{"id":6313,"date":"2019-08-09T13:26:44","date_gmt":"2019-08-09T10:26:44","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6313"},"modified":"2019-11-15T14:25:51","modified_gmt":"2019-11-15T11:25:51","slug":"smart-driving-security-test","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/smart-driving-security-test\/6313\/","title":{"rendered":"Levyeyle girmek daha kolay: Arabalara y\u00f6nelik IoT aksesuarlar\u0131n\u0131 hacklemek"},"content":{"rendered":"<p>Ak\u0131ll\u0131 kameralardan seks oyuncaklar\u0131na kadar \u00e7e\u015fitli IoT cihazlar\u0131n\u0131n g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 s\u0131k s\u0131k tart\u0131\u015f\u0131yoruz. Uzmanlar\u0131m\u0131z bu sefer arabalar i\u00e7in \u00fcretilen ak\u0131ll\u0131 cihazlar\u0131n g\u00fcvenli olup olmad\u0131\u011f\u0131n\u0131 ke\u015ffetmeye karar verdi.<\/p>\n<h2>Neler test edildi<\/h2>\n<p>Test i\u00e7in farkl\u0131 i\u015flevlere sahip \u00e7ok say\u0131da cihaz se\u00e7tik: Birka\u00e7 OBD ar\u0131za tespit cihaz\u0131, bir lastik bas\u0131nc\u0131\/\u0131s\u0131s\u0131 izleme sistemi, bir internete ba\u011fl\u0131 GPS takip cihaz\u0131, bir yol kameras\u0131 ve bir ak\u0131ll\u0131 araba alarm\u0131.<\/p>\n<h3>OBD ar\u0131za tespit cihaz\u0131 m\u0131, Bluetooth tespit cihaz\u0131 m\u0131<\/h3>\n<p><strong>Ne inceledik<\/strong>? Araban\u0131n i\u00e7indeki OBD ba\u011flant\u0131s\u0131na tak\u0131ld\u0131ktan sonra h\u0131z, h\u0131zlanma, motor devri gibi verileri Bluetooth arac\u0131l\u0131\u011f\u0131yla ak\u0131ll\u0131 telefona ileten bir cihaz. Veriler, hem s\u00fcr\u00fc\u015f s\u0131ras\u0131nda g\u00f6zlemlenebiliyor hem de sonras\u0131nda ilgili uygulamadaki video kayd\u0131n\u0131n \u00fcst\u00fcne yaz\u0131labiliyor.<br>\n<strong><br>\nNeler ke\u015ffettik<\/strong>? Tespit cihaz\u0131, hem seri numaras\u0131 hem de ba\u011flanmak i\u00e7in gereken \u015fifre olarak MAC adresini kullan\u0131yor. Buradaki sorun, tespit cihaz\u0131n\u0131n MAC adresini Bluetooth arac\u0131l\u0131\u011f\u0131yla birka\u00e7 metre i\u00e7erisindeki t\u00fcm cihazlar taraf\u0131ndan g\u00f6r\u00fclebilecek \u015fekilde yay\u0131nlamas\u0131.<\/p>\n<p>Bu sayede potansiyel sald\u0131rgan yaln\u0131zca bir tarama yap\u0131p MAC adresini okuyarak cihaza ba\u011flanabiliyor.<\/p>\n<p><strong>Buradaki tehdit ne?<\/strong> Neyse ki test edilen tespit cihaz\u0131 yaln\u0131zca arac\u0131n verilerini okuyor; araban\u0131n davran\u0131\u015flar\u0131 \u00fczerinde herhangi bir etkiye sahip de\u011fil. Dolay\u0131s\u0131yla \u00fc\u00e7\u00fcnc\u00fc bir ki\u015fi cihaza ba\u011flanmay\u0131 ba\u015farsa bile s\u00fcr\u00fcc\u00fcye zarar veremiyor; yaln\u0131zca s\u00fcr\u00fc\u015f\u00fcn kayd\u0131n\u0131 ve arac\u0131n verilerini g\u00f6rebiliyor.<\/p>\n<h3>Ba\u015fka bir OBD ar\u0131za tespit cihaz\u0131: Kablolu olmas\u0131 g\u00fcvenli oldu\u011fu anlam\u0131na m\u0131 geliyor?<\/h3>\n<p><strong>Ne inceledik?<\/strong> Arabalarda ar\u0131za tespit etmek i\u00e7in kullan\u0131lan kablolu bir OBD tespit cihaz\u0131.<\/p>\n<p><strong>Neler ke\u015ffettik?