{"id":5863,"date":"2019-04-12T14:38:33","date_gmt":"2019-04-12T11:38:33","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5863"},"modified":"2019-11-15T14:30:21","modified_gmt":"2019-11-15T11:30:21","slug":"taj-mahal-apt","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/taj-mahal-apt\/5863\/","title":{"rendered":"Ba\u015fka bir Taj Mahal (Tokyo ve Yokohama aras\u0131nda)"},"content":{"rendered":"<p>2018 sonbahar\u0131nda, bir Orta Asya \u00fclkesine ait diplomatik bir kuruma y\u00f6nelik bir sald\u0131r\u0131 tespit ettik. Bir arac\u0131n kullan\u0131m\u0131 (TajMahal ad\u0131nda yeni bir APT platformu) s\u00f6z konusu olmasayd\u0131 burada s\u00f6z\u00fcn\u00fc edecek bir hikaye de (diplomatlar ve bilgi sistemlerinin, zaman zaman \u00e7e\u015fitli siyasi g\u00fc\u00e7lerin ilgisini \u00e7ekmesi nedeniyle) olmayacakt\u0131.<\/p>\n<p>Yaln\u0131zca bir arka kap\u0131 serisinden daha fazlas\u0131 olan TajMahal, \u00e7ok say\u0131da eklentiye (uzmanlar\u0131m\u0131z bug\u00fcne kadar 80 k\u00f6t\u00fc ama\u00e7l\u0131 mod\u00fcl bulmu\u015ftur) sahip olan ve \u00e7e\u015fitli ara\u00e7lar kullanarak her t\u00fcrl\u00fc sald\u0131r\u0131 senaryosuna olanak sa\u011flayan y\u00fcksek kaliteli, y\u00fcksek teknoloji \u00fcr\u00fcn\u00fc bir casus yaz\u0131l\u0131m altyap\u0131s\u0131d\u0131r. Uzmanlar\u0131m\u0131za g\u00f6re, TajMahal son be\u015f y\u0131ld\u0131r faaliyet g\u00f6stermektedir ve bug\u00fcne kadar yaln\u0131zca bir kurban\u0131n\u0131n do\u011frulanm\u0131\u015f olmas\u0131, hen\u00fcz tan\u0131mlanmam\u0131\u015f kurbanlar\u0131n da oldu\u011funun bir g\u00f6stergesidir.<\/p>\n<h2>TajMahal neler yapabilir?<\/h2>\n<p>APT platformu iki ana par\u00e7adan olu\u015fmaktad\u0131r: Tokyo ve Yokohama. Her ikisi de vir\u00fcs\u00fcn bula\u015ft\u0131\u011f\u0131 bilgisayarlar\u0131n t\u00fcm\u00fcnde saptanm\u0131\u015ft\u0131r. Tokyo, ana arka kap\u0131 olarak hareket eder ve ikinci a\u015fama k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 iletir. \u0130lgin\u00e7 bir \u015fekilde, ikinci a\u015fama ba\u015flad\u0131ktan sonra bile, ek bir ileti\u015fim kanal\u0131 olarak \u00e7al\u0131\u015fmak i\u00e7in sistemde kalmay\u0131 s\u00fcrd\u00fcr\u00fcr. Yokohama ise, ikinci a\u015faman\u0131n silah y\u00fck\u00fcd\u00fcr. Eklentileri, \u00fc\u00e7\u00fcnc\u00fc taraf kitapl\u0131klar\u0131 ve yap\u0131land\u0131rma dosyalar\u0131yla eksiksiz bir sanal dosya sistemi olu\u015fturur. Cephanesi ise ola\u011fan\u00fcst\u00fc d\u00fczeyde kapsaml\u0131d\u0131r:<\/p>\n<ul>\n<li>\u00c7erezleri \u00e7almak,<\/li>\n<li>Yazd\u0131rma kuyru\u011fundaki belgeleri ele ge\u00e7irmek,<\/li>\n<li>Kurban hakk\u0131nda bilgi toplamak (iOS cihazlar\u0131n\u0131n yedekleme kopyalar\u0131n\u0131n bir listesi dahil),<\/li>\n<li>VoIP \u00e7a\u011fr\u0131lar\u0131n\u0131 kaydetmek ve ekran g\u00f6r\u00fcnt\u00fclerini almak,<\/li>\n<li>Kurban taraf\u0131ndan yap\u0131lan optik disk g\u00f6r\u00fcnt\u00fclerini \u00e7almak,<\/li>\n<li>Harici s\u00fcr\u00fcc\u00fclerdeki dosyalar\u0131 da i\u00e7eren bir dizin olu\u015fturmak ve s\u00fcr\u00fcc\u00fc yeniden alg\u0131land\u0131\u011f\u0131nda potansiyel olarak belirli dosyalar\u0131 \u00e7almak.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5865\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/04\/12142732\/The_TajMahal_attackprocess_final.jpg\" alt=\"\" width=\"1600\" height=\"1134\"><\/p>\n<h2>Sonu\u00e7<\/h2>\n<p>TajMahal\u2019in teknik karma\u015f\u0131kl\u0131\u011f\u0131 b\u00fcy\u00fck endi\u015fe yaratmakta ve \u015fu ana kadar tespit edilen ma\u011fdurlar\u0131n say\u0131s\u0131n\u0131n artmas\u0131 beklenmektedir. Bununla birlikte, Kaspersky Lab \u00fcr\u00fcnleri TajMahal\u2019i tespit edebilmektedir. Teknik olarak daha ayr\u0131nt\u0131l\u0131 bir rapora <a href=\"https:\/\/securelist.com\/project-tajmahal\/90240\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a> \u00fczerinden ula\u015fabilirsiniz.<\/p>\n<p>Tehdit, ilk olarak, otomatik sezgisel teknolojilerimizin kullan\u0131lmas\u0131 yoluyla ke\u015ffedilmi\u015ftir. Dolay\u0131s\u0131yla, TajMahal ve analoglar\u0131na kar\u015f\u0131 korunmak i\u00e7in <a href=\"https:\/\/kas.pr\/kdkesbtr\" target=\"_blank\" rel=\"noopener\">Kaspersky Security for Business<\/a> gibi kan\u0131tlanm\u0131\u015f bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fcn\u00fcn kullan\u0131lmas\u0131 mant\u0131kl\u0131d\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Yeni bir APT sald\u0131r\u0131s\u0131 bir Asya \u00fclkesinin diplomatik misyonunu hedef al\u0131yor.<\/p>\n","protected":false},"author":2506,"featured_media":5864,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[1887,493,337,1908,333],"class_list":{"0":"post-5863","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-thesas2019","11":"tag-apt","12":"tag-sas","13":"tag-sas-2019","14":"tag-security-analyst-summit"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/taj-mahal-apt\/5863\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/taj-mahal-apt\/15589\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/taj-mahal-apt\/13135\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/taj-mahal-apt\/6168\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/taj-mahal-apt\/17510\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/taj-mahal-apt\/15660\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/taj-mahal-apt\/14363\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/taj-mahal-apt\/18236\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/taj-mahal-apt\/17162\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/taj-mahal-apt\/22591\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/taj-mahal-apt\/26370\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/taj-mahal-apt\/11625\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/taj-mahal-apt\/11629\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/taj-mahal-apt\/10591\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/taj-mahal-apt\/19010\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/taj-mahal-apt\/23030\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/taj-mahal-apt\/18246\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/taj-mahal-apt\/22442\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/taj-mahal-apt\/22379\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2506"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5863"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5863\/revisions"}],"predecessor-version":[{"id":6806,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5863\/revisions\/6806"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5864"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}