{"id":5757,"date":"2019-03-13T21:16:45","date_gmt":"2019-03-13T18:16:45","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5757"},"modified":"2019-11-15T14:32:02","modified_gmt":"2019-11-15T11:32:02","slug":"gandcrab-ransomware-is-back","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/gandcrab-ransomware-is-back\/5757\/","title":{"rendered":"Porno \u015fantaj\u0131 uygulamas\u0131 GandCrab geri d\u00f6nd\u00fc"},"content":{"rendered":"<p>\u201cWeb kameran\u0131 ele ge\u00e7irdik ve seni porno izlerken yakalad\u0131k.\u201d Verilerini \u015fifreledik. \u015eimdi de fidye istiyoruz.\u201d Benzer bir <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/extortion-spam\/5529\/\" target=\"_blank\" rel=\"noopener\">\u015fantaj y\u00f6netminin<\/a> ge\u00e7en y\u0131l ola\u011fan\u00fcst\u00fc bir ba\u015far\u0131 kazand\u0131\u011f\u0131n\u0131 hat\u0131rl\u0131yor olabilirsiniz. Do\u011frusu, bitmekte olan bu \u015fantaj doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n\u0131n arkas\u0131nda <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-for-dummies\/2713\/\" target=\"_blank\" rel=\"noopener\">fidye yaz\u0131l\u0131m\u0131<\/a> oldu\u011fu s\u00f6ylentileri biraz abart\u0131l\u0131 g\u00f6r\u00fcn\u00fcyor.<\/p>\n<p><strong>GandCrab fidye yaz\u0131l\u0131m\u0131<\/strong> geri d\u00f6nd\u00fc ve her zamanki gibi aktif. Geli\u015ftiricileri, zor kazand\u0131klar\u0131 ve \u015fu anda <a href=\"https:\/\/www.zdnet.com\/article\/bitdefender-releases-third-gandcrab-ransomware-free-decrypter-in-the-past-year\/\" target=\"_blank\" rel=\"noopener nofollow\">ellerinde tuttuklar\u0131<\/a> hisselerini (t\u00fcm fidye yaz\u0131l\u0131m\u0131 piyasas\u0131n\u0131n y\u00fczde 40\u2019\u0131n\u0131) kaybetmemek i\u00e7in s\u00fcrekli yeni versiyonlar\u0131 piyasaya s\u00fcr\u00fcyorlar. GandCrab\u2019\u0131 kiralayan ve yayan sald\u0131rganlar farkl\u0131, yarat\u0131c\u0131 ve hatta bazen romantik taktikler tercih ederek kurbanlara sald\u0131rmaya devam ediyorlar.<\/p>\n<h2>Duygusallar i\u00e7in fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>A\u015fk ilanlar\u0131 i\u00e7eren ba\u015fl\u0131klar cazip g\u00f6r\u00fcnebilir ancak \u201cSana a\u015fk mektubum,\u201d \u201cSana a\u015f\u0131k oldum,\u201d ve \u201cSenin hakk\u0131ndaki d\u00fc\u015f\u00fcncelerimi yazd\u0131m,\u201d gibi ifadeler olas\u0131 bir fel\u00e2ketin habercisi olabilir. Sevgililer G\u00fcn\u00fc, Noel, Yeni Y\u0131l veya do\u011fum g\u00fcn\u00fcn\u00fcze yak\u0131n tarihlerde, hatta i\u015f yerinde kasvetli bir Pazartesi g\u00fcn\u00fc bile b\u00f6yle bir mesaj tehlike uyand\u0131rmayabilir bile. Ancak her e-posta kadar bu t\u00fcr e-postalar da dikkatlice incelenmeye de\u011fer.<\/p>\n<p>Bug\u00fcnlerde ortal\u0131kta dola\u015fan k\u00f6t\u00fc ama\u00e7l\u0131 bir e-postan\u0131n en yayg\u0131n \u00e7e\u015fidi, konu sat\u0131r\u0131nda romantik bir c\u00fcmle, metinde kalp sembol\u00fc ve bir ek i\u00e7erir (genellikle Love_You ad\u0131nda bir ZIP dosyas\u0131 ve ard\u0131ndan gelen birka\u00e7 rakam). \u0130\u00e7indeki JacaScript dosyas\u0131n\u0131 ay\u0131klay\u0131p \u00e7al\u0131\u015ft\u0131r\u0131rsan\u0131z GandCrab fidye yaz\u0131l\u0131m\u0131n\u0131 indirir.<\/p>\n<p>Ard\u0131ndan, bilgisayar\u0131n\u0131zdaki t\u00fcm verilerin \u015fifrelendi\u011fini ve bu verileri geri almak i\u00e7in fidye (muhtemelen bitcoin cinsinden) \u00f6deyebilece\u011finizi a\u00e7\u0131klayan bir nota y\u00f6nlendirilirsiniz. Kripto para birimlerinin nas\u0131l kullan\u0131ld\u0131\u011f\u0131n\u0131 bilmiyorsan\u0131z sald\u0131r\u0131y\u0131 d\u00fczenleyen \u00e7ete b\u00fcy\u00fck bir nezaket g\u00f6stererek gerekli miktar\u0131 sat\u0131n al\u0131p fidyeyi \u00f6deyece\u011finizi \u00f6\u011fretecek bir canl\u0131 sohbet penceresi sunar.