<\/strong> Cihaz \u00fcreticisi, \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 g\u00fcvenli hale getirmek i\u00e7in \u00e7ok u\u011fra\u015fm\u0131\u015f. Buna ra\u011fmen, birka\u00e7 farkl\u0131 y\u00f6ntem deneyen Kaspersky uzmanlar\u0131, \u00fcr\u00fcn yaz\u0131l\u0131m\u0131n\u0131 cihaz belle\u011finden ayr\u0131\u015ft\u0131rmay\u0131 ve modifiye etmeyi ba\u015fard\u0131.<\/p>\n<p>Ancak tespit cihaz\u0131n\u0131n belle\u011finin yaln\u0131zca okuma verilerini ve hatalar\u0131 kaydedebilecek b\u00fcy\u00fckl\u00fckle oldu\u011fu ortaya \u00e7\u0131kt\u0131. Bu y\u00fczden cihaz, araban\u0131n elektronik sistemine s\u0131zmak i\u00e7in bir s\u0131\u00e7rama tahtas\u0131 olarak kullan\u0131lam\u0131yor.<\/p>\n<p><strong>Buradaki tehdit ne?<\/strong> Kullan\u0131c\u0131lar\u0131n korkmas\u0131n\u0131 gerektiren bir durum yok. \u00dcretici, cihaza temel g\u00f6revini yerine getirebilmesi i\u00e7in gerekenden fazla \u00f6zellik eklememi\u015f. Dolay\u0131s\u0131yla korsanlar hata kayd\u0131na eri\u015fmek d\u0131\u015f\u0131nda hi\u00e7bir \u015fey yapam\u0131yor.<\/p>\n<h3>Lastik bas\u0131nc\u0131\/\u0131s\u0131s\u0131 izleme sistemi<\/h3>\n<p><strong>Ne inceledik?<\/strong> Ad\u0131ndan anla\u015f\u0131labilece\u011fi \u00fczere, lastik bas\u0131nc\u0131 ve s\u0131cakl\u0131\u011f\u0131 verilerini g\u00f6stermek ve de\u011ferler \u00e7ok y\u00fcksek veya \u00e7ok d\u00fc\u015f\u00fck oldu\u011funda s\u00fcr\u00fcc\u00fcy\u00fc uyarmak i\u00e7in tasarlanm\u0131\u015f bir cihaz. (Her tekerlek i\u00e7in bir tane olmak \u00fczere) d\u00f6rt sens\u00f6r, bir ekran ve bir kontrol biriminden olu\u015fuyor.<\/p>\n<p><strong>Ne bulduk? <\/strong>Sens\u00f6rler radyo arac\u0131l\u0131\u011f\u0131yla kontrol birimine bilgi iletti\u011fi i\u00e7in uzmanlar\u0131m\u0131z yaz\u0131l\u0131m tan\u0131ml\u0131 telsiz kullanarak veriyi yakalay\u0131p de\u011fi\u015ftirmeye karar verdi. Bunun i\u00e7in her bir sens\u00f6r\u00fcn seri numaras\u0131n\u0131n yan\u0131 s\u0131ra g\u00f6nderdi\u011fi sinyalin hangi k\u0131sm\u0131n\u0131n tekerlekteki bas\u0131n\u00e7\/\u0131s\u0131 de\u011fi\u015fikli\u011fini i\u00e7erdi\u011fini bilmek gerekiyordu. Uzmanlar\u0131m\u0131z birka\u00e7 yoklaman\u0131n ard\u0131ndan arad\u0131\u011f\u0131n\u0131 buldu.<\/p>\n<p>Bununla birlikte, sinyali de\u011fi\u015ftirebilmek i\u00e7in sens\u00f6rlerle ileti\u015fimin kesilmemesi gerekiyor: Al\u0131c\u0131 anten s\u00fcrekli kurban\u0131n arabas\u0131na d\u00f6n\u00fck pozisyonda ve kurban\u0131n arabas\u0131yla ayn\u0131 h\u0131zda hareket ediyor olmal\u0131.<\/p>\n<p><strong>Buradaki tehdit ne?<\/strong> Sald\u0131rganlar sens\u00f6r sinyallerini de\u011fi\u015ftirerek olmayan ar\u0131zalara dair uyar\u0131lar g\u00f6sterip s\u00fcr\u00fcc\u00fcy\u00fc durmaya zorlayabilir. Ancak sald\u0131r\u0131n\u0131n ba\u015far\u0131l\u0131 olabilmesi i\u00e7in hedefin yan\u0131nda bulunmal\u0131lar. Dolay\u0131s\u0131yla ortada cihaz sahiplerinin uykular\u0131n\u0131 ka\u00e7\u0131racak bir tehdit g\u00f6r\u00fcnm\u00fcyor.<\/p>\n<h3>S\u00fcper ak\u0131ll\u0131 alarm<\/h3>\n<p><strong>Ne inceledik?