{"id":5284,"date":"2018-10-08T10:14:49","date_gmt":"2018-10-08T07:14:49","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5284"},"modified":"2019-11-15T14:37:33","modified_gmt":"2019-11-15T11:37:33","slug":"mobile-malware-part-3","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-3\/5284\/","title":{"rendered":"Mobil canavarlar ve yuvalar\u0131; \u00fc\u00e7\u00fcnc\u00fc b\u00f6l\u00fcm"},"content":{"rendered":"<p>\u00d6nceki b\u00f6l\u00fcmler:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-1\/5045\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mobil canavarlar ve yuvalar\u0131; birinci b\u00f6l\u00fcm<\/a>: Reklam yaz\u0131l\u0131m\u0131, abonelik olu\u015fturan yaz\u0131l\u0131mlar, yo\u011fun SMS g\u00f6nderen yaz\u0131l\u0131mlar, DDoSer\u2019ler.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-two\/5172\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mobil canavarlar ve yuvalar\u0131; ikinci b\u00f6l\u00fcm<\/a>: fidye yaz\u0131l\u0131m\u0131, siliciler, k\u00f6t\u00fc ama\u00e7l\u0131 kripto madencilik yaz\u0131l\u0131mlar\u0131.<\/li>\n<\/ul>\n<p>Mobil tehditlere y\u00f6nelik kapsaml\u0131 ara\u015ft\u0131rmam\u0131z\u0131n \u00fc\u00e7\u00fcnc\u00fc b\u00f6l\u00fcm\u00fcnde, temel amac\u0131 de\u011ferli bilgileri \u00e7almak olan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 ele alaca\u011f\u0131z.<\/p>\n<p>Ak\u0131ll\u0131 telefonlar\u0131m\u0131z ve tabletlerimiz hakk\u0131m\u0131zda, ileti\u015fim bilgilerimizden, banka kart\u0131 numaralar\u0131m\u0131za ve mevcut konumumuza kadar neredeyse her \u015feyi bilir. Bu bilgiler siber su\u00e7lular i\u00e7in bir alt\u0131n madenidir. Sonu\u00e7 olarak, \u0130nternet ortada duran (veya dikkatsizce yaz\u0131lan) her \u015feyi ele ge\u00e7irmek isteyen her t\u00fcrden k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mla doludur.<\/p>\n<h2>Casus yaz\u0131l\u0131m<\/h2>\n<p>Casus yaz\u0131l\u0131m, insanlar\u0131 gizlice g\u00f6zetleyen programlara verilen isimdir. Gizli kripto madencilik yaz\u0131l\u0131mlar\u0131 gibi, bu yaz\u0131l\u0131m da ak\u0131ll\u0131 telefonunuzda m\u00fcmk\u00fcn oldu\u011funca g\u00f6ze batmamaya \u00e7al\u0131\u015f\u0131r ve bu nedenle tespit edilmesi olduk\u00e7a zordur.<\/p>\n<p>Casus yaz\u0131l\u0131mlar\u0131n baz\u0131lar\u0131 veri \u00e7alar; bu verilere kullan\u0131c\u0131 isimleri ve parolalar, foto\u011fraflar ve co\u011frafi konum verileri dahildir. Baz\u0131lar\u0131 ise casus oyun, ses kayd\u0131, video \u00e7ekimi ve benzeri \u015feylerle u\u011fra\u015f\u0131r.<\/p>\n<p>Bu t\u00fcr k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar \u015funlar\u0131 yapabilir:<\/p>\n<ul>\n<li>E-posta ve k\u0131sa mesajlar\u0131n\u0131z\u0131 (hem SMS hem Anl\u0131k Mesajla\u015fma) ele ge\u00e7irmek ve onlar\u0131 siber su\u00e7lulara iletmek,<\/li>\n<li>Telefon konu\u015fmalar\u0131n\u0131 kaydetmek,<\/li>\n<li>Cihaz\u0131n\u0131z\u0131n GPS koordinatlar\u0131n\u0131 doland\u0131r\u0131c\u0131lara g\u00f6ndermek,<\/li>\n<li>Taray\u0131c\u0131 ge\u00e7mi\u015finizi ve pano i\u00e7eri\u011finizi if\u015fa etmek,<\/li>\n<li>Telefonunuzdaki ki\u015fisel veya i\u015fle ilgili belgelerinizi veya her t\u00fcrl\u00fc di\u011fer dosyay\u0131 \u00e7almak,<\/li>\n<li>Mikrofonunuzu ve\/veya kameran\u0131z\u0131 a\u00e7mak ve gizlice kaydedilmi\u015f foto\u011fraflar, ses kayd\u0131 ve videolar\u0131 ba\u015fkalar\u0131na g\u00f6ndermek,<\/li>\n<li>Sosyal medya ve \u00e7evrimi\u00e7i banka hesab\u0131 bilgilerinizi \u00e7almak,<\/li>\n<li>Sistem bilgilerini toplamak.