlar\u0131n\u0131n\u0131n %83\u2019\u00fc, ma\u011fdurlar\u0131n cihazlar\u0131n\u0131 bir P\u0130N arac\u0131l\u0131\u011f\u0131 ile kilitleyen Congur ailesinden Truva Atlar\u0131 idi.<\/p>\n<p>Masa\u00fcst\u00fc engelleyiciler gibi mobil engelleyiciler de genellikle kullan\u0131c\u0131y\u0131 (genellikle pornografi izleyerek) bir yasay\u0131 \u00e7i\u011fnemekle su\u00e7lar ve kullan\u0131c\u0131dan s\u00f6zde bir devlet kurumuna bir para cezas\u0131 \u00f6demesini talep eder. Tabii ki bu para sald\u0131rganlar\u0131n cebine gider. Bu t\u00fcrden k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar genellikle porno siteleri \u00fczerinden yay\u0131l\u0131r. Bu da baz\u0131 ma\u011fdurlar i\u00e7in su\u00e7laman\u0131n inand\u0131r\u0131c\u0131l\u0131\u011f\u0131na katk\u0131da bulunur.<\/p>\n<h2>Mobil siliciler<\/h2>\n<p>Burada da ipucu isimde gizlidir: Siliciler, ma\u011fdur ki\u015finin cihaz\u0131ndaki t\u00fcm dosyalar\u0131 siler. Fidye alarak para kazanmaya \u00e7al\u0131\u015fan s\u0131radan doland\u0131r\u0131c\u0131lar i\u00e7in kullan\u0131c\u0131 verilerini silmek ticari a\u00e7\u0131dan pek mant\u0131kl\u0131 de\u011fildir. Siliciler daha ziyade kurumsal veya siyasi d\u00fcellolarda kullan\u0131l\u0131r.<\/p>\n<p>Siliciler, genellikle, mobil cihazlarda bilgisayarlara nazaran daha az kar\u015f\u0131m\u0131za \u00e7\u0131kar. Ayr\u0131ca, ta\u015f\u0131nabilir cihazlarda ortaya \u00e7\u0131ksalar bile, genellikle bir ba\u015fka kirli numarayla uyumlu \u015fekilde hareket ederler. \u00d6rne\u011fin, <a href=\"https:\/\/securelist.com\/mobile-malware-review-2017\/84139\/%252520\" target=\"_blank\" rel=\"noopener\">Mazar<\/a> isimli k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, veri silmenin yan\u0131 s\u0131ra bir mobil cihaz\u0131 bir <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/botnet\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">botnetin<\/a> (siber sald\u0131r\u0131 i\u00e7in kullan\u0131lan bir a\u011f) par\u00e7as\u0131 haline getirir. Fakat bu ikisi bir arada zararl\u0131 yaz\u0131l\u0131mlara ba\u015fka bir yaz\u0131da de\u011finece\u011fiz.<\/p>\n<h2>Mobil madenciler<\/h2>\n<p>E\u011fer ak\u0131ll\u0131 telefonunuz aniden \u0131s\u0131nmaya, yava\u015flamaya ba\u015flam\u0131\u015fsa ve \u015farj\u0131 h\u0131zl\u0131 bir \u015fekilde bitiyorsa, bu durumda en olas\u0131 \u015f\u00fcpheli gizli bir kripto para birimi madencisidir. Bu yaz\u0131l\u0131mlar sizi kullanarak ba\u015fka biri i\u00e7in gizlice kripto para birimi madencili\u011fi yapar.<\/p>\n<p>Resmi uygulama ma\u011fazalar\u0131nda dahi <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/google-play-hidden-miners\/4832\/\" target=\"_blank\" rel=\"noopener\">enfekte olman\u0131z<\/a> olas\u0131d\u0131r: Bu programlar a\u00e7\u0131klamadaki \u015fartlar\u0131 yerine getirirken, bir yandan yarat\u0131c\u0131lar\u0131 i\u00e7in arka planda sanal para birimi madencili\u011fi yapan iyi niyetli uygulamalar gibi gizlenebilir. Bu arada, \u00fc\u00e7\u00fcnc\u00fc taraf kaynaklardan indirilen uygulamalar, sistem uygulamalar\u0131n\u0131 taklit etme konusunda ellerinden geleni yapar. Bazense k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, Google Play\u2019i g\u00fcncellemeye yarayan bir uygulama gibi davran\u0131r. \u00d6rne\u011fin, <a href=\"https:\/\/www.newsbtc.com\/2018\/03\/30\/hiddenminer-mines-monero-on-android-devices-while-protecting-itself-from-discovery-and-removal\/\" target=\"_blank\" rel=\"noopener nofollow\">HiddenMiner<\/a>.<\/p>\n<p>Madenciler paran\u0131z\u0131 \u00e7almaz veya dosyalar\u0131n\u0131z\u0131 silmez ancak bu risk hafife al\u0131nmamal\u0131d\u0131r: A\u015f\u0131r\u0131 y\u00fcklenme cihaz\u0131n yava\u015flamas\u0131na ve \u015farj\u0131n\u0131n \u00e7ok h\u0131zl\u0131 bitmesine sebep olman\u0131n yan\u0131 s\u0131ra cihaz\u0131n korkun\u00e7 derecede \u0131s\u0131nmas\u0131na da sebep olabilir.<\/p>\n<h2>Korunma yollar\u0131<\/h2>\n<p>Ne kadar can s\u0131k\u0131c\u0131 olsalar da, sald\u0131r\u0131lar\u0131n \u00e7o\u011funa kar\u015f\u0131 a\u015fa\u011f\u0131daki birka\u00e7 kural\u0131 g\u00f6zeterek savunma sa\u011flanabilir:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li>Yaln\u0131zca, Google Play ve Amazon Store gibi resmi ma\u011fazalardan uygulamalar indirin: Bu garanti bir \u00e7\u00f6z\u00fcm de\u011fildir fakat k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n cihaz\u0131n\u0131za girme riskini kayda de\u011fer \u00f6l\u00e7\u00fcde azalt\u0131r.