{"id":5892,"date":"2019-04-25T13:22:52","date_gmt":"2019-04-25T10:22:52","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5892"},"modified":"2019-11-15T14:29:51","modified_gmt":"2019-11-15T11:29:51","slug":"weaponized-usb-devices","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/weaponized-usb-devices\/5892\/","title":{"rendered":"Sald\u0131r\u0131 vekt\u00f6r\u00fc olarak silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f USB cihazlar\u0131"},"content":{"rendered":"<p>Bentley Systems\u2019tan Luca Bongiorni #TheSAS1019\u2019daki konu\u015fmas\u0131nda USB cihazlar\u0131n\u0131n, end\u00fcstriyel kontrol systemleri i\u00e7in k\u00f6t\u00fc niyetli yaz\u0131l\u0131mlar\u0131n ana kayna\u011f\u0131 oldu\u011funu s\u00f6yledi. Herhangi bir \u015fekilde g\u00fcvenlikle u\u011fra\u015fan \u00e7o\u011fu insan, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/dangerous-usb\/2323\/\" target=\"_blank\" rel=\"noopener\">flash belleklerin otoparklarda \u201cyanl\u0131\u015fl\u0131kla\u201d yere d\u00fc\u015f\u00fcr\u00fcld\u00fc\u011f\u00fcyle ilgili<\/a> klasik hik\u00e2yeleri duymu\u015ftur \u2013 bu tekrar tekrar anlat\u0131lmayacak kadar a\u00e7\u0131klay\u0131c\u0131 olan bilindik bir g\u00fcvenlik hik\u00e2yesidir.<\/p>\n<p>USB flash belleklerle ilgili di\u011fer bir \u2013 ger\u00e7ek \u2013 hik\u00e2yede end\u00fcstriyel bir tesiste \u00e7al\u0131\u015fan ve La La Land\u2019i izlemek i\u00e7in \u00f6\u011fle aras\u0131nda filmi flash belle\u011fe indiren bir personelden bahsedilir. N\u00fckleer bir santraldeki hava bo\u015fluklu (air-gapped) bir sisteme nas\u0131l vir\u00fcs bula\u015ft\u0131\u011f\u0131n\u0131n hik\u00e2yesi i\u015fte b\u00f6yle ba\u015flar \u2013 <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/another-cyberattack-spotted-targeting-mideast-critical-infrastructure-organizations\/d\/d-id\/1330679\" target=\"_blank\" rel=\"noopener nofollow\">bu kesinlikle \u00f6nlenebilir olan kritik altyap\u0131 vir\u00fcs\u00fcne dair \u00e7ok bilindik bir hik\u00e2yedir<\/a>.<\/p>\n<p>Ancak insanlar USB cihazlar\u0131n\u0131n flash belleklerle s\u0131n\u0131rl\u0131 olmad\u0131\u011f\u0131n\u0131 unutmaya e\u011filimliler. \u0130nsan aray\u00fcz cihazlar\u0131ndan (HID\u2019ler) klavye ve fare, ak\u0131ll\u0131 telefonlar i\u00e7in \u015farj kablolar\u0131, hatta plazma k\u00fcreleri ve termal muglar gibi \u015feyler bile end\u00fcstriyel kontrol sistemlerini hedef almak i\u00e7in kurcalanabilir.<\/p>\n<h2>USB silahlar\u0131n\u0131n k\u0131sa bir ge\u00e7mi\u015fi<\/h2>\n<p>\u0130nsanlar\u0131n unutkanl\u0131\u011f\u0131na ra\u011fmen, silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f USB cihazlar\u0131 yeni bir haber de\u011fil. Bu t\u00fcrden ilk cihazlar\u0131n yaz\u0131l\u0131m\u0131 2010\u2019da yap\u0131ld\u0131. Teensy ad\u0131nda programlanabilir k\u00fc\u00e7\u00fck bir karta dayal\u0131 ve USB-konekt\u00f6rleriyle donanm\u0131\u015f bu cihazlar, HID\u2019ler gibi davranabiliyor, \u00f6rne\u011fin, bir bilgisayara tu\u015f vuru\u015flar\u0131 g\u00f6nderebiliyorlard\u0131. Hacker\u2019lar, cihazlar\u0131n s\u0131zma testi i\u00e7in kullan\u0131labilece\u011fini hemen fark ettiler ve yeni kullan\u0131c\u0131lar olu\u015fturmak, arka kap\u0131lar\u0131 ekleyen programlar \u00e7al\u0131\u015ft\u0131rmak ve kopyalama veya belirli bir internet sitesinden indirme yoluyla k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar eklemek i\u00e7in programlanm\u0131\u015f bir s\u00fcr\u00fcm geli\u015ftirdiler.