<\/li>\n<\/ul>\n<p>\u00d6rne\u011fin; Trojan casus yaz\u0131l\u0131m\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/skygofree-smart-trojan\/4623\/\" target=\"_blank\" rel=\"noopener\">Skygofree<\/a>, vir\u00fcs bula\u015fm\u0131\u015f cihaz\u0131n sahibi casus yaz\u0131l\u0131m operat\u00f6rleri taraf\u0131ndan se\u00e7ilen bir yerdeyken ses kayd\u0131 yapmaya ba\u015flar, ayr\u0131ca taray\u0131c\u0131 ge\u00e7mi\u015fi, kullan\u0131c\u0131 isimleri, parolalar ve kart numaralar\u0131n\u0131 toplar. Kendi ba\u015f\u0131na Wi-Fi\u2019a ba\u011flan\u0131r ve \u00e7al\u0131nan bilgileri transfer eder.<\/p>\n<h2>Tu\u015f kaydediciler<\/h2>\n<p>Casus yaz\u0131l\u0131mlar, genel veya \u00f6zel ama\u00e7l\u0131 olabilir. \u00d6rne\u011fin, tu\u015f kaydediciler klavye \u00fczerindeki tu\u015f giri\u015flerini kaydeden k\u00f6t\u00fc ama\u00e7l\u0131 programlard\u0131r. Tabii ki modern klavyelerin yaln\u0131zca sanal tu\u015flar\u0131 vard\u0131r, fakat bu, tu\u015f kaydedicilerin \u00e7ok daha i\u015fine gelen bir durumdur. Bu yaz\u0131l\u0131mlardan baz\u0131lar\u0131 alternatif klavye k\u0131l\u0131\u011f\u0131na girer, bu durumda kullan\u0131c\u0131n\u0131n yazd\u0131klar\u0131n\u0131 ele ge\u00e7irmek \u00e7ocuk oyunca\u011f\u0131d\u0131r.<\/p>\n<h2>Bankac\u0131l\u0131k Trojanlar\u0131<\/h2>\n<p>Casus yaz\u0131l\u0131mlar\u0131n di\u011fer bir \u00f6zelle\u015ftirilmi\u015f hali de, banka kartlar\u0131 ve uygulamalar\u0131na ili\u015fkin verileri \u00e7alan Bankac\u0131l\u0131k Trojanlar\u0131\u2019d\u0131r. Bu canavarlar hackerlar aras\u0131nda olduk\u00e7a pop\u00fclerdir, \u00e7\u00fcnk\u00fc di\u011fer ki\u015filerin hesaplar\u0131na do\u011frudan bir eri\u015fim sa\u011flarlar.<\/p>\n<p>Bankac\u0131l\u0131k Trojanlar\u0131\u2019n\u0131n \u00e7ok farkl\u0131 t\u00fcrleri bulunur ve \u00e7o\u011fu durumda bir dizi i\u015flevi bir araya getirirler. \u00d6rne\u011fin; bunlar\u0131n \u00e7o\u011fu, bankac\u0131l\u0131k uygulamas\u0131n\u0131n aray\u00fcz\u00fcn\u00fc taklit edebilir ve kullan\u0131c\u0131n\u0131n bankac\u0131l\u0131k uygulamas\u0131na veri giriyor gibi g\u00f6r\u00fcn\u00fcrken asl\u0131nda Trojan\u2019a verileri vermesini sa\u011flayabilir. Trojan bu bilgileri kaydeder ve banka m\u00fc\u015fterisine aktar\u0131r, b\u00f6ylece kullan\u0131c\u0131 hi\u00e7bir \u015feyden \u015f\u00fcphelenmez. Ayr\u0131ca \u00e7o\u011fu durumda, Mobil Bankac\u0131l\u0131k Trojan\u2019lar\u0131 bankalardan gelen ve do\u011frulama kodu ve para \u00e7ekimi bilgisi i\u00e7eren SMS mesajlar\u0131n\u0131 da durdurabilir.<\/p>\n<p>\u00d6rne\u011fin; Trojan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/faketoken-trojan-taxi\/3677\/\" target=\"_blank\" rel=\"noopener\">Faketoken<\/a>, tamamen me\u015fru nedenlerle, CVV kodu dahil kart bilgileri talep etmesi anla\u015f\u0131l\u0131r olan \u00e7e\u015fitli uygulamalar\u0131 taklit eden pencereler kullan\u0131yordu. Daha sonra program, banka taraf\u0131ndan g\u00f6nderilen SMS\u2019i engelliyor ve bunu siber su\u00e7lulara aktar\u0131yordu. Siber su\u00e7lular da b\u00f6ylece cihaz\u0131n sahibi ad\u0131na i\u015flem ger\u00e7ekle\u015ftirebiliyordu.<\/p>\n<h2>Mobil Trojanlar\u2019a kar\u015f\u0131 nas\u0131l koruma sa\u011flan\u0131r?<\/h2>\n<p>Kendinizi t\u00fcm bu Trojan zarar\u0131ndan korumak i\u00e7in, a\u015fa\u011f\u0131daki basit birka\u00e7 kural\u0131 bilmenizde fayda var:<\/p>\n<ul>\n<li>Yaln\u0131zca Google Play gibi resmi ma\u011fazalardan uygulama indirin. Tam bir g\u00fcvenlik garantisi sa\u011flamasa da, bu sayede bir Trojan\u2019a denk gelme riskiniz kayda de\u011fer \u00f6l\u00e7\u00fcde azalacakt\u0131r. Ayr\u0131ca cihaz ayarlar\u0131nda bulunan, \u00fc\u00e7\u00fcnc\u00fc taraf kaynaklardan yaz\u0131l\u0131m indirme se\u00e7ene\u011fini kapatman\u0131z\u0131 de \u00f6neririz.<\/li>\n<li>Sistem ve uygulama g\u00fcncellemeleri yapmay\u0131 unutmay\u0131n. Bunlar, su\u00e7lular\u0131n s\u00f6m\u00fcrebilecekleri g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapat\u0131r.<\/li>\n<li>E-posta veya k\u0131sa mesajlardaki \u015f\u00fcpheli ba\u011flant\u0131lara t\u0131klamadan \u00f6nce iyi d\u00fc\u015f\u00fcn\u00fcn.