{"id":5241,"date":"2018-09-07T11:38:09","date_gmt":"2018-09-07T08:38:09","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5241"},"modified":"2019-11-15T14:38:00","modified_gmt":"2019-11-15T11:38:00","slug":"man-in-the-disk","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/man-in-the-disk\/5241\/","title":{"rendered":"Man-in-the-Disk (Diskteki Adam): Android&#8217;i hacklemenin yeni ve tehlikeli bir yolu"},"content":{"rendered":"<p>Android iyi bir i\u015fletim sistemi ve geli\u015ftiricileri g\u00fcvenli\u011fe ger\u00e7ekten \u00f6nem veriyor fakat bu kadar \u00e7ok OS s\u00fcr\u00fcm\u00fc ve uygulaman\u0131n hepsiyle ilgilenmek \u00e7ok zor bir i\u015f. Bu y\u00fczden s\u0131kl\u0131kla dahili g\u00fcvenlik mekanizmalar\u0131n\u0131n \u00e7evresinden dola\u015fma yollar\u0131 ortaya \u00e7\u0131k\u0131yor. Android\u2019i hacklemenin en yeni yoluna \u201cMan-in-the-Disk\u201d yani \u201cDiskteki Adam\u201d deniyor ve bu yaz\u0131da bu y\u00f6ntemden bahsedece\u011fiz.<\/p>\n<h2>\u201cSandbox (Korumal\u0131 alanlar)\u201d Android g\u00fcvenli\u011finin temelidir<\/h2>\n<p>Android\u2019in ana ilkelerinden biri de t\u00fcm uygulamalar\u0131n birbirinden izole olmas\u0131d\u0131r. Bu da korumal\u0131 alan ad\u0131 verilen unsurlar\u0131n kullan\u0131m\u0131yla ger\u00e7ekle\u015ftiriliyor. Her uygulama, \u00f6zel dosyalar\u0131yla birlikte di\u011fer uygulamalar\u0131n ula\u015famad\u0131\u011f\u0131 bir <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/sandbox\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation&amp;_ga=2.194402541.1372887776.1536307097-1903142484.1532417805\" target=\"_blank\" rel=\"noopener\">\u201cSandbox (korumal\u0131 alan)\u201d<\/a> i\u00e7inde ya\u015far.<\/p>\n<p>Ama\u00e7lanan \u015fey k\u00f6t\u00fc ama\u00e7l\u0131 bir uygulama Android cihaz\u0131n\u0131za girse bile, internet bankac\u0131l\u0131\u011f\u0131 uygulamalar\u0131n\u0131n kullan\u0131c\u0131 ad\u0131 ve \u015fifresi veya mesajla\u015fma ge\u00e7mi\u015finiz gibi zarars\u0131z uygulamalar\u0131n depolad\u0131\u011f\u0131 verileri \u00e7alamamas\u0131n\u0131 sa\u011flamakt\u0131r. Hackerlar\u0131n korumal\u0131 alandan ka\u00e7\u0131\u015f ad\u0131n\u0131 verdikleri bir y\u00f6ntemle bu mekanizmay\u0131 a\u015fmak i\u00e7in yeni yollar ar\u0131yor olmas\u0131 hi\u00e7 \u015fa\u015f\u0131rt\u0131c\u0131 de\u011fil. Zaman zaman ba\u015far\u0131l\u0131 da oluyorlar.<\/p>\n<p>\u00d6rne\u011fin, Slava Makkaveev DEF CON 26 konu\u015fmas\u0131nda tehlikeli veya \u015f\u00fcpheli izinleri olmayan bir uygulaman\u0131n nas\u0131l korumal\u0131 alandan ka\u00e7t\u0131\u011f\u0131 \u00fczerinde yo\u011funla\u015ft\u0131. Bu y\u00f6nteme \u00fcnl\u00fc <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Man-in-the-middle_attack\" target=\"_blank\" rel=\"noopener nofollow\">Man-in-the-Middle (Ortadaki Adam)<\/a> t\u00fcr\u00fc sald\u0131r\u0131dan yola \u00e7\u0131karak \u201cMan-in-the-Disk (Diskteki Adam)\u201d ad\u0131n\u0131 verdi.<\/p>\n<h2>Man-in-the-Disk nas\u0131l \u00e7al\u0131\u015f\u0131r?<\/h2>\n<p>Uygulama dosyalar\u0131n\u0131 bar\u0131nd\u0131ran korumal\u0131 alanlar d\u0131\u015f\u0131nda Android\u2019de \u201cHarici Depolama\u201d gibi bir ada sahip, payla\u015f\u0131lan bir harici depolama vard\u0131r. Bir uygulama depolamaya eri\u015fmek i\u00e7in kullan\u0131c\u0131dan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/android-permissions-guide\/2956\/\" target=\"_blank\" rel=\"noopener\">izin<\/a> istemek zorundad\u0131r: \u201cCihaz\u0131n\u0131zdaki foto\u011fraflara, medyaya ve dosyalara eri\u015fim\u201d (asl\u0131nda hem okuma hem yazma i\u00e7in iki izindir READ_EXTERNAL_STORAGE ve WRITE_EXTERNAL_STORAGE). Bu izinler genelde tehlikeli olarak d\u00fc\u015f\u00fcn\u00fclmez ve neredeyse her uygulama bu izinleri ister, yani bu istekte \u015f\u00fcpheli bir durum yoktur.