{"id":5942,"date":"2019-05-17T19:43:53","date_gmt":"2019-05-17T16:43:53","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=5942"},"modified":"2020-05-13T18:43:14","modified_gmt":"2020-05-13T15:43:14","slug":"hacked-routers-dns-hijacking","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/hacked-routers-dns-hijacking\/5942\/","title":{"rendered":"S\u0131n\u0131r tan\u0131mayan kimlik avc\u0131lar\u0131: Y\u00f6nlendiricinizi neden g\u00fcncellemelisiniz?"},"content":{"rendered":"<p>Son g\u00fcnlerde siber alanda en s\u0131k kar\u015f\u0131la\u015f\u0131lan tehdit hangisi? Elbette, <a target=\"_blank\" href=\"https:\/\/securelist.com\/spam-and-phishing-in-2018\/89701\/\" rel=\"noopener noreferrer\">kimlik av\u0131<\/a>, bu konuda de\u011fi\u015fen pek bir \u015fey yok. Ancak y\u00f6nlendiricilerin kullan\u0131ld\u0131\u011f\u0131 yeni kimlik av\u0131 sald\u0131r\u0131lar\u0131nda tuza\u011fa d\u00fc\u015fmeniz i\u00e7in sahte e-posta mesajlar\u0131 gerekmiyor. Hatta herkese a\u00e7\u0131k Wi-Fi a\u011flar\u0131n\u0131 kullanmamak ve t\u0131klamadan \u00f6nce ba\u011flant\u0131lar\u0131 incelemek gibi bir s\u00fcr\u00fc <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/phishing-ten-tips\/10550\/\" rel=\"noopener noreferrer nofollow\">standart kural\u0131<\/a> uygulasan\u0131z bile bu t\u00fcr sald\u0131r\u0131lardan zarar g\u00f6rebilirsiniz. Ele ge\u00e7irilen y\u00f6nlendiricilerin kullan\u0131ld\u0131\u011f\u0131 kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131 daha yak\u0131ndan inceleyelim.<\/p>\n<h2>Y\u00f6nlendiriciler nas\u0131l ele ge\u00e7iriliyor?<\/h2>\n<p>Genel olarak bir y\u00f6nlendiriciyi ele ge\u00e7irmenin iki temel yolu vard\u0131r. Bu yakla\u015f\u0131mlardan ilkinde, varsay\u0131lan oturum a\u00e7ma bilgilerinden yararlan\u0131l\u0131yor. Bildi\u011finiz \u00fczere her y\u00f6nlendiricinin bir y\u00f6netici parolas\u0131 vard\u0131r: Bu parola Wi-Fi a\u011f\u0131n\u0131za girmek i\u00e7in kullan\u0131lmaz, y\u00f6nlendiricinizin y\u00f6netici paneline girip ayarlar\u0131 de\u011fi\u015ftirmek i\u00e7in kullan\u0131l\u0131r.<\/p>\n<p>Normalde kullan\u0131c\u0131lar\u0131n parolay\u0131 de\u011fi\u015ftirmesi m\u00fcmk\u00fcn olsa da bir\u00e7ok kullan\u0131c\u0131 bu i\u015flemi yapmaz. Y\u00f6nlendirici \u00fcreticisi taraf\u0131ndan belirlenen parolay\u0131 de\u011fi\u015ftirmedi\u011fimizde, d\u0131\u015far\u0131dan birisi bu parolay\u0131 tahmin edebilir, hatta Google\u2019da arayarak bile bulabilir.<\/p>\n<p>\u0130kinci yakla\u015f\u0131mda ise y\u00f6nlendiricinin \u00fcr\u00fcn yaz\u0131l\u0131m\u0131ndaki bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalan\u0131l\u0131r ki y\u00f6nlendiricilerde bol miktarda g\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulabilirsiniz. Bu y\u00f6ntem sayesinde hacker\u2019lar, parolaya ihtiya\u00e7 duymadan y\u00f6nlendiricinizi kontrol edebilir.<\/p>\n<p>Her iki yakla\u015f\u0131mda da su\u00e7lular, geni\u015f \u00e7apl\u0131 sald\u0131r\u0131lar\u0131n\u0131 uzaktan ve otomatik olarak ger\u00e7ekle\u015ftirebilir. Ele ge\u00e7irilen y\u00f6nlendiriciler, su\u00e7lulara \u00e7e\u015fitli avantajlar sunar. Ancak biz bu yaz\u0131da tespit edilmesi son derece zor olan kimlik av\u0131 sald\u0131r\u0131lar\u0131na odaklanaca\u011f\u0131z.