{"id":5686,"date":"2019-02-20T14:26:11","date_gmt":"2019-02-20T11:26:11","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5686"},"modified":"2019-11-15T14:33:06","modified_gmt":"2019-11-15T11:33:06","slug":"spearphishers-information","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/spearphishers-information\/5686\/","title":{"rendered":"Siber su\u00e7lular hedefli kimlik av\u0131 i\u00e7in nas\u0131l bilgi topluyor?"},"content":{"rendered":"<p>Son on y\u0131ldaki hedefli sald\u0131r\u0131lar\u0131 analiz etti\u011fimizde, neredeyse t\u00fcm vakalar\u0131n ayn\u0131 c\u00fcmleyle ba\u015flad\u0131\u011f\u0131n\u0131 fark ettik: \u201cHer \u015fey, kurban\u0131n bir kimlik av\u0131 e-postas\u0131n\u0131 a\u00e7mas\u0131yla ba\u015flad\u0131.\u201d Peki kimlik av\u0131 e-postalar\u0131 neden bu kadar etkili? \u00c7\u00fcnk\u00fc bu e-postalar, uygun bir ba\u011flamda kullan\u0131l\u0131yor ve her kurbana \u00f6zel olarak haz\u0131rlan\u0131yor.<\/p>\n<p>Kurbanlar\u0131n sosyal a\u011flardaki hesaplar\u0131, bilgi kayna\u011f\u0131 olarak s\u0131kl\u0131kla kullan\u0131l\u0131yor. Bu da do\u011fal olarak \u015fu soruyu akla getiriyor: Nas\u0131l? Siber su\u00e7lular bu hesaplar\u0131 nas\u0131l buluyor? Bu \u00e7o\u011funlukla, kurban\u0131n \u201cherkese a\u00e7\u0131k\u201d olma derecesine ba\u011fl\u0131d\u0131r. Bir kullan\u0131c\u0131n\u0131n bilgileri kurumsal bir web sitesinde, \u00f6zellikle de detayl\u0131 bir biyografi ve LinkedIn profili de eklenerek yay\u0131nlanm\u0131\u015fsa, kurban\u0131n hesaplar\u0131n\u0131 bulmak asl\u0131nda olduk\u00e7a kolayd\u0131r. Ancak siber su\u00e7lunun elindeki tek \u015fey e-posta adresiniz ise o zaman bu i\u015f daha karma\u015f\u0131k bir hal al\u0131r. Sald\u0131rganlar, yaln\u0131zca hedef \u015firketin ofisine girerken \u00e7ekilen bir foto\u011fraf\u0131n\u0131za sahipse sosyal a\u011flarda profilinizi bulma \u015fanslar\u0131 \u00e7ok daha d\u00fc\u015f\u00fckt\u00fcr.<\/p>\n<p>Veri at\u0131klar\u0131n\u0131 temel alarak bilgi aramak i\u00e7in k\u00fc\u00e7\u00fck bir deney ger\u00e7ekle\u015ftirdik. Deneyde, sosyal medya kullan\u0131m\u0131 farkl\u0131 d\u00fczeylerde olan \u00e7ok say\u0131da meslekta\u015f\u0131m\u0131z\u0131, herkes taraf\u0131ndan eri\u015filebilen arama ara\u00e7lar\u0131n\u0131 kullanarak bulmaya \u00e7al\u0131\u015ft\u0131k.<\/p>\n<h2>Foto\u011frafla arama<\/h2>\n<p>Birisini, foto\u011fraf\u0131n\u0131 kullanarak bulmaya \u00e7al\u0131\u015fmak pek yayg\u0131n bir senaryo de\u011fil. Bu senaryoda siber su\u00e7lunun, hedef \u015firket binas\u0131n\u0131n giri\u015finde konu\u015fland\u0131\u011f\u0131n\u0131 ve ge\u00e7i\u015f kartlar\u0131nda \u00f6zel bir logo olan herkesin gizlice foto\u011fraf\u0131n\u0131 \u00e7ekti\u011fini, ard\u0131ndan kimlik av\u0131 sald\u0131r\u0131s\u0131 i\u00e7in uygun bir kurban aramaya ba\u015flad\u0131\u011f\u0131n\u0131 varsay\u0131yoruz. Peki bu arama nerede ba\u015fl\u0131yor?<\/p>\n<p>\u0130ki y\u0131l \u00f6nce (zaman ne kadar da h\u0131zl\u0131 ge\u00e7iyor), FindFace hizmeti \u00fczerine bir yaz\u0131 <a href=\"https:\/\/www.kaspersky.com\/blog\/findface-experiment\/11916\/\" target=\"_blank\" rel=\"noopener nofollow\">yazm\u0131\u015ft\u0131k<\/a>. Sald\u0131rganlar\u0131n elinde hedef ki\u015finin y\u00fcksek kaliteli foto\u011fraflar\u0131 mevcutsa bu hizmet, belirli \u015fartlar alt\u0131nda elinizdeki g\u00f6r\u00fcnt\u00fcy\u00fc h\u0131zl\u0131ca bir sosyal medya hesab\u0131yla e\u015fle\u015ftirebilir. Bununla