<\/strong> Araban\u0131n kap\u0131lar\u0131n\u0131 a\u00e7\u0131p kapatan ve motoru ba\u015flatan bir ak\u0131ll\u0131 g\u00fcvenlik sistemi. Uzaktan kumandal\u0131 anahtarla ya da Android uygulamas\u0131 sayesinde Bluetooth arac\u0131l\u0131\u011f\u0131yla kontrol edilebiliyor.<\/p>\n<p><strong>Ne bulduk?<\/strong> Alarm uzaktan kumandas\u0131, g\u00fcvenlik sistemiyle \u015fifreli bir kanaldan ileti\u015fim kuruyor. Buna ek olarak, geli\u015ftiriciler ak\u0131ll\u0131 telefonla kontrol sa\u011flayan Bluetooth ba\u011flant\u0131s\u0131n\u0131 da g\u00fcvenli hale getirmi\u015f: Cihazlar, alarm\u0131n kurulmas\u0131 s\u0131ras\u0131nda e\u015fleniyor, dolay\u0131s\u0131yla ba\u015fka bir ak\u0131ll\u0131 telefondan ba\u011flant\u0131 kurulam\u0131yor.<\/p>\n<p>G\u00fcvenlik sistemindeki en zay\u0131f halka ise uygulama. Birincisi, oturum a\u00e7arken \u015fifre veya biyometrik veri istemiyor. \u0130lave yetkilendirme olmadan g\u00fcvenlik sistemine komut verebilmesi de m\u00fcmk\u00fcn. Di\u011fer bir deyi\u015fle, ekran kilidi olmayan ak\u0131ll\u0131 telefonunuzu \u00e7alan siber su\u00e7lular, bonus \u00f6d\u00fcl olarak araban\u0131z\u0131 da kazan\u0131yor.<\/p>\n<p>Ak\u0131ll\u0131 alarm kullan\u0131c\u0131lar\u0131n\u0131n kar\u015f\u0131 kar\u015f\u0131ya oldu\u011fu ikinci tehdit ise ak\u0131ll\u0131 telefon vir\u00fcsleri. Ekrandaki parmak hareketlerini sim\u00fcle eden bir Truva At\u0131, arabay\u0131 a\u00e7\u0131p motoru \u00e7al\u0131\u015ft\u0131rmay\u0131 kolayla\u015ft\u0131rabilir. Bir \u015fartla: Araba sahibinin ak\u0131ll\u0131 telefonu bu s\u0131rada arabaya yak\u0131n bir yerde ve alarma Bluetooth ile ba\u011fl\u0131 olmal\u0131.<\/p>\n<p>Buradaki tehdit ne? Uzmanlar\u0131m\u0131z olas\u0131 bir sald\u0131r\u0131 mekanizmas\u0131 olu\u015fturabilmi\u015f olsa da bunun ger\u00e7ek hayatta uygulanabilmesi pek m\u00fcmk\u00fcn g\u00f6r\u00fcnm\u00fcyor. Birincisi, bu mekanizma olduk\u00e7a karma\u015f\u0131k. \u0130kincisi, hedefteki belirli bir ak\u0131ll\u0131 telefona vir\u00fcs bula\u015ft\u0131rmay\u0131 gerektiriyor. \u00dc\u00e7\u00fcnc\u00fcs\u00fc, plan\u0131n ger\u00e7ekle\u015ftirilebilmesi i\u00e7in ara\u00e7 sahibinin ak\u0131ll\u0131 telefonu araban\u0131n yak\u0131n\u0131nda olmal\u0131; bu da sald\u0131r\u0131n\u0131n fark ettirmeden yap\u0131labilmesini zorla\u015ft\u0131r\u0131yor. \u00dcstelik b\u00f6yle bir sald\u0131r\u0131ya kar\u015f\u0131 \u00f6nlem almak da \u00e7ok kolay: Ak\u0131ll\u0131 telefonunuza <a href=\"https:\/\/kas.pr\/kisatr\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">g\u00fcvenilir bir koruma<\/a> kurun ve \u015fifreli ekran kilidi kullanmay\u0131 ihmal etmeyin.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"android-malware\">\n<h3>GPS takip cihaz\u0131<\/h3>\n<p><strong>Ne inceledik? <\/strong>Arac\u0131n hareketine dair verileri ileten, internete ba\u011fl\u0131, standart bir GPS takip cihaz\u0131. Bu t\u00fcr takip cihazlar\u0131, kuryelerin ve paketlerin hareketini izlemek ya da kiralanan ekipmanlar\u0131 takip etmek i\u00e7in kullan\u0131labiliyor.