{"id":6047,"date":"2019-06-17T12:52:16","date_gmt":"2019-06-17T09:52:16","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6047"},"modified":"2020-05-13T18:49:43","modified_gmt":"2020-05-13T15:49:43","slug":"top4-dangerous-attachments-2019","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/top4-dangerous-attachments-2019\/6047\/","title":{"rendered":"En tehlikeli 4 dosya eklentisi"},"content":{"rendered":"<p>\u0130stenmeyen e-posta g\u00f6ndericileri her g\u00fcn milyarlarca mesaj g\u00f6nderir. Bunlar \u00e7o\u011funlukla sinir bozucu fakat zarars\u0131z olan banal reklamlard\u0131r. Fakat arada s\u0131rada bu mesajlardan birine k\u00f6t\u00fc ama\u00e7l\u0131 bir dosya eklenmi\u015f olabilir.<\/p>\n<p>Bunlar genellikle al\u0131c\u0131n\u0131n tehlikeli dosyay\u0131 a\u00e7mas\u0131n\u0131 sa\u011flamak i\u00e7in kendilerini ilgin\u00e7, kullan\u0131\u015fl\u0131 ya da \u00f6nemli bir \u015fey gibi g\u00f6sterirler: Bir i\u015f dosyas\u0131, harika bir teklif, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/christmas-card-malware\/5515\/\" target=\"_blank\" rel=\"noopener\">bilinen bir \u015firketin logosunu ta\u015f\u0131yan bir hediye \u00e7eki<\/a>, vb.<\/p>\n<p>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 yayanlar\u0131n kendilerine \u00f6zg\u00fc g\u00f6zde y\u00f6ntemleri vard\u0131r. Bu yaz\u0131da, <a href=\"https:\/\/labsblog.f-secure.com\/2019\/05\/08\/spam-trends-top-attachments-and-campaigns\/\" target=\"_blank\" rel=\"noopener nofollow\">bu senenin en pop\u00fcler k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m gizleme dosyalar\u0131n\u0131<\/a> inceleyece\u011fiz.<\/p>\n<h2>1. ZIP ve RAR ar\u015fivleri<\/h2>\n<p>Siber su\u00e7lular, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 ar\u015fivlere gizlemeye bay\u0131l\u0131r. \u00d6rne\u011fin, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/gandcrab-ransomware-is-back\/5757\/\" target=\"_blank\" rel=\"noopener\">GandCrab fidye yaz\u0131l\u0131m\u0131n\u0131<\/a> yaymak i\u00e7in Sevgililer G\u00fcn\u00fc arifesinde Seni_Seviyorum0891(numaralar de\u011fi\u015febilir) ba\u015fl\u0131kl\u0131 ZIP dosyalar\u0131 kullan\u0131lm\u0131\u015ft\u0131. Birka\u00e7 hafta sonra, veri \u00e7almada uzmanla\u015fm\u0131\u015f <a href=\"https:\/\/www.theregister.co.uk\/2019\/02\/28\/new_qbot_banking_malware_strain\/\" target=\"_blank\" rel=\"noopener nofollow\">Qbot Truva At\u0131 i\u00e7eren ar\u015fivler yollayan ba\u015fka doland\u0131r\u0131c\u0131lar<\/a> g\u00f6r\u00fcld\u00fc.<\/p>\n<p>Bu sene de ilgin\u00e7 bir WinRAR \u00f6zelli\u011fi ke\u015ffedildi. Bir ar\u015fiv olu\u015ftururken i\u00e7eri\u011fi sistem klas\u00f6r\u00fcne a\u00e7maya y\u00f6nelik kurallar belirlenebildi\u011fi ortaya \u00e7\u0131kt\u0131. Bu yolla i\u00e7erikler, \u00f6zellikle Windows ba\u015flang\u0131\u00e7 klas\u00f6r\u00fcne girerek bir sonraki yeniden ba\u015flatmada \u00e7al\u0131\u015fmaya ba\u015fl\u0131yor. Bu y\u00fczden WinRAR kullan\u0131c\u0131lar\u0131na bu sorunu gidermek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/update-winrar-now\/5826\/\" target=\"_blank\" rel=\"noopener\">derhal g\u00fcncelleme yapmalar\u0131n\u0131 \u00f6neriyoruz<\/a>.<\/p>\n<h3>2. Microsoft Office belgeleri<\/h3>\n<p>Microsoft Office dosyalar\u0131, \u00f6zellikle de Word belgeleri (DOC, DOCX), Excel tablolar\u0131 (XLS, XLSX, XLSM), sunumlar ve taslaklar, siber su\u00e7lular aras\u0131nda olduk\u00e7a pop\u00fcler. Bu dosyalar, dosyan\u0131n i\u00e7inde \u00e7al\u0131\u015fan ufak programlar olan makrolar\u0131 i\u00e7erebilir. Siber su\u00e7lular, <a href=\"http:\/\/www.wikizero.biz\/index.php?q=aHR0cHM6Ly90ci53aWtpcGVkaWEub3JnL3dpa2kvTWFrcm8\" target=\"_blank\" rel=\"noopener nofollow\">makrolar\u0131<\/a> k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m indirmek i\u00e7in komut dosyalar\u0131 olarak kullan\u0131r.