<\/p>\n<p>Bu Teensy modifikasyonunun ilk s\u00fcr\u00fcm\u00fcne <a href=\"http:\/\/www.irongeek.com\/i.php?page=security\/programmable-hid-usb-keystroke-dongle\" target=\"_blank\" rel=\"noopener nofollow\">PHUKD<\/a> denildi. Onu daha yayg\u0131n Arduino kartlar\u0131yla uyumlu olan <a href=\"https:\/\/github.com\/samratashok\/Kautilya\" target=\"_blank\" rel=\"noopener nofollow\">Kautilya<\/a> takip etti. Ard\u0131ndan Rubberducky geldi \u2013 Mr. Robot sayesinde muhtemelen en \u00e7ok bilinen tu\u015f vuru\u015fu em\u00fclasyon USB arac\u0131d\u0131r ve s\u0131radan bir USB flash s\u00fcr\u00fcc\u00fc gibi g\u00f6r\u00fcnmektedir. Bash Bunny ad\u0131ndaki daha g\u00fc\u00e7l\u00fc bir cihaz <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/dark-vishnya-attack\/5483\/\" target=\"_blank\" rel=\"noopener\">ATM\u2019lere yap\u0131lan sald\u0131r\u0131larda kullan\u0131ld\u0131.<\/a><\/p>\n<p>PHUKD\u2019yi geli\u015ftiren ki\u015fi hemen yeni bir fikir buldu ve i\u00e7inde bir s\u0131zma testi kart\u0131 olan Truva At\u0131\u2019na d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f bir fare yaratt\u0131, b\u00f6ylece normal bir fare gibi \u00e7al\u0131\u015fmaya ek olarak, PHUKD\u2019nin yapabilece\u011fi her \u015feyi yapabilmektedir. Toplum m\u00fchendisli\u011fi a\u00e7\u0131s\u0131ndan bak\u0131ld\u0131\u011f\u0131nda, sistemlere s\u0131zmak i\u00e7in ger\u00e7ek HID\u2019leri kullanmak ayn\u0131 ama\u00e7 i\u00e7in USB bellekleri kullanmaktan daha kolay olabilir \u00e7\u00fcnk\u00fc yabanc\u0131 bir USB flash s\u00fcr\u00fcc\u00fcy\u00fc bilgisayarlar\u0131na takmamalar\u0131 gerekti\u011fini bilen ki\u015filer bile genellikle klavyeler ve fareler i\u00e7in endi\u015felenmezler.<\/p>\n<p>Silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f USB cihazlar\u0131n\u0131n ikinci nesli 2014-2015 aras\u0131nda yarat\u0131ld\u0131 ve k\u00f6t\u00fc \u015f\u00f6hretli <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/badusb-solved\/2249\/\" target=\"_blank\" rel=\"noopener\">BadUSB tabanl\u0131 cihazlar\u0131<\/a> da i\u00e7eriyordu. ABD Ulusal G\u00fcvenlik Ajans\u0131 (NSA) taraf\u0131ndan geli\u015ftirildi\u011fi iddia edilen TURNIPSCHOOL ve Cottonmouth da bahsetmeye de\u011fer: USB kablosuna s\u0131\u011fabilecek kadar k\u00fc\u00e7\u00fck cihazlard\u0131 ve (hi\u00e7bir a\u011fa ba\u011fl\u0131 olmayan bilgisayarlar da dahil olmak \u00fczere) bilgisayarlardan veri filtrelemek i\u00e7in kullan\u0131l\u0131yorlard\u0131. Sadece basit bir kablo \u2013 kimsenin endi\u015felendi\u011fi bir \u015fey de\u011fildir, \u00f6yle de\u011fil mi?<\/p>\n<h3>Silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f USB\u2019lerin modern h\u00e2li<\/h3>\n<p>USB s\u0131zma testi ara\u00e7lar\u0131n\u0131n \u00fc\u00e7\u00fcnc\u00fc nesli bu cihazlar\u0131 tamamen yeni bir seviyeye getiriyor. Bu ara\u00e7lardan biri, temelde Wi-Fi ba\u011flant\u0131l\u0131 Rubberducky olan WHID Enjekt\u00f6r\u00fc\u2019d\u00fcr. Wi-Fi\u2019yi oldu\u011fu i\u00e7in t\u00fcm yapmas\u0131 gerekenleri en ba\u015ftan programlamaya gerek yoktur; bir hacker arac\u0131 uzaktan kontrol edebilir, bu da daha fazla esneklik ve ayr\u0131ca farkl\u0131 i\u015fletim sistemleriyle \u00e7al\u0131\u015fabilme yetene\u011fi sa\u011flar. Di\u011fer bir \u00fc\u00e7\u00fcnc\u00fc nesil ara\u00e7 Raspberry Pi\u2019ye dayal\u0131 P4wnP1\u2019dir ve kablosuz ba\u011flant\u0131 gibi baz\u0131 ek i\u015flevselliklere sahip olmakla beraber Bash Bunny\u2019ye benzer.