<\/p>\n<h2>\u0130\u015f i\u00e7in fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>2017 y\u0131l\u0131nda, BT \u015firketleri i\u00e7in iki y\u00f6netim sistemi aras\u0131ndaki verileri senkronize etmek i\u00e7in kullan\u0131lan bir ara\u00e7taki g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 gideren bir d\u00fczeltme eki yay\u0131mland\u0131. Ancak herkes bu d\u00fczeltme ekini y\u00fcklemedi. 2019\u2019da<a href=\"https:\/\/blog.huntresslabs.com\/cve-2017-18362-arbitrary-sql-injection-in-mangeditsync-integration-ba142ff24f4d\" target=\"_blank\" rel=\"noopener nofollow\"> GandCrab, d\u00fczeltme ekini y\u00fcklemeyen ki\u015fileri hedef al\u0131p<\/a> ula\u015fabildi\u011fi t\u00fcm bilgisayarlar\u0131 \u015fifreliyor.<\/p>\n<p>G\u00fcvenlik a\u00e7\u0131\u011f\u0131, k\u00f6t\u00fc niyetli ki\u015filerin yeni y\u00f6netici hesaplar\u0131 olu\u015fturmalar\u0131n\u0131 ve buradan fidye yaz\u0131l\u0131m\u0131n\u0131 y\u00f6netilmekte olan u\u00e7 noktalara y\u00fcklemek i\u00e7in komutlar \u00fcretmelerini sa\u011fl\u0131yor. Ba\u015fka bir deyi\u015fle, sald\u0131r\u0131ya u\u011frayan \u015firketin m\u00fc\u015fterilerinin makinelerini \u015fifreliyorlar ve (her zaman kripto para biriminde) geri \u00f6deme talep ediyorlar.<\/p>\n<h2>Pani\u011fe kap\u0131lan sorumlu ki\u015filer (herkes) i\u00e7in fidye yaz\u0131l\u0131mlar\u0131<\/h2>\n<p>Ka\u00e7\u0131m\u0131z \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131z bina i\u00e7in g\u00fcncellenmi\u015f bir acil \u00e7\u0131k\u0131\u015f haritas\u0131 oldu\u011funu s\u00f6yleyen bir e-posta ekini a\u00e7ard\u0131k? Tamamen bilinmeyen bir adresten gelse bile? B\u00fcy\u00fck ihtimalle, hepimiz. Sonu\u00e7ta, \u00e7ok az ki\u015fi g\u00fcvenlik y\u00f6neticilerinin adlar\u0131n\u0131 hat\u0131rl\u0131yor.<\/p>\n<p>Sald\u0131rganlar, bir Word dosyas\u0131 eklenmi\u015f olan k\u00f6t\u00fc niyetli e-postalar g\u00f6ndererek <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/beware-of-exit-map-spam-pushing-gandcrab-v51-ransomware\/\" target=\"_blank\" rel=\"noopener nofollow\">bu f\u0131rsat\u0131 k\u00f6t\u00fcye kullanmaya<\/a> ba\u015flad\u0131lar. Belgeyi a\u00e7anlar yaln\u0131zca \u201cAcil \u00e7\u0131k\u0131\u015f haritas\u0131\u201d ba\u015fl\u0131\u011f\u0131n\u0131 ve \u0130\u00e7eri\u011fi Etkinle\u015ftir butonunu g\u00f6r\u00fcyorlar. Butona t\u0131klarsan\u0131z GandCrab fidye yaz\u0131l\u0131m\u0131n\u0131 y\u00fcklemi\u015f olursunuz.<\/p>\n<h2>\u00d6deme yapanlar i\u00e7in fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>Ba\u015fka bir taktik, WeTransfer\u2019den indirilebilecek bir faturaya veya \u00f6deme onay\u0131na benzeyen bir e-postay\u0131 kullan\u0131r. Ba\u011flant\u0131, bir \u015fifreyle a\u00e7\u0131lacak bir ZIP veya bazen RAR dosyas\u0131na gider. Ar\u015fivin i\u00e7inde ne oldu\u011funu tahmin edin.<\/p>\n<h2>\u0130talyanlar i\u00e7in fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>Ba\u015fka bir \u00e7e\u015fit, Excel dosya eki \u015feklinde bir \u201c\u00f6deme uyar\u0131s\u0131\u201d kullanabilir. Bu eki a\u00e7maya \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131zda bir dosya ileti\u015fim kutusu size \u00e7evrimi\u00e7i olarak \u00f6nizleme yapamayaca\u011f\u0131n\u0131z\u0131 s\u00f6yleyecek ve i\u00e7eri\u011fi g\u00f6rmek i\u00e7in D\u00fczenlemeyi etkinle\u015ftir ve \u0130\u00e7eri\u011fi etkinle\u015ftir\u2019i t\u0131klaman\u0131z\u0131 \u00f6nerecektir.