<\/p>\n<p>Uygulamalar ak\u0131ll\u0131 telefonlarla bilgisayarlar aras\u0131nda dosya de\u011fi\u015ftirmek, aktarmak gibi yararl\u0131 bir\u00e7ok \u015fey i\u00e7in harici depolamay\u0131 kullan\u0131r. Ancak harici depolama s\u0131kl\u0131kla internetten indirilen verileri ge\u00e7ici olarak depolamak i\u00e7in de kullan\u0131l\u0131r: Veri \u00f6nce diskin payla\u015f\u0131lan k\u0131sm\u0131na yaz\u0131l\u0131r ve ancak o zaman sadece belirli uygulamalar\u0131n eri\u015febilece\u011fi izole b\u00f6lgeye aktar\u0131labilir.<\/p>\n<p>\u00d6rne\u011fin, bir uygulama i\u015flevselli\u011fini, s\u00f6zl\u00fckler veya g\u00fcncellemeler gibi ek i\u00e7eri\u011fi geni\u015fletmek amac\u0131yla y\u00fckledi\u011fi tamamlay\u0131c\u0131 mod\u00fclleri depolamak i\u00e7in, payla\u015f\u0131lan alan\u0131 ge\u00e7ici olarak kullanabilir. Problem \u015fu ki, okuma\/yazma hakk\u0131na sahip harici depolamaya eri\u015febilen bir uygulama dosyalara eri\u015febilir, dosyalar\u0131 de\u011fi\u015ftirebilir, k\u00f6t\u00fc ama\u00e7l\u0131 unsurlar ekleyebilir.<\/p>\n<p>Bir oyun gibi asl\u0131nda \u00e7ok zarars\u0131z g\u00f6r\u00fcnen ama ak\u0131ll\u0131 telefonunuza \u00e7ok zararl\u0131 bir vir\u00fcs bula\u015ft\u0131rabilecek uygulamalar indirmeniz gayet olas\u0131d\u0131r.<\/p>\n<p>Android\u2019in yarat\u0131c\u0131lar\u0131 harici depolaman\u0131n tehlikeli olabilece\u011finin fark\u0131ndalar, hatta Android geli\u015ftirici sitesi programc\u0131lar i\u00e7in birka\u00e7 <a href=\"https:\/\/developer.android.com\/training\/articles\/security-tips\" target=\"_blank\" rel=\"noopener nofollow\">yard\u0131mc\u0131 ipucu<\/a> bile i\u00e7eriyor.<\/p>\n<p>Fakat Google \u00e7al\u0131\u015fanlar\u0131 ve belirli ak\u0131ll\u0131 telefon \u00fcreticileri dahil olmak \u00fczere, her uygulama geli\u015ftiricisi ne yaz\u0131k ki bu tavsiyelere uymuyor. Slava Makkaveev taraf\u0131ndan verilen \u00f6rneklere Google \u00c7eviri, Yandex. \u00c7eviri, Google Sesle Yazma ve Google Metin-Konu\u015fma Motoru ve LG ve Xiaomi taray\u0131c\u0131 sistem uygulamalar\u0131 da dahil.<\/p>\n<p>Google ara\u015ft\u0131rmac\u0131lar\u0131, k\u0131sa bir s\u00fcre \u00f6nce yapt\u0131klar\u0131 ara\u015ft\u0131rmayla, ayn\u0131 Man-in-the-Disk sald\u0131r\u0131s\u0131n\u0131n \u00e7ok pop\u00fcler bir oyun olan Fortnite\u2019\u0131n <a href=\"https:\/\/thehackernews.com\/2018\/08\/fortnite-android-app-apk.html\" target=\"_blank\" rel=\"noopener nofollow\">Android versiyonuna da uygulanabildi\u011fini ke\u015ffetti<\/a>. Oyunu indirmek i\u00e7in kullan\u0131c\u0131lar\u0131n \u00f6nce yard\u0131mc\u0131 bir uygulama indirmesi gerekiyor, bu uygulaman\u0131n amac\u0131 da oyun dosyalar\u0131n\u0131 indirmek. Ancak Man-in-the-Disk sald\u0131r\u0131s\u0131 kullan\u0131larak yard\u0131mc\u0131 uygulaman\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 uygulama indirmesi sa\u011flanabildi\u011fi ortaya \u00e7\u0131kt\u0131. Fortnite geli\u015ftiricileri Epic Games bu zaaftan haberdar ve y\u00fckleyicinin yeni bir s\u00fcr\u00fcm\u00fcn\u00fc \u00e7\u0131kard\u0131lar bile. Yani, Fortnite oynamak isterseniz g\u00fcvenli\u011finiz i\u00e7in 2.1.0 s\u00fcr\u00fcm\u00fcn\u00fc ve sonras\u0131n\u0131 kullan\u0131n. Fortnite telefonunuzda y\u00fckl\u00fcyse silin ve yukar\u0131da s\u00f6z etti\u011fimiz s\u00fcr\u00fcm\u00fc en ba\u015ftan y\u00fckleyin.<\/p>\n<h2>Android\u2019inizi Man-in-the-Disk sald\u0131r\u0131s\u0131na kar\u015f\u0131 nas\u0131l koruyabilirsiniz?<\/h2>\n<p>Makkaveev durumun ne kadar k\u00f6t\u00fc oldu\u011funu anlatmak i\u00e7in sadece birka\u00e7 \u00e7ok pop\u00fcler uygulamadan bahsetti fakat bunlar\u0131n d\u0131\u015f\u0131nda say\u0131s\u0131z savunmas\u0131z uygulama var.<\/p>\n<p>Kendinizi nas\u0131l koruyabilirsiniz? Kolay uygulanabilir birka\u00e7 ipucumuz var:<\/p>\n<ul>\n<li>Uygulamalar\u0131n\u0131z\u0131 yaln\u0131zca Google Play gibi resmi ma\u011fazalardan y\u00fckleyin. Bu ma\u011fazalara da k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar s\u0131zabiliyor fakat bu durum olduk\u00e7a daha nadir g\u00f6r\u00fcl\u00fcyor ve i\u00e7eri s\u0131zan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar d\u00fczenli olarak siliniyor.