<\/p>\n<h3>Ele ge\u00e7irilen y\u00f6nlendiriciler kimlik av\u0131 i\u00e7in nas\u0131l kullan\u0131l\u0131r?<\/h3>\n<p>Sald\u0131rganlar, y\u00f6nlendiricinizi ele ge\u00e7irdikten sonra ayarlar\u0131n\u0131 de\u011fi\u015ftirir. Bunun i\u00e7in ayarlarda k\u00fc\u00e7\u00fck, fark edilmeyen bir de\u011fi\u015fiklik yeterlidir: Su\u00e7lular, y\u00f6nlendiricinin etki alan\u0131 adlar\u0131n\u0131 \u00e7\u00f6zmek i\u00e7in kulland\u0131\u011f\u0131 DNS sunucular\u0131n\u0131n adreslerini de\u011fi\u015ftirirler. Bu ne anlama gelir ve neden \u00e7ok tehlikelidir?<\/p>\n<p>DNS (Etki Alan\u0131 Ad\u0131 Sistemi), internetin temel dire\u011fidir. Taray\u0131c\u0131 adres \u00e7ubu\u011funa bir web sitesinin adresini girdi\u011finizde, taray\u0131c\u0131n\u0131z bu adresi nas\u0131l bulaca\u011f\u0131n\u0131 tam olarak bilemez. \u00c7\u00fcnk\u00fc taray\u0131c\u0131lar ve Web sunucular\u0131 insanlar\u0131n al\u0131\u015f\u0131k olduklar\u0131 etki alan\u0131 adlar\u0131n\u0131 de\u011fil, say\u0131sal IP adreslerini kullan\u0131r. Di\u011fer bir deyi\u015fle, bir web sitesine girmek istedi\u011finizde \u015funlar ger\u00e7ekle\u015fir:<\/p>\n<ol>\n<li>Taray\u0131c\u0131, DNS sunucusuna bir talep g\u00f6nderir.<\/li>\n<li>DNS sunucusu, web sitesi adresini insanlar\u0131n okuyabildi\u011fi bi\u00e7imden kendi say\u0131sal IP adresine \u00e7evirir ve bu adresi taray\u0131c\u0131ya bildirir.<\/li>\n<li>Bu i\u015flem sonunda taray\u0131c\u0131, web sitesini nerede bulaca\u011f\u0131n\u0131 anlar ve sizin i\u00e7in sayfay\u0131 y\u00fckler.<\/li>\n<\/ol>\n<p>Bunlar\u0131n tamam\u0131 arka planda, son derece h\u0131zl\u0131 bir \u015fekilde ger\u00e7ekle\u015fir. Ancak y\u00f6nlendiriciniz ele ge\u00e7irildi\u011finde ve DNS sunucusu adresleriniz de\u011fi\u015ftirildi\u011finde, t\u00fcm talepleriniz sald\u0131rganlar taraf\u0131ndan kontrol edilen k\u00f6t\u00fc ama\u00e7l\u0131 bir DNS sunucusuna g\u00f6nderilir. Bu k\u00f6t\u00fc ama\u00e7l\u0131 sunucu, ziyaret etmek istedi\u011finiz sitenin IP adresi yerine sahte bir IP adresi iletir. Yani, sald\u0131rganlar sizin yerinize taray\u0131c\u0131n\u0131z\u0131 kand\u0131r\u0131r ve taray\u0131c\u0131n\u0131z\u0131n arad\u0131\u011f\u0131n\u0131z siteyi de\u011fil, bir kimlik av\u0131 sayfas\u0131n\u0131 y\u00fcklemesine neden olur. Bu sald\u0131r\u0131n\u0131n en k\u00f6t\u00fc yan\u0131 ise hem sizin hem de taray\u0131c\u0131n\u0131z\u0131n do\u011fru sayfada oldu\u011funuzu d\u00fc\u015f\u00fcnmenizdir!<\/p>\n<h3>Brezilya operasyonu: Ele ge\u00e7irilen y\u00f6nlendiricilerin kullan\u0131ld\u0131\u011f\u0131 bir kimlik av\u0131 sald\u0131r\u0131s\u0131<\/h3>\n<p>Bu sald\u0131r\u0131 t\u00fcr\u00fcn\u00fcn <a target=\"_blank\" href=\"https:\/\/www.ixiacom.com\/company\/blog\/paypal-netflix-gmail-and-uber-users-among-targets-new-wave-dns-hijacking-attacks\" rel=\"noopener noreferrer nofollow\">en son dalgas\u0131nda<\/a>, sald\u0131rganlar D-Link DSL, DSLink 260E, ARG-W4 ADSL, Secutech ve TOTOLINK y\u00f6nlendiricilerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan faydaland\u0131. Sald\u0131rganlar, cihazlar\u0131 ele ge\u00e7irdiler ve DNS ayarlar\u0131n\u0131 de\u011fi\u015ftirdiler. Ele ge\u00e7irilen y\u00f6nlendiricilerin sahipleri internet bankac\u0131l\u0131\u011f\u0131 hesaplar\u0131na ya da hizmet sa\u011flay\u0131c\u0131lar\u0131n\u0131n web sitelerine ula\u015fmaya \u00e7al\u0131\u015ft\u0131\u011f\u0131nda, sald\u0131rganlar\u0131n kontrol\u00fc alt\u0131ndaki k\u00f6t\u00fc ama\u00e7l\u0131 DNS sunucusu, kullan\u0131c\u0131lar\u0131 kimlik bilgilerini \u00e7almak i\u00e7in tasarlanan kimlik av\u0131 sayfalar\u0131na y\u00f6nlendirdi.