{"id":5763,"date":"2019-03-14T18:41:30","date_gmt":"2019-03-14T15:41:30","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5763"},"modified":"2019-11-15T14:31:57","modified_gmt":"2019-11-15T11:31:57","slug":"cryptojacking-rsa2019","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cryptojacking-rsa2019\/5763\/","title":{"rendered":"Cryptojacker&#8217;lar\u0131n y\u00fckseli\u015fi"},"content":{"rendered":"<p>Cryptojacking, bilgisayar\u0131n\u0131n kripto para madencili\u011fi i\u00e7in bir ba\u015fkas\u0131 taraf\u0131ndan izinsiz olarak kullan\u0131lmas\u0131d\u0131r. Basit\u00e7e ifade etmek gerekirse bu y\u00f6ntemi, k\u00f6t\u00fc ama\u00e7l\u0131 madencilik olarak tan\u0131mlayabiliriz. Siber su\u00e7lular, (tercihen toplu halde) ba\u015fkalar\u0131n\u0131n bilgisayarlar\u0131na madencilik programlar\u0131 kurmak ve ekipman ya da elektrik maliyetini \u00fcstlenmeden kripto para madencili\u011finden elde edilen k\u00e2r\u0131n tamam\u0131n\u0131 almak i\u00e7in \u00e7e\u015fitli gizli y\u00f6ntemler kullan\u0131r.<\/p>\n<p>Cryptojacking y\u00f6ntemini bilmiyorsan\u0131z \u015fimdi \u00f6\u011frenmenin tam zaman\u0131. Neden mi?<\/p>\n<h2>Cryptojacking sald\u0131r\u0131lar\u0131ndaki devasa art\u0131\u015f<\/h2>\n<p>Mant\u0131ksal olarak kripto para birimlerinin de\u011ferindeki d\u00fc\u015f\u00fc\u015f nedeniyle madencilikten elde edilecek k\u00e2r\u0131n azald\u0131\u011f\u0131n\u0131 ve bunun da cryptojacking sald\u0131r\u0131lar\u0131nda azalmaya yol a\u00e7aca\u011f\u0131n\u0131 d\u00fc\u015f\u00fcnebilirsiniz. Ancak ger\u00e7ekte tam tersi oldu. 2019 RSA Konferans\u0131\u2019nda Cisco Umbrella\u2019n\u0131n analistleri, d\u00fcnya genelinde kripto para madencili\u011fi ile ili\u015fkili kurumsal trafik hacminin y\u0131l i\u00e7inde 200 kat artt\u0131\u011f\u0131n\u0131 belirtti! Bu art\u0131\u015f, do\u011frudan cryptojacking y\u00f6nteminin y\u00fckseli\u015finin bir sonucu.<\/p>\n<p>B\u00fcy\u00fck ihtimalle kripto para madencili\u011finin canl\u0131 oldu\u011fu y\u0131llarda insanlar bu i\u015ften y\u00fcksek getiriler elde etmeye al\u0131\u015ft\u0131. Fakat piyasa de\u011fer kaybettikten sonra madencilik i\u00e7in kendi ekipmanlar\u0131n\u0131 ve elektri\u011fini kullanmak verimsiz bir hal ald\u0131, baz\u0131 insanlar da daha hileli bir alternatif olan cryptojacking\u2019e ge\u00e7meye karar verdi.<\/p>\n<h2>Cryptojacking kimlere zarar verir?<\/h2>\n<p>Cryptojacking\u2019in as\u0131l hasar\u0131 en \u00e7ok, k\u00fc\u00e7\u00fck ve orta \u00f6l\u00e7ekli i\u015fletmeler taraf\u0131ndan hissedilir. K\u00fc\u00e7\u00fck \u00f6l\u00e7ekli i\u015fletmeler, kripto para madencili\u011fi trafi\u011finin \u00fc\u00e7te birini olu\u015ftururken orta \u00f6l\u00e7ekli i\u015fletmeler de yar\u0131s\u0131n\u0131 olu\u015fturur. Kurumsal \u015firketler ise bu s\u0131k\u0131nt\u0131n\u0131n yaln\u0131zca %18\u2019inden muzdariptir. B\u00fcy\u00fck olas\u0131l\u0131kla bu durumun nedeni, kurumsal i\u015fletmelerin bilgi g\u00fcvenli\u011fi konusunu daha ciddiye almas\u0131, KOB\u0130\u2019lerin ise bu konuda daha rahat bir yakla\u015f\u0131m benimsemesidir.<\/p>\n<p>Kripto madencilik trafi\u011finin sekt\u00f6rlere g\u00f6re da\u011f\u0131l\u0131m\u0131 da ilgin\u00e7tir: \u0130lk s\u0131rada enerji sekt\u00f6r\u00fc (%34) bulunurken bunu e\u011fitim (%26) ve sa\u011fl\u0131k (%7) sekt\u00f6r\u00fc takip eder.<\/p>\n<p>Cisco Umbrella\u2019n\u0131n elde etti\u011fi istatistikler, cryptojacker\u2019lar\u0131n ana hedefinin Kuzey Amerika oldu\u011funu g\u00f6stermektedir: ABD, kripto madencilik trafi\u011finin %62\u2019sini olu\u015ftururken %2\u2019sini de Kanada olu\u015fturur. Avrupa, Orta Do\u011fru ve Afrika ise %6 ile daha d\u00fc\u015f\u00fck bir oranda kal\u0131r. G\u00fcney Afrika\u2019n\u0131n, madencilik trafi\u011finin yakla\u015f\u0131k %2\u2019sini olu\u015fturarak s\u0131ralamada ilk \u00fc\u00e7te yer almas\u0131 ise olduk\u00e7a ilgin\u00e7tir.<\/p>\n<h2>Cryptojacking\u2019ten korunman\u0131n yollar\u0131<\/h2>\n<p>Cryptojacking\u2019in neden olabilece\u011fi zarar\u0131 asla hafife almay\u0131n. Elbette k\u00f6t\u00fc ama\u00e7l\u0131 madencilik, fidye yaz\u0131l\u0131mlar\u0131na g\u00f6re daha az zararl\u0131d\u0131r. Ancak bu y\u00f6ntemde do\u011frudan kay\u0131plara maruz kal\u0131rs\u0131n\u0131z. Sald\u0131r\u0131n\u0131n kurbanlar\u0131, bilgi i\u015flem g\u00fcc\u00fcn\u00fc ve elektrik faturalar\u0131n\u0131 \u00f6demek zorunda kal\u0131r ve bu faturalar, hat\u0131r\u0131 say\u0131l\u0131r mebla\u011flara ula\u015fabilir.