beraber, ge\u00e7ti\u011fimiz y\u0131l\u0131n Haziran ay\u0131nda bu hizmet standart kullan\u0131c\u0131lar\u0131n eri\u015fimine kapand\u0131. Hizmetin yarat\u0131c\u0131lar\u0131 kendilerini devletler ve \u015firketler i\u00e7in yeni \u00e7\u00f6z\u00fcmler geli\u015ftirmeye adad\u0131 ve FindFace art\u0131k \u00fccretli bir hizmet olarak sunuluyor. Dahas\u0131 hizmetin yarat\u0131c\u0131lar\u0131, bu hizmetin herkese a\u00e7\u0131k versiyonunun yaln\u0131zca \u201cyap\u0131labileceklerin bir \u00f6n g\u00f6sterisi\u201d oldu\u011funu a\u00e7\u0131k\u00e7a belirtmi\u015ftir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"gandalf30\">\n<p>Ancak bu hizmet yine de yabana at\u0131lmamal\u0131. Siber su\u00e7lular baz\u0131 durumlarda, hedefli bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in ekstra ara\u00e7lara yat\u0131r\u0131m yapmaya g\u00f6n\u00fcll\u00fc olabilirler. Bu, tamamen sald\u0131r\u0131n\u0131n hedefine ba\u011fl\u0131d\u0131r ancak bu hizmetin kullan\u0131lmas\u0131 arkada istenmeyen izlerin b\u0131rak\u0131lmas\u0131 anlam\u0131na gelebilir.<\/p>\n<p>Foto\u011fraf ile arama, <a href=\"https:\/\/www.google.com\/imghp?hl=TR\" target=\"_blank\" rel=\"noopener nofollow\">Google<\/a> \u00fczerinden \u00fccretsiz olarak kullan\u0131labilen bir hizmet olup \u00e7ok say\u0131da arama hizmetini otomatik olarak tarayan bir foto\u011fraf-ile-ara eklentisi de sunmaktad\u0131r. Ancak bu y\u00f6ntem, halihaz\u0131rda \u00e7evrimi\u00e7i olarak yay\u0131nlanm\u0131\u015f foto\u011fraflarda i\u015fe yaramaktad\u0131r. O y\u00fczden elimizdeki foto\u011fraf, bir web sitesinden <a href=\"https:\/\/www.kaspersky.com.tr\/about\/team\" target=\"_blank\" rel=\"noopener\">resmi bir foto\u011fraf<\/a> olmad\u0131\u011f\u0131 s\u00fcrece bu senaryomuzda pek i\u015fe yaramasa da web sitesindeki foto\u011fraflar, \u00e7o\u011funlukla ekstra bilgiler (ad ve soyad) eklenerek yay\u0131nlan\u0131r.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5688\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/02\/19170028\/gentelman.png\" alt=\"\" width=\"804\" height=\"787\"><\/p>\n<p>Yine de bu arama y\u00f6ntemini denedik. Arad\u0131\u011f\u0131m\u0131z ki\u015fi Facebook ve di\u011fer sosyal a\u011flarda ayn\u0131 foto\u011fraf\u0131 kullan\u0131yor olmas\u0131na ra\u011fmen Google, sadece g\u00f6n\u00fcll\u00fcm\u00fcz\u00fcn \u201cerkek\u201d oldu\u011funu bulmay\u0131 ba\u015fard\u0131. Sonu\u00e7 olarak, foto\u011fraf\u0131n\u0131z\u0131 \u00e7eken siber su\u00e7lular\u0131n, \u00fccretli bir y\u00fcz tan\u0131ma hizmeti kullanmadan, foto\u011fraf\u0131 sizin profilinizle e\u015fle\u015ftirmesinin pek olas\u0131 olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyoruz.<\/p>\n<h2>Ad ve soyad<\/h2>\n<p>Birini internette ararken, yap\u0131lacak ilk \u015fey genellikle o ki\u015finin ad\u0131n\u0131 ve soyad\u0131n\u0131 aramakt\u0131r. Elbette, araman\u0131n ba\u015far\u0131l\u0131 olup olmayaca\u011f\u0131, b\u00fcy\u00fck oranda aranan ismin yayg\u0131nl\u0131\u011f\u0131na ba\u011fl\u0131d\u0131r. John Smith ad\u0131n\u0131 ta\u015f\u0131yan belirli bir ki\u015fiyi bulmak kolay bir i\u015f olmayabilir. Ancak Google, \u201cLurie\u201d (pek yayg\u0131n olmayan bir soyad) soyadl\u0131 bir ki\u015fiyi h\u0131zl\u0131ca bulabilir.<\/p>\n<p>Laf\u0131 gelmi\u015fken, baz\u0131 sosyal a\u011flar\u0131n, herhangi bir hesap a\u00e7madan, ba\u015fka bir ki\u015finin profilini g\u00f6rmenize izin verdi\u011fini biliyor muydunuz?