<\/p>\n<p>Ve elbette, hem WHID Enjekt\u00f6r\u00fc hem de Bash Banny bir klavyenin veya farenin i\u00e7ine yerle\u015ftirilebilecek kadar k\u00fc\u00e7\u00fcklerdir. Bu videoda USB, Ethernet veya Wi-Fi ile herhangi bir a\u011fa ba\u011fl\u0131 olmayan ama uzaktaki bir sald\u0131rgan\u0131n komutlar\u0131 yerine getirmesini ve uygulamalar\u0131 \u00e7al\u0131\u015ft\u0131rmas\u0131n\u0131 sa\u011flayan Truva At\u0131\u2019na d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f bir klavyenin ba\u011fland\u0131\u011f\u0131 bir diz\u00fcst\u00fc bilgisayar\u0131 g\u00f6steriliyor.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"zxx\" dir=\"ltr\"><a href=\"https:\/\/t.co\/C13mP8aBsL\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/C13mP8aBsL<\/a><\/p>\n<p>\u2014 Luca Bongiorni (@CyberAntani) <a href=\"https:\/\/twitter.com\/CyberAntani\/status\/963693468282445824?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 14, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Yukar\u0131da bahsedilen iki tanesi gibi k\u00fc\u00e7\u00fck USB ayg\u0131tlar\u0131, belirli bir HID modeline benzeyecek \u015fekilde bile programlanabilir ve bu da fareleri ve klavyeleri yaln\u0131zca belirli sat\u0131c\u0131lardan alan \u015firketlerin g\u00fcvenlik politikalar\u0131n\u0131 atlamalar\u0131na izen verir. WHID Enjekt\u00f6r\u00fc gibi ara\u00e7lar ayn\u0131 zamanda ses denetimini kurmak ve tesisteki insanlar\u0131 gizlice dinlemek i\u00e7in mikrofonla donat\u0131labilirler. Daha da k\u00f6t\u00fcs\u00fc, b\u00f6yle bir ara\u00e7 e\u011fer a\u011f d\u00fczg\u00fcn bir \u015fekilde b\u00f6l\u00fcmlere ayr\u0131lmam\u0131\u015fsa t\u00fcm a\u011f\u0131 riske atmaya yeter.<\/p>\n<h3>Silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f USB cihazlar\u0131ndan korunma yollar\u0131<\/h3>\n<p>Truva At\u0131\u2019na d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f fare ve klavyelerin yan\u0131 s\u0131ra g\u00f6zetim kablolar\u0131 veya k\u00f6t\u00fc ama\u00e7l\u0131 kablolar hava bo\u015fluklu (air-gapped) sistemleri bile riske atmak i\u00e7in kullan\u0131labilen ciddi tehditlerdir. Bu g\u00fcnlerde b\u00f6yle sald\u0131r\u0131lar i\u00e7in gerekli ara\u00e7lar ucuz bir \u015fekilde sat\u0131n al\u0131nabilmekte ve neredeyse hi\u00e7bir programlama becerisi olmadan programlanabilmektedir, bu nedenle bu t\u00fcr tehditler radar\u0131n\u0131zda olmal\u0131d\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n<p>Krtitik altyap\u0131y\u0131 bu t\u00fcr tehditlere kar\u015f\u0131 korumak i\u00e7in \u00e7ok katmanl\u0131 bir yakla\u015f\u0131m\u0131 benimseyin.<\/p>\n<ul>\n<li>\u00d6ncelikle fiziksel g\u00fcvenli\u011fi sa\u011flay\u0131n ki yetkisi olmayan personeller rastgele USB cihazlar\u0131n\u0131 end\u00fcstriyel kontrol sistemlerine ba\u011flayamas\u0131n. Ayr\u0131ca, bu t\u00fcr sistemlerdeki kullan\u0131lmayan<\/li>\n<li>USB ba\u011flant\u0131 noktalar\u0131n\u0131 fiziksel olarak t\u0131kay\u0131n ve \u00f6nceden tak\u0131lm\u0131\u015f olan HID\u2019lerin kald\u0131r\u0131lmas\u0131n\u0131 \u00f6nleyin.(La La Land olay\u0131nda oldu\u011fu gibi) Silaha d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f USB cihazlar\u0131 da dahil olmak \u00fczere farkl\u0131 t\u00fcrden tehditlerin fark\u0131nda olmalar\u0131 i\u00e7in \u00e7al\u0131\u015fanlar\u0131 e\u011fitin.