<\/p>\n<p>Bu sald\u0131r\u0131 s\u0131ras\u0131nda k\u00f6t\u00fc ama\u00e7l\u0131 sald\u0131rganlar\u0131n temel hedefi Brezilyal\u0131 internet kullan\u0131c\u0131lar\u0131yd\u0131. Brezilyal\u0131 finans kurulu\u015flar\u0131n\u0131n, bankalar\u0131n\u0131n, web bar\u0131nd\u0131rma hizmetlerinin ve Brezilya\u2019da bulunan bulut bili\u015fim sa\u011flay\u0131c\u0131lar\u0131n\u0131n ger\u00e7ek sitelerini taklit ederek sahte siteler olu\u015fturdular.<\/p>\n<p>Sald\u0131rganlar\u0131n bir di\u011fer hedefi de PayPal, Netflix, Uber ve Gmail gibi b\u00fcy\u00fck internet hizmetlerinin kullan\u0131c\u0131lar\u0131yd\u0131.<\/p>\n<h3>Y\u00f6nlendiricilerin kullan\u0131ld\u0131\u011f\u0131 sald\u0131r\u0131lara kar\u015f\u0131 kendinizi nas\u0131l koruyabilirsiniz?<\/h3>\n<p>Yukar\u0131da belirtti\u011fimiz gibi bu t\u00fcr kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131 tespit etmek olduk\u00e7a zordur. Ancak durum, tamamen umutsuz de\u011fil. Sizin i\u00e7in birka\u00e7 ipucumuz var:<\/p>\n<ul>\n<li>Y\u00f6nlendiricinin Web aray\u00fcz\u00fcnde oturum a\u00e7\u0131n, varsay\u0131lan parolalar\u0131 de\u011fi\u015ftirin ve uzaktan y\u00f6netim gibi <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/secure-home-wifi\/13371\/?utm_medium=ipm&amp;utm_source=secnews&amp;utm_campaign=universal\" rel=\"noopener noreferrer nofollow\">tehlikeli ayarlar\u0131<\/a> devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/li>\n<li>Y\u00f6nlendiricinizin \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131n g\u00fcncel olmas\u0131na dikkat edin: G\u00fcncellemeler genellikle g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 giderir. Baz\u0131 modellerde g\u00fcncellemeler, otomatik olarak sunulsa da baz\u0131 modellerde manuel olarak y\u00fcklenmeleri gerekir. Y\u00f6nlendiricinizin nas\u0131l g\u00fcncellendi\u011fini g\u00f6rmek i\u00e7in internetten y\u00f6nlendirici modelinizle ilgili bilgileri kontrol edin.<\/li>\n<li>Bildi\u011finiz bir web sitesine girerken bile s\u0131ra d\u0131\u015f\u0131 ayr\u0131nt\u0131lara ve beklenmedik pop-up\u2019lara dikkat edin. Sitenin farkl\u0131 alanlar\u0131na t\u0131klamaya \u00e7al\u0131\u015f\u0131n; kimlik av\u0131 sayfas\u0131 olduk\u00e7a profesyonel bir \u015fekilde tasarlanm\u0131\u015f olsa bile sald\u0131rganlar\u0131n bir sitenin tamam\u0131n\u0131 m\u00fckemmel bir \u015fekilde yeniden olu\u015fturmas\u0131 neredeyse imkans\u0131zd\u0131r.<\/li>\n<li>Oturum a\u00e7ma bilgilerinizi (veya di\u011fer hassas verilerinizi) girmeden \u00f6nce ba\u011flant\u0131lar\u0131n g\u00fcvenli\u011fi oldu\u011fundan emin olun (do\u011frulamak i\u00e7in URL\u2019nin ba\u015f\u0131nda \u201chttps:\/\/\u201d olup olmad\u0131\u011f\u0131n\u0131 kontrol edin) ve daima sertifikadaki ad\u0131n kurulu\u015fun ad\u0131yla e\u015fle\u015fti\u011finden emin olun. Bunun i\u00e7in taray\u0131c\u0131n\u0131z\u0131n adres \u00e7ubu\u011fundaki kilit simgesine t\u0131klay\u0131n:\n<ul>\n<li>Internet Explorer veya Edge taray\u0131c\u0131larda an\u0131nda sertifika ayr\u0131nt\u0131lar\u0131n\u0131 g\u00f6rebilirsiniz.