<\/p>\n<h2>E-posta ve telefon numaras\u0131<\/h2>\n<p>Peki ya birisinin e-posta veya telefon numaras\u0131n\u0131 biliyorsak? Bu bilgilere sahip oldu\u011fumuzda kestirmeden gidebilir ve tek tek sosyal a\u011flarda arama yapabiliriz. Ancak gerekli verileri otomatik olarak toplayan toplay\u0131c\u0131 hizmetleri de mevcuttur. Bunlar\u0131n en pop\u00fcleri olan <a href=\"https:\/\/pipl.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Pipl<\/a>, telefon numaras\u0131 veya e-posta adresiyle sosyal a\u011flardaki kullan\u0131c\u0131 sayfalar\u0131n\u0131n ba\u011flant\u0131s\u0131n\u0131 bulabilir ve do\u011frum tarihi, e\u011fitim ve i\u015f durumu gibi bilgileri de i\u00e7eren k\u0131sa bir biyografiyi size sunabilir. Pipl\u2019\u0131n geli\u015ftiricilerine g\u00f6re, sunduklar\u0131 hizmet 3 milyardan fazla insan\u0131n bilgisine sahip!<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5689\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/02\/19170137\/190208-spearphishers-information-4.png\" alt=\"\" width=\"820\" height=\"674\"><\/p>\n<p>Bu hizmeti kullanarak on g\u00f6n\u00fcll\u00fcm\u00fczden be\u015fi i\u00e7in en az bir kullan\u0131c\u0131 hesab\u0131 ba\u011flant\u0131s\u0131 elde ettik; baz\u0131 durumlarda \u00e7evrimi\u00e7i takma adlar\u0131 ve kullan\u0131c\u0131 adlar\u0131n\u0131 dahi bulmay\u0131 ba\u015fard\u0131k.<\/p>\n<h2>Kullan\u0131c\u0131 ad\u0131<\/h2>\n<p>Baz\u0131 ki\u015filer hem ki\u015fisel hem de kurumsal e-posta adresleri i\u00e7in tek bir kullan\u0131c\u0131 ad\u0131 kullanmaktad\u0131r; kimisi ise internetteki \u00f6zel ya\u015famlar\u0131 i\u00e7in ayr\u0131 bir kullan\u0131c\u0131 ad\u0131 kullan\u0131rken ayn\u0131 zamanda kurumsal bir adres de edinmektedir. Siber su\u00e7lular\u0131n eline ge\u00e7en bir kullan\u0131c\u0131 ad\u0131, hedeflenen kurban hakk\u0131nda daha fazla bilgi elde etmek i\u00e7in kullan\u0131labilir.<\/p>\n<p>Bu, <a href=\"https:\/\/namechk.com\/\" target=\"_blank\" rel=\"noopener nofollow\">namechk<\/a> veya <a href=\"https:\/\/knowem.com\/\" target=\"_blank\" rel=\"noopener nofollow\">knowem<\/a> gibi kaynaklar kullan\u0131larak yap\u0131labilir. Bunlardan birincisi, 100\u2019den fazla hizmette bir hesap ad\u0131n\u0131 tespit edebilirken ikincisi ise 500\u2019den fazla kayna\u011f\u0131 kontrol edebilir. Elbette, aranan kullan\u0131c\u0131 ad\u0131 yayg\u0131n olarak kullan\u0131l\u0131yorsa istenilen ki\u015fiyi bulman\u0131n garantisi yoktur. \u00d6yle olsa bile, bu t\u00fcr bir hizmet, siber su\u00e7lular i\u00e7in olduk\u00e7a kullan\u0131\u015fl\u0131 bir ara\u00e7t\u0131r.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5690\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/02\/19170214\/190208-spearphishers-information-5.jpg\" alt=\"\" width=\"1277\" height=\"560\"><\/p>\n<h2>Ne yapmal\u0131s\u0131n\u0131z?<\/h2>\n<p>G\u00f6rd\u00fc\u011f\u00fcn\u00fcz gibi, potansiyel kurbanlar (nerede ya\u015fad\u0131klar\u0131, nelerden ho\u015fland\u0131klar\u0131 vs.) hakk\u0131nda veri toplamak, b\u00fcy\u00fck bir teknik ustal\u0131k veya kompleks hizmetlere eri\u015fim gerektirmiyor. O y\u00fczden, kimlik av\u0131 y\u00f6ntemlerini \u00f6\u011frenmek d\u0131\u015f\u0131nda \u00e7al\u0131\u015fanlar\u0131n\u0131za \u015fu birka\u00e7 <a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/10550\/\" target=\"_blank\" rel=\"noopener nofollow\">basit kural\u0131<\/a> anlatman\u0131z\u0131 \u00f6neriyoruz:<\/p>\n<ol>\n<li>Sosyal a\u011flara, kay\u0131t oldu\u011funuzda herkese a\u00e7\u0131k hale gelecek, e-posta veya telefon numaran\u0131zla kaydolmay\u0131n.