<\/li>\n<li>Cihaz ayarlar\u0131n\u0131zda bulunan, \u00fc\u00e7\u00fcnc\u00fc taraf kaynaklardan uygulama y\u00fckleme se\u00e7ene\u011fini kapat\u0131n. Bu, sistem g\u00fcncellemeleri ve benzeri eylemleri taklit etmeye \u00e7al\u0131\u015fan tesad\u00fcfen indirilmi\u015f tehditleri bertaraf eder.<\/li>\n<\/ul>\n<\/li>\n<li><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5174\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2018\/08\/08105159\/unknown-sources-EN-1024x711.jpg\" alt=\"\" width=\"1024\" height=\"711\"><\/li>\n<li>Cihaz\u0131n\u0131zdaki \u00f6nemli verileri, bulut \u00fczerinde, bir USB s\u00fcr\u00fcc\u00fcs\u00fc veya harici bir hard diskte d\u00fczenli olarak <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-backup\/4212\/\" target=\"_blank\" rel=\"noopener\">yedekleyin<\/a>.<\/li>\n<li>\u0130\u015fletim sistemi ve uygulama g\u00fcncellemelerini her zaman eri\u015filebilir hale gelir gelmez y\u00fckleyin. Bunlar, su\u00e7lular\u0131n faydalanabilece\u011fi zay\u0131fl\u0131klar\u0131 ortadan kald\u0131r\u0131r.<\/li>\n<li>E-posta, metin veya k\u0131sa mesajlarda bulunan \u015f\u00fcpheli ba\u011flant\u0131lara t\u0131klamay\u0131n.<\/li>\n<li>T\u00fcm mobil cihazlar\u0131 g\u00fcvenilir bir anti-vir\u00fcs arac\u0131 ile koruyun. \u00d6rne\u011fin, <a href=\"http:\/\/kas.pr\/kisatr\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security for Android<\/a> uygulamalara, ba\u011flant\u0131lara ve Web sayfalar\u0131na y\u00f6nelik ger\u00e7ek zamanl\u0131 analizler yapar ve \u015f\u00fcpheli veya tehlikeli g\u00f6r\u00fcnen her \u015feyi engeller.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n","protected":false},"excerpt":{"rendered":"<p>Mobil hainlere dair bu hikayenin son g\u00fcncellemesinde, ak\u0131ll\u0131 telefonunuza veya tabletinize girebilecek nispeten zarars\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 ele alm\u0131\u015ft\u0131k. Bug\u00fcn, sizi be\u015f kuru\u015fsuz veya paras\u0131z b\u0131rakmas\u0131 \u00e7ok daha olas\u0131 olan \u00e7ok daha tehlikeli canavarlardan bahsedece\u011fiz.<\/p>\n","protected":false},"author":2484,"featured_media":5173,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351],"tags":[555,1690,885,744,1544,1589,509,877,537,553],"class_list":{"0":"post-5172","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"tag-akilli-telefonlar","10":"tag-android-uygulamalar","11":"tag-engelleyiciler","12":"tag-guvenlik","13":"tag-kripto-para","14":"tag-madenciler","15":"tag-siliciler","16":"tag-sistem-aciklari","17":"tag-tehditler","18":"tag-zararli-yazilim-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-two\/5172\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-two\/13801\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mobile-malware-part-two\/11554\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mobile-malware-part-two\/6085\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-malware-part-two\/15856\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-malware-part-two\/14135\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mobile-malware-part-two\/13252\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-malware-part-two\/16650\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-malware-part-two\/16065\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-malware-part-two\/21025\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-two\/23350\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-malware-part-two\/10787\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-malware-part-two\/10677\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-malware-part-two\/9563\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-malware-part-two\/17411\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-two\/12246\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mobile-malware-part-two\/21226\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/mobile-malware-part-two\/23811\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-malware-part-two\/17088\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-two\/20714\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-malware-part-two\/20714\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tehditler\/","name":"tehditler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5172"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5172\/revisions"}],"predecessor-version":[{"id":5175,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5172\/revisions\/5175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5173"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}