<\/li>\n<li>Ak\u0131ll\u0131 telefonunuzun veya tabletinizin ayarlar\u0131ndan, \u00fc\u00e7\u00fcnc\u00fc \u015fah\u0131\u015f kaynaklar\u0131ndan y\u00fcklemeyi devre d\u0131\u015f\u0131 b\u0131rak\u0131n, bunlar en tehlikeli kaynaklard\u0131r. Devre d\u0131\u015f\u0131 b\u0131rakmak i\u00e7in Ayarlar -&gt; G\u00fcvenlik\u2019e gidin ve Bilinmeyen kaynaklar\u2019\u0131n onay i\u015faretini kald\u0131r\u0131n.<\/li>\n<li>Geli\u015ftiriciler taraf\u0131ndan onaylanan uygulamalar\u0131 se\u00e7in. Uygulaman\u0131n puan\u0131n\u0131 ve yorumlar\u0131n\u0131 kontrol edin. \u015e\u00fcpheli g\u00f6r\u00fcnen t\u00fcm uygulamalardan ka\u00e7\u0131n\u0131n.<\/li>\n<li>\u0130htiyac\u0131n\u0131z olmayan hi\u00e7bir \u015feyi y\u00fcklemeyin. Ak\u0131ll\u0131 telefonunuzda ne kadar az uygulama varsa o kadar iyidir.<\/li>\n<li>Art\u0131k ihtiyac\u0131n\u0131z olmayan uygulamalar\u0131 kald\u0131rmay\u0131 unutmay\u0131n.<\/li>\n<li>K\u00f6t\u00fc ama\u00e7l\u0131 bir uygulama telefonunuza s\u0131zmaya \u00e7al\u0131\u015ft\u0131\u011f\u0131nda size bildirim verecek g\u00fcvenilir bir mobil anti-vir\u00fcs uygulamas\u0131 kullan\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n","protected":false},"excerpt":{"rendered":"<p>Android iyi bir i\u015fletim sistemi ve geli\u015ftiricileri g\u00fcvenli\u011fe ger\u00e7ekten \u00f6nem veriyor fakat bu kadar \u00e7ok OS s\u00fcr\u00fcm\u00fc ve uygulaman\u0131n hepsiyle ilgilenmek \u00e7ok zor bir i\u015f. Bu y\u00fczden s\u0131kl\u0131kla dahili g\u00fcvenlik mekanizmalar\u0131n\u0131n \u00e7evresinden dola\u015fma yollar\u0131 ortaya \u00e7\u0131k\u0131yor. <\/p>\n","protected":false},"author":421,"featured_media":5242,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[105,950,439,767,1711,22,1245,1712,820,1509,1713],"class_list":{"0":"post-5241","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-android","10":"tag-black-hat","11":"tag-blackhat","12":"tag-def-con","13":"tag-def-con-26","14":"tag-google","15":"tag-izin","16":"tag-lg","17":"tag-tehdit","18":"tag-xiaomi","19":"tag-yandex"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/man-in-the-disk\/5241\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/man-in-the-disk\/14098\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/man-in-the-disk\/11805\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/man-in-the-disk\/16089\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/man-in-the-disk\/14327\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/man-in-the-disk\/13347\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/man-in-the-disk\/16809\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/man-in-the-disk\/16204\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/man-in-the-disk\/21188\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/man-in-the-disk\/23622\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/man-in-the-disk\/10862\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/man-in-the-disk\/9654\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/man-in-the-disk\/17562\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/man-in-the-disk\/21388\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/man-in-the-disk\/17240\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/man-in-the-disk\/20961\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/man-in-the-disk\/20971\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/def-con\/","name":"def con"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5241"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5241\/revisions"}],"predecessor-version":[{"id":6904,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5241\/revisions\/6904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5242"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}