{"id":6378,"date":"2019-09-03T10:30:43","date_gmt":"2019-09-03T07:30:43","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=6378"},"modified":"2019-11-15T14:24:53","modified_gmt":"2019-11-15T11:24:53","slug":"email-account-stealing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/email-account-stealing\/6378\/","title":{"rendered":"Kimlik avc\u0131lar\u0131 e-posta hesaplar\u0131n\u0131 nas\u0131l \u00e7alar"},"content":{"rendered":"<p>Eski us\u00fcl e-posta, dijital d\u00fcnyadaki en ilgi \u00e7ekici teklif de\u011fil ama bir