<\/li>\n<li>A\u011f\u0131 d\u00fczg\u00fcn bir \u015fekilde b\u00f6l\u00fcmlere ay\u0131r\u0131n ve sald\u0131rganlar\u0131n kritik altyap\u0131y\u0131 kontrol etmek i\u00e7in kullan\u0131lan sistemlere ula\u015fmalar\u0131n\u0131 engellemek i\u00e7in eri\u015fim haklar\u0131n\u0131 kontrol edin.<\/li>\n<li>Tesisteki t\u00fcm sistemleri her t\u00fcrden tehditi alg\u0131layabilecek g\u00fcvenlik \u00e7\u00f6z\u00fcmleriyle koruyun. <a href=\"https:\/\/kas.pr\/kdkesbtr\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security<\/a>\u2018nin teknolojisi, kullan\u0131c\u0131 halihaz\u0131rda yetki verilmi\u015f bir HID kullanarak bir kod girmedik\u00e7e hi\u00e7bir HID\u2019ye yetki vermez.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Truva At\u0131&#8217;na d\u00f6n\u00fc\u015ft\u00fcr\u00fclm\u00fc\u015f HID cihazlar\u0131n\u0131n yan\u0131 s\u0131ra g\u00f6zetim kablolar\u0131 veya k\u00f6t\u00fc ama\u00e7l\u0131 kablolar hava bo\u015fluklu (air-gapped) sistemleri bile riske atmak i\u00e7in kullan\u0131labilen ciddi tehditlerdir.<\/p>\n","protected":false},"author":675,"featured_media":5893,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1887,754,337,1908,333,421],"class_list":{"0":"post-5892","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-thesas2019","10":"tag-donanim","11":"tag-sas","12":"tag-sas-2019","13":"tag-security-analyst-summit","14":"tag-usb"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/weaponized-usb-devices\/5892\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/weaponized-usb-devices\/15626\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/weaponized-usb-devices\/13169\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/weaponized-usb-devices\/17545\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/weaponized-usb-devices\/15693\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/weaponized-usb-devices\/14409\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/weaponized-usb-devices\/18295\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/weaponized-usb-devices\/17210\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/weaponized-usb-devices\/22648\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/weaponized-usb-devices\/26495\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/weaponized-usb-devices\/11645\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/weaponized-usb-devices\/11692\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/weaponized-usb-devices\/10617\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/weaponized-usb-devices\/19067\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/weaponized-usb-devices\/23093\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/weaponized-usb-devices\/18303\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/weaponized-usb-devices\/22475\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/weaponized-usb-devices\/22411\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5892","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5892"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5892\/revisions"}],"predecessor-version":[{"id":6800,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5892\/revisions\/6800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5893"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5892"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5892"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5892"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}