<\/p>\n<p><strong>Ne bulduk?<\/strong> GPS takip cihaz\u0131n\u0131n sunucu taraf\u0131ndaki y\u00f6netici hesab\u0131 hacklendi\u011finde rotalar\u0131, finansal bilgileri, ki\u015fileri, isimleri ve daha pek \u00e7ok \u015feyi i\u00e7eren kullan\u0131c\u0131 veri taban\u0131na eri\u015fim sa\u011flanabiliyor. \u0130ki a\u015famal\u0131 do\u011frulama olmad\u0131\u011f\u0131 i\u00e7in kullan\u0131c\u0131 hesab\u0131n\u0131 hacklemek daha da kolay; bu \u015fekilde hacklenen m\u00fc\u015fterinin verilerine de eri\u015filebiliyor.<\/p>\n<p><strong>Buradaki tehdit ne?<\/strong> GPS takip cihaz\u0131n\u0131n sunucusunu hacklemek, teoride g\u00f6zetleme ve veri hasad\u0131 i\u00e7in kullan\u0131labilir. Bununla birlikte uzmanlar\u0131m\u0131z b\u00f6yle bir sald\u0131r\u0131n\u0131n ger\u00e7ekle\u015fme olas\u0131l\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fck g\u00f6r\u00fcyor.<\/p>\n<h3>G\u00fcl\u00fcmseyin, g\u00fcvenli bir gizli kameradas\u0131n\u0131z!<\/h3>\n<p><strong>Ne inceledik? <\/strong>Ak\u0131ll\u0131 bir yol kameras\u0131. Cihaz, sesli komutlara yan\u0131t verebiliyor; tehlikeli olma olas\u0131l\u0131\u011f\u0131 bulunan durumlar\u0131 ba\u011f\u0131ms\u0131z bi\u00e7imde tespit edip kaydedebiliyor; farkl\u0131 \u0131\u015f\u0131k seviyelerine uyum sa\u011flayabiliyor ve elbette Wi-Fi arac\u0131l\u0131\u011f\u0131yla ak\u0131ll\u0131 telefonla veya tabletle ileti\u015fim kurabiliyor.<\/p>\n<p><strong>Ne bulduk?<\/strong> Teoride siber su\u00e7lular, kameraya bir ak\u0131ll\u0131 telefon ba\u011flayarak \u00e7ok b\u00fcy\u00fck zarara sebep olabilir. Oysa inceledi\u011fimiz \u00f6rnekte sistem g\u00fcvenli\u011fi gayet iyi durumda. \u00d6rne\u011fin, yaln\u0131zca de\u011fi\u015ftirilebilen bir \u015fifreyle korunmakla kalm\u0131yor, ayn\u0131 zamanda kullan\u0131c\u0131ya ilk ba\u011flant\u0131 s\u0131ras\u0131nda varsay\u0131lan \u015fifre yerine kendi \u015fifresini olu\u015fturmas\u0131n\u0131 da \u00f6neriyor. \u00dcstelik farkl\u0131 bir telefona ba\u011flanabilmek i\u00e7in kullan\u0131c\u0131n\u0131n kamera \u00fczerinde yer alan \u00f6zel bir d\u00fc\u011fmeye basmas\u0131 gerekiyor.<\/p>\n<p><strong>Buradaki tehdit ne?<\/strong> Sald\u0131rganlar kameraya fiziksel olarak eri\u015fmeden ne faaliyetlerine m\u00fcdahale edebiliyor ne de kay\u0131tlar\u0131 alabiliyor. Fiziksel eri\u015fim sa\u011flamay\u0131 ba\u015farmalar\u0131 durumunda da kameraya s\u0131zmak yerine kameran\u0131n haf\u0131za kart\u0131n\u0131 \u00e7almak \u00e7ok daha kolay bir se\u00e7enek.<\/p>\n<h2>Sonu\u00e7lar<\/h2>\n<p>Test edilen IoT cihazlar\u0131n\u0131n \u00e7o\u011funun, pratik sald\u0131r\u0131lar a\u00e7\u0131s\u0131ndan yeterli d\u00fczeyde g\u00fcvenli oldu\u011fu kan\u0131tland\u0131. Tabii ki baz\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131 var, fakat bunlar\u0131 ger\u00e7ek ya\u015fam ko\u015fullar\u0131nda k\u00f6t\u00fcye kullan\u0131labilmek olduk\u00e7a g\u00fc\u00e7. \u00dcreticilerin \u00fcr\u00fcn g\u00fcvenli\u011fine daha fazla dikkat etti\u011fi g\u00f6r\u00fcl\u00fcyor; bu da t\u00fcm ak\u0131ll\u0131 cihaz piyasas\u0131n\u0131n gelece\u011fi a\u00e7\u0131s\u0131ndan iyiye i\u015faret.