<\/li>\n<li>Mozilla\u2019da kilit simgesinden sonra <em><em>Ba\u011flant\u0131<\/em><\/em> \u00f6\u011fesine t\u0131klay\u0131n.<\/li>\n<li>Chrome\u2019da ise \u00f6nce kilit simgesine, ard\u0131ndan <em><em>Sertifika<\/em><\/em> \u00f6\u011fesine t\u0131klay\u0131p <em>Genel<\/em> \u00f6\u011fesinin alt\u0131nda <em>Verilen<\/em> sat\u0131r\u0131n\u0131 kontrol edin.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular, internet bankac\u0131l\u0131\u011f\u0131 ve \u00e7evrimi\u00e7i hizmetlerde kullan\u0131lan oturum a\u00e7ma bilgilerini \u00e7almak i\u00e7in y\u00f6nlendiricileri ele ge\u00e7iriyor.<\/p>\n","protected":false},"author":2508,"featured_media":5961,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[1214,1930,1074,1525,174,1929],"class_list":{"0":"post-5942","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-cevrimici-bankacilik","10":"tag-dns-ele-gecirme","11":"tag-kimlik-avi","12":"tag-parolalar","13":"tag-wi-fi","14":"tag-yonlendiriciler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hacked-routers-dns-hijacking\/5942\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacked-routers-dns-hijacking\/15685\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hacked-routers-dns-hijacking\/13221\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hacked-routers-dns-hijacking\/17599\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hacked-routers-dns-hijacking\/15745\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hacked-routers-dns-hijacking\/14424\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hacked-routers-dns-hijacking\/18340\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hacked-routers-dns-hijacking\/17220\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hacked-routers-dns-hijacking\/22671\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hacked-routers-dns-hijacking\/26802\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hacked-routers-dns-hijacking\/12082\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hacked-routers-dns-hijacking\/11758\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/hacked-routers-dns-hijacking\/10657\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hacked-routers-dns-hijacking\/19078\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/hacked-routers-dns-hijacking\/23100\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hacked-routers-dns-hijacking\/18323\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hacked-routers-dns-hijacking\/22526\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hacked-routers-dns-hijacking\/22463\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2508"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=5942"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5942\/revisions"}],"predecessor-version":[{"id":8232,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/5942\/revisions\/8232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/5961"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=5942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=5942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=5942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}