<\/li>\n<li>Kurulum s\u0131ras\u0131nda uygulamalar taraf\u0131ndan talep edilen izinlere dikkat edin. <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/android-permissions-guide\/2956\/\" target=\"_blank\" rel=\"noopener\">\u0130zinler ve bunlara dair tehlikeler<\/a> konusundaki yaz\u0131m\u0131za g\u00f6z at\u0131n.<\/li>\n<li>Telefonunuza iyi bir antivir\u00fcs program\u0131 y\u00fckleyin ve sistemi d\u00fczenli olarak taramadan ge\u00e7irin. \u00d6rne\u011fin, <a href=\"http:\/\/kas.pr\/kdkisatr\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security for Android<\/a> \u015f\u00fcpheli uygulamalar\u0131 tespit eder, zarars\u0131z hale getirir ve sizi zararl\u0131 web sitelerinden uzak tutar.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Mobil tehditlere y\u00f6nelik kapsaml\u0131 ara\u015ft\u0131rmam\u0131z\u0131n \u00fc\u00e7\u00fcnc\u00fc b\u00f6l\u00fcm\u00fcnde, temel amac\u0131 de\u011ferli bilgileri \u00e7almak olan k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 ele alaca\u011f\u0131z.<\/p>\n","protected":false},"author":2484,"featured_media":5285,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284,1351],"tags":[555,105,1728,1730,744,372,36,877,1116,537,1729,599,553],"class_list":{"0":"post-5284","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"category-threats","9":"tag-akilli-telefonlar","10":"tag-android","11":"tag-bankacilik-trojanlari","12":"tag-casusluk-yazilimi","13":"tag-guvenlik","14":"tag-keylogger","15":"tag-malware-2","16":"tag-sistem-aciklari","17":"tag-spyware","18":"tag-tehditler","19":"tag-tus-kaydediciler","20":"tag-uygulamalar","21":"tag-zararli-yazilim-2"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mobile-malware-part-3\/5284\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mobile-malware-part-3\/14311\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mobile-malware-part-3\/12000\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/mobile-malware-part-3\/6091\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mobile-malware-part-3\/16292\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mobile-malware-part-3\/14471\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mobile-malware-part-3\/13423\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mobile-malware-part-3\/17015\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/mobile-malware-part-3\/16309\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mobile-malware-part-3\/21370\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mobile-malware-part-3\/23971\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mobile-malware-part-3\/10992\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mobile-malware-part-3\/10911\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/mobile-malware-part-3\/9769\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mobile-malware-part-3\/17763\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/mobile-malware-part-3\/12314\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/mobile-malware-part-3\/21654\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/mobile-malware-part-3\/23816\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mobile-malware-part-3\/17385\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mobile-malware-part-3\/21240\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mobile-malware-part-3\/21247\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/tehditler\/","name":"tehditler"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5284"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5284\/revisions"}],"predecessor-version":[{"id":6898,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5284\/revisions\/6898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5285"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}