<\/p>\n<p>Bu ekler \u00e7o\u011funlukla ofis \u00e7al\u0131\u015fanlar\u0131n\u0131 hedef al\u0131r. Kontrat, fatura, vergi bildirimi ve \u00fcst y\u00f6netimden acil mesajlar g\u00f6r\u00fcn\u00fcm\u00fcne b\u00fcr\u00fcnebilirler. \u00d6rne\u011fin, <a href=\"https:\/\/threats.kaspersky.com\/en\/threat\/Trojan-Spy.Win32.Ursnif\/\" target=\"_blank\" rel=\"noopener nofollow\">Ursnif<\/a> ad\u0131n\u0131 kullanan bir bankac\u0131l\u0131k Truva At\u0131, \u0130talyan kullan\u0131c\u0131lara \u00f6deme bildirimi k\u0131l\u0131\u011f\u0131nda g\u00f6nderilmi\u015fti. Kurban, dosyay\u0131 a\u00e7\u0131p (g\u00fcvenlik sebepleriyle varsay\u0131lan olarak devre d\u0131\u015f\u0131 gelen) makroyu etkinle\u015ftirmeyi onaylad\u0131\u011f\u0131nda bilgisayar\u0131na bir Truva At\u0131 indiriliyordu.<\/p>\n<h3>3. PDF dosyalar\u0131<\/h3>\n<p>Bir\u00e7ok ki\u015fi Microsoft Office belgelerindeki makrolar\u0131n tehlikeleri hakk\u0131nda bilgiye sahip olsa da, PDF dosyalar\u0131ndaki bubi tuzaklar\u0131 daha az biliniyor. Oysa PDF\u2019ler de k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m gizleyebilir. Bu format, <a href=\"https:\/\/helpx.adobe.com\/acrobat\/using\/pdf-properties-metadata.html\" target=\"_blank\" rel=\"noopener nofollow\">JavaScript dosyalar\u0131 olu\u015fturmak ve \u00e7al\u0131\u015ft\u0131rmak<\/a> i\u00e7in kullan\u0131labilir.<\/p>\n<p>Dahas\u0131, siber su\u00e7lular PDF dosyalar\u0131na kimlik av\u0131 ba\u011flant\u0131lar\u0131 saklamaya da bay\u0131l\u0131r. \u00d6rne\u011fin, istenmeyen e-posta harekatlar\u0131ndan birinde doland\u0131r\u0131c\u0131lar, kullan\u0131c\u0131lar\u0131 American Express hesaplar\u0131na girmelerini isteyen \u201cg\u00fcvenli\u201d bir sayfaya gitmeye te\u015fvik etmi\u015fti. Kimlik bilgilerinin hemen doland\u0131r\u0131c\u0131lara iletildi\u011fini s\u00f6ylemeye gerek bile yok.<\/p>\n<h3>4. ISO ve IMG disk g\u00f6r\u00fcnt\u00fcleri<\/h3>\n<p>ISO ve IMG dosyalar\u0131, di\u011fer t\u00fcrden eklere k\u0131yasla daha az s\u0131kl\u0131kta kullan\u0131l\u0131r. \u00d6te yandan son zamanlarda siber su\u00e7lular bu dosyalarla giderek daha fazla ilgilenmeye ba\u015flad\u0131. Bu dosyalar, yani disk g\u00f6r\u00fcnt\u00fcleri, temelde bir CD, DVD ya da ba\u015fka bir diskin sanal birer kopyas\u0131d\u0131r.<\/p>\n<p>Sald\u0131rganlar, disk g\u00f6r\u00fcnt\u00fclerini kimlik \u00e7almakta uzmanla\u015fan Agent Tesla Truva At\u0131 gibi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 kurbanlar\u0131n bilgisayarlar\u0131na g\u00f6ndermek i\u00e7in kullan\u0131r. G\u00f6r\u00fcnt\u00fcn\u00fcn i\u00e7inde, ba\u011fland\u0131\u011f\u0131nda etkinle\u015ferek cihaza casus yaz\u0131l\u0131m\u0131 kuran k\u00f6t\u00fc ama\u00e7l\u0131 bir y\u00fcr\u00fct\u00fclebilir dosya bulunur. Siber su\u00e7lular baz\u0131 vakalarda ilgin\u00e7 bir bi\u00e7imde (hem ISO hem DOC olmak \u00fczere) iki eki birlikte kullanarak i\u015flerini garantiye almaya \u00e7al\u0131\u015fm\u0131\u015flar.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc\">\n<h3>Tehlike potansiyeline sahip eklerle nas\u0131l ba\u015fa \u00e7\u0131k\u0131l\u0131r<\/h3>\n<p>Ekinde bir ar\u015fiv veya DOCX\/PDF dosyas\u0131 bulunan t\u00fcm mesajlar\u0131 istenmeyen e-posta klas\u00f6r\u00fcne g\u00f6ndermek, epey a\u015f\u0131r\u0131ya ka\u00e7mak olurdu. Bunun yerine, doland\u0131r\u0131c\u0131lar\u0131 alt etmek i\u00e7in birka\u00e7 basit kural\u0131 ak\u0131lda tutmak yeterli:<\/p>\n<ul>\n<li>Bilinmeyen adreslerden gelen \u015f\u00fcpheli e-postalar\u0131 a\u00e7may\u0131n. Belirli bir konuda belirli bir mesaj\u0131n ni\u00e7in sizin gelen kutunuza d\u00fc\u015ft\u00fc\u011f\u00fcn\u00fc bilmiyorsan\u0131z b\u00fcy\u00fck olas\u0131l\u0131kla bu e-postaya ihtiyac\u0131n\u0131z yoktur.