<\/li>\n<li>Ki\u015fisel ve resmi i\u015f hesaplar\u0131n\u0131z i\u00e7in ayn\u0131 foto\u011fraf\u0131 kullanmay\u0131n.<\/li>\n<li>Bir profiliniz bulundu\u011funda di\u011ferinin de a\u00e7\u0131\u011fa \u00e7\u0131kmamas\u0131 i\u00e7in farkl\u0131 kullan\u0131c\u0131 adlar\u0131 kullan\u0131n.<\/li>\n<li>Sosyal a\u011flarda kendinizle ilgili gere\u011finden fazla bilgi payla\u015f\u0131p siber su\u00e7lular\u0131n i\u015fini kolayla\u015ft\u0131rmay\u0131n.<\/li>\n<\/ol>\n<p>En \u00f6nemlisi, b\u00fct\u00fcn \u00e7al\u0131\u015fan i\u015f istasyonlar\u0131n\u0131z, Kaspersky Endpoint Security for Business gibi etkili kimlik av\u0131 korumas\u0131 \u00f6zelli\u011fine sahip g\u00fcvenilir ve tam \u00f6zellikli bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc ile korunmal\u0131d\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Son on y\u0131ldaki hedefli sald\u0131r\u0131lar\u0131 analiz etti\u011fimizde, neredeyse t\u00fcm vakalar\u0131n ayn\u0131 c\u00fcmleyle ba\u015flad\u0131\u011f\u0131n\u0131 fark ettik: &#8220;Her \u015fey, kurban\u0131n bir kimlik av\u0131 e-postas\u0131n\u0131 a\u00e7mas\u0131yla ba\u015flad\u0131.&#8221; <\/p>\n","protected":false},"author":2499,"featured_media":5687,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1275,584],"class_list":{"0":"post-5686","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-kullanici-faktoru","11":"tag-oltalama"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/spearphishers-information\/5686\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/spearphishers-information\/15227\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/spearphishers-information\/12796\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/spearphishers-information\/17165\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/spearphishers-information\/15326\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/spearphishers-information\/14042\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/spearphishers-information\/17834\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/spearphishers-information\/16891\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/spearphishers-information\/22228\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/spearphishers-information\/25589\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/spearphishers-information\/11486\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/spearphishers-information\/11484\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/spearphishers-information\/10338\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/spearphishers-information\/18535\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/spearphishers-information\/22407\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/spearphishers-information\/17921\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/spearphishers-information\/22099\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/spearphishers-information\/22032\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/oltalama\/","name":"oltalama"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2499"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5686"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5686\/revisions"}],"predecessor-version":[{"id":6840,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5686\/revisions\/6840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5687"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}