<\/p>\n<p>\u0130lgin\u00e7 bir \u015fekilde, bu \u00f6zel sald\u0131r\u0131 yaln\u0131zca <a href=\"https:\/\/www.bromium.com\/gandcrab-ransomware-code-hiding-in-image\/\" target=\"_blank\" rel=\"noopener nofollow\">\u0130talyanlar\u0131 hedef al\u0131yor<\/a> (en az\u0131ndan \u015fimdilik). Gerekli butonlara t\u0131klayarak, i\u015fletim sisteminin y\u00f6netim diline ba\u011fl\u0131 olarak bilgisayar\u0131n\u0131z\u0131n \u0130talya\u2019da olup olmad\u0131\u011f\u0131n\u0131 kontrol eden bir komut dosyas\u0131n\u0131 etkinle\u015ftirirsiniz.<\/p>\n<p>\u0130talya\u2019da de\u011filse \u00f6zel bir \u015fey olmaz. Ancak \u0130talya\u2019da oldu\u011funuz g\u00f6r\u00fcl\u00fcrse sald\u0131rgan\u0131n mizah anlay\u0131\u015f\u0131n\u0131 bir Mario resmi ile tecr\u00fcbe edersiniz. Super Mario Bros\u2019taki resmi bilirsiniz.<\/p>\n<div id=\"attachment_5759\" style=\"width: 213px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-5759\" class=\"wp-image-5759 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/03\/13205356\/mario_b.png\" alt=\"\" width=\"203\" height=\"185\"><p id=\"caption-attachment-5759\" class=\"wp-caption-text\">Mario\u2019nun bu resmi, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indiren k\u00f6t\u00fc ama\u00e7l\u0131 bir kod i\u00e7erir.<\/p><\/div>\n<p>Dosyan\u0131n i\u00e7eri\u011fini g\u00f6r\u00fcnt\u00fclemek i\u00e7in t\u0131klad\u0131\u011f\u0131n\u0131zda indirilen resim, k\u00f6t\u00fc ama\u00e7l\u0131 PowerShell kodunu i\u00e7erir ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 indirmeye ba\u015flar. \u015eu anda, ara\u015ft\u0131rmac\u0131lar bunun tam olarak hangi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m oldu\u011funa karar veremiyor: Verilerinizi \u015fifreleyen <a href=\"https:\/\/www.bromium.com\/gandcrab-ransomware-code-hiding-in-image\/\" target=\"_blank\" rel=\"noopener nofollow\">GandCrab<\/a> ya da banka ve \u00e7evrimi\u00e7i hesap bilgilerinizi <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/mobile-banking-trojans-faq\/2548\/\" target=\"_blank\" rel=\"noopener\">\u00e7alan<\/a> <a href=\"https:\/\/blog.yoroi.company\/warning\/campagna-di-attacco-fattura-corretta\/\" target=\"_blank\" rel=\"noopener nofollow\">Ursnif<\/a> olabilir. Do\u011frusunu s\u00f6ylemek gerekirse bu pek bir fark yaratm\u0131yor; buradaki as\u0131l nokta teslimat y\u00f6ntemi ancak bunlar da s\u00fcrekli evriliyor.<\/p>\n<h2>A\u00e7g\u00f6zl\u00fc crabster\u2019a hay\u0131r deyin<\/h2>\n<p>K\u00f6t\u00fc niyetli ki\u015filer ekibi taraf\u0131ndan geli\u015ftirilen ve m\u00fcmk\u00fcn oldu\u011fu kadar \u00e7ok hedefi \u015fifrelemeye \u00e7al\u0131\u015fan di\u011fer sahtekarlara kiralanan bir hizmet \u015feklindeki fidye yaz\u0131l\u0131m\u0131 olan GandCrab bir\u00e7ok farkl\u0131 ki\u015fi taraf\u0131ndan da\u011f\u0131t\u0131l\u0131r. Ancak teslimat y\u00f6ntemlerindeki farkl\u0131l\u0131klara ra\u011fmen, en iyi uygulamalardan birka\u00e7\u0131 sizi GandCrab\u2019\u0131n a\u00e7g\u00f6zl\u00fc pen\u00e7elerine kar\u015f\u0131 koruyabilir. \u0130\u015fte onlar:<\/p>\n<ul>\n<li>Beklenmeyen bir e-posta ald\u0131\u011f\u0131n\u0131zda, bir eki a\u00e7madan \u00f6nce iletinin orijinal oldu\u011fundan emin olun. \u00d6rne\u011fin, g\u00f6ndereni aray\u0131n.<\/li>\n<li>Her zaman t\u00fcm \u00f6nemli verilerinizin g\u00fcvenilir ve test edilmi\u015f bir yede\u011fini al\u0131n, b\u00f6ylece acil bir durumda bu verileri geri y\u00fckleyebilirsiniz.