<\/p>\n<p>Ayr\u0131ca \u015firketinizin bilgisayarlar\u0131nda yasa d\u0131\u015f\u0131 bir faaliyetin ger\u00e7ekle\u015ftirilebiliyor olmas\u0131 da iyiye i\u015faret de\u011fildir. Bu, BT altyap\u0131n\u0131zda g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n oldu\u011funu g\u00f6sterir. Bilgisayarlar\u0131n\u0131z \u015fu anda cryptojacking i\u00e7in kullan\u0131l\u0131yor olabilir ancak ileride bu i\u015f daha az k\u00e2r getirmeye ba\u015flad\u0131\u011f\u0131nda bu bilgisayarlar\u0131n\u0131z ba\u015fka ama\u00e7lara hizmet etmeye ba\u015flayacakt\u0131r.<\/p>\n<ul>\n<li>Tercihen cryptojacking\u2019e kar\u015f\u0131 \u00f6zel olarak tasarlanm\u0131\u015f koruma teknolojilerine sahip, <a href=\"https:\/\/go.kaspersky.com\/TR_Trial_Advanced_SOC.html?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_KESB_mh0090_organic&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_mh0090_link_blog_KESB\" target=\"_blank\" rel=\"noopener nofollow\">g\u00fcvenilir g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullan\u0131n<\/a>.<\/li>\n<li>Buna ek olarak g\u00f6m\u00fcl\u00fc cihazlar\u0131n\u0131za (kamuya a\u00e7\u0131k ekranlar, terminaller vb.)\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/enterprise-security\/embedded-systems?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">koruma yaz\u0131l\u0131m\u0131 y\u00fckleyin<\/a> ve m\u00fcmk\u00fcnse Varsay\u0131lan Olarak Reddet modunu etkinle\u015ftirin.<\/li>\n<li>Trafi\u011fi izleyin: Pop\u00fcler <a href=\"https:\/\/www.kaspersky.com\/blog\/mining-easy-explanation\/17768\/\" target=\"_blank\" rel=\"noopener nofollow\">kripto para madencili\u011fi havuzlar\u0131na ait alan adlar\u0131<\/a> i\u00e7in s\u0131kl\u0131kla sorgu yap\u0131lmas\u0131, birilerinin madencilik yapt\u0131\u011f\u0131n\u0131n ve sizi zarara soktu\u011funun a\u00e7\u0131k bir g\u00f6stergesidir. Bu alan adlar\u0131n\u0131, a\u011f\u0131n\u0131zdaki bilgisayarlar\u0131n tamam\u0131nda alan ad\u0131 engelleme listelerine ekleyin, s\u00f6z konusu alan adlar\u0131n\u0131n listelerini internette bulabilirsiniz. Hi\u00e7 durmadan yeni alan adlar\u0131 ortaya \u00e7\u0131kar, bu nedenle listeyi sistematik olarak g\u00fcncelledi\u011finizden emin olun.<\/li>\n<li>Amazon EC2, Microsoft Azure ve di\u011ferleri gibi bulut bilgi i\u015flem platformlar\u0131 i\u00e7in i\u015flemci kullan\u0131m ihtiyac\u0131ndaki anormal art\u0131\u015flar\u0131 derhal ara\u015ft\u0131r\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Cryptojacking, bilgisayar\u0131n\u0131n kripto para madencili\u011fi i\u00e7in bir ba\u015fkas\u0131 taraf\u0131ndan izinsiz olarak kullan\u0131lmas\u0131d\u0131r. <\/p>\n","protected":false},"author":40,"featured_media":5764,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1194,1727],"tags":[1878,1544,1339,1876,1877],"class_list":{"0":"post-5763","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-business","9":"category-smb","10":"tag-cryptojacking","11":"tag-kripto-para","12":"tag-madencilik","13":"tag-rsa-konferansi","14":"tag-rsa2019-rsac"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cryptojacking-rsa2019\/5763\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cryptojacking-rsa2019\/15392\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cryptojacking-rsa2019\/12962\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cryptojacking-rsa2019\/17335\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cryptojacking-rsa2019\/15489\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cryptojacking-rsa2019\/14182\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cryptojacking-rsa2019\/18013\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cryptojacking-rsa2019\/17026\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cryptojacking-rsa2019\/22390\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cryptojacking-rsa2019\/25938\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cryptojacking-rsa2019\/11514\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cryptojacking-rsa2019\/11577\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/cryptojacking-rsa2019\/10467\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cryptojacking-rsa2019\/18733\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cryptojacking-rsa2019\/22765\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cryptojacking-rsa2019\/18079\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cryptojacking-rsa2019\/22267\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cryptojacking-rsa2019\/22203\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/cryptojacking\/","name":"cryptojacking"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5763"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5763\/revisions"}],"predecessor-version":[{"id":6825,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5763\/revisions\/6825"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5764"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}