<\/li>\n<li>Yapt\u0131\u011f\u0131n\u0131z i\u015f, yabanc\u0131larla yaz\u0131\u015fman\u0131z\u0131 gerektiriyorsa g\u00f6nderenin adresini ve ekin ismini dikkatle kontrol edin. Bir \u015feyler tuhaf geliyorsa a\u00e7may\u0131n.<\/li>\n<li>\u00c7al\u0131\u015ft\u0131rman\u0131z gerekti\u011finden emin olmad\u0131\u011f\u0131n\u0131z m\u00fcddet\u00e7e e-postayla gelen belgelerdeki makrolar\u0131n \u00e7al\u0131\u015fmas\u0131na izin vermeyin.<\/li>\n<li>Dosyalar\u0131n i\u00e7inde yer alan t\u00fcm ba\u011flant\u0131lara \u015f\u00fcpheyle yakla\u015f\u0131n. Neden ba\u011flant\u0131y\u0131 takip etmeniz istendi\u011fini anlam\u0131yorsan\u0131z g\u00f6rmezden gelin. Bir ba\u011flant\u0131y\u0131 ger\u00e7ekten takip etmeniz gerekti\u011fini d\u00fc\u015f\u00fcn\u00fcyorsan\u0131z ilgili sitenin adresini taray\u0131c\u0131n\u0131za manuel olarak girin.<\/li>\n<li>Tehlikeli dosyalar hakk\u0131nda uyar\u0131p bunlar\u0131 engellemenin yan\u0131 s\u0131ra \u015f\u00fcpheli bir siteye girmeye \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131zda uyar\u0131 verecek <a href=\"https:\/\/kas.pr\/kdksctr\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> kullan\u0131n.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m gizlemek i\u00e7in en \u00e7ok kulland\u0131\u011f\u0131 dosya t\u00fcrlerini ve bunlardan nas\u0131l korunaca\u011f\u0131n\u0131z\u0131 a\u00e7\u0131kl\u0131yoruz.<\/p>\n","protected":false},"author":2484,"featured_media":6048,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1284],"tags":[19,519,240,1892,1941],"class_list":{"0":"post-6047","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-email","9":"tag-ipuclari-2","10":"tag-spam","11":"tag-winrar","12":"tag-zararli-dosyalar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top4-dangerous-attachments-2019\/6047\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top4-dangerous-attachments-2019\/15842\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/13371\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/17751\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top4-dangerous-attachments-2019\/15896\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/14648\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top4-dangerous-attachments-2019\/18550\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top4-dangerous-attachments-2019\/17381\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top4-dangerous-attachments-2019\/22767\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/27147\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top4-dangerous-attachments-2019\/11814\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top4-dangerous-attachments-2019\/11959\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/top4-dangerous-attachments-2019\/10822\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top4-dangerous-attachments-2019\/19365\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/top4-dangerous-attachments-2019\/12119\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top4-dangerous-attachments-2019\/23355\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top4-dangerous-attachments-2019\/18415\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top4-dangerous-attachments-2019\/22676\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top4-dangerous-attachments-2019\/22626\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/spam\/","name":"spam"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6047"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6047\/revisions"}],"predecessor-version":[{"id":8239,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6047\/revisions\/8239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6048"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}