<\/p>\n<p>Otomobil cihazlar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131 ve uzmanlar\u0131m\u0131z\u0131n bulgular\u0131 hakk\u0131nda daha ayr\u0131nt\u0131l\u0131 bilgi edinmek i\u00e7in Securelist raporumuzu inceleyin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uzmanlar\u0131m\u0131z, \u00fcreticilerin m\u00fc\u015fterileri ne kadar korudu\u011funu g\u00f6rmek \u00fczere arabalar i\u00e7in \u00fcretilen alt\u0131 ak\u0131ll\u0131 cihaz\u0131 hacklemeyi denedi.<\/p>\n","protected":false},"author":2484,"featured_media":6314,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1018,970,1945,629,352,1063,1239],"class_list":{"0":"post-6313","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-arac","9":"tag-arabalar","10":"tag-hackleme","11":"tag-iot","12":"tag-kaspersky-lab","13":"tag-nesnelerin-interneti","14":"tag-otomotiv"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/smart-driving-security-test\/6313\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/smart-driving-security-test\/16275\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/smart-driving-security-test\/13781\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/smart-driving-security-test\/6397\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/smart-driving-security-test\/18283\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/smart-driving-security-test\/16359\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/smart-driving-security-test\/15052\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/smart-driving-security-test\/18978\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/smart-driving-security-test\/17710\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/smart-driving-security-test\/23229\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smart-driving-security-test\/27761\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/smart-driving-security-test\/12068\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/smart-driving-security-test\/12178\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/smart-driving-security-test\/11030\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/smart-driving-security-test\/19841\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/smart-driving-security-test\/23863\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/smart-driving-security-test\/18744\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smart-driving-security-test\/23088\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smart-driving-security-test\/23028\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/nesnelerin-interneti\/","name":"nesnelerin interneti"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6313"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6313\/revisions"}],"predecessor-version":[{"id":6747,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6313\/revisions\/6747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6314"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}