<\/li>\n<li>Hi\u00e7bir fidye yaz\u0131l\u0131m\u0131n\u0131n bilgisayar\u0131n\u0131za bula\u015fmamas\u0131n\u0131 sa\u011flamak i\u00e7in iyi bir <a href=\"http:\/\/kas.pr\/kdksctr\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik paketi<\/a> kullan\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<p>Bu, GandCrab ile asla ki\u015fisel olarak kar\u015f\u0131la\u015fmamak i\u00e7in yeterli olmal\u0131. Ancak bilgisayar\u0131n\u0131z zaten GandCrab taraf\u0131ndan \u015fifrelenmi\u015fse, h\u00e2l\u00e2 hasar\u0131 en aza indirgeyebilirsiniz:<\/p>\n<ul>\n<li>Dosyalar\u0131n\u0131z\u0131 \u00fccretsiz olarak geri alabilirsiniz; <a href=\"https:\/\/www.nomoreransom.org\/en\/decryption-tools.html\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom projesinin<\/a> internet sitesindeki \u015fifre \u00e7\u00f6zme arac\u0131n\u0131 kontrol edin. GandCrab Ransomware\u2019in baz\u0131 s\u00fcr\u00fcmlerinde \u015fifre \u00e7\u00f6zmeyi sa\u011flayan kusurlar mevcut. Maalesef, t\u00fcm s\u00fcr\u00fcmlerinin \u015fifresi \u00e7\u00f6z\u00fclemez.<\/li>\n<li>\u015eifre \u00e7\u00f6zme arac\u0131n\u0131 indirmeden ve \u00e7al\u0131\u015ft\u0131rmadan \u00f6nce, fidye yaz\u0131l\u0131m\u0131n\u0131 cihaz\u0131n\u0131zdan kald\u0131rmak i\u00e7in <a href=\"http:\/\/kas.pr\/kdkistr\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir vir\u00fcsten koruma \u00e7\u00f6z\u00fcm\u00fc<\/a> kullan\u0131n. Aksi takdirde, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m sisteminizi s\u00fcrekli olarak kilitler veya dosyalar\u0131n\u0131z\u0131 \u015fifreler.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Web kameran\u0131 ele ge\u00e7irdik ve seni porno izlerken yakalad\u0131k.&#8221; Verilerini \u015fifreledik. \u015eimdi de fidye istiyoruz.&#8221; <\/p>\n","protected":false},"author":2508,"featured_media":5758,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[591,1875,447,954],"class_list":{"0":"post-5757","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-fidye-yazilimi","9":"tag-gandcrab","10":"tag-ransomware","11":"tag-santaj"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/gandcrab-ransomware-is-back\/5757\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/gandcrab-ransomware-is-back\/15352\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/12916\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/17290\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/gandcrab-ransomware-is-back\/15445\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/14146\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/gandcrab-ransomware-is-back\/17959\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/gandcrab-ransomware-is-back\/16991\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/gandcrab-ransomware-is-back\/22502\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/25854\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/gandcrab-ransomware-is-back\/11467\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/gandcrab-ransomware-is-back\/11547\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/gandcrab-ransomware-is-back\/10433\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/gandcrab-ransomware-is-back\/18666\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/gandcrab-ransomware-is-back\/22722\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/gandcrab-ransomware-is-back\/23944\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/gandcrab-ransomware-is-back\/18181\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/gandcrab-ransomware-is-back\/22225\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/gandcrab-ransomware-is-back\/22158\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2508"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5757"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5757\/revisions"}],"predecessor-version":[{"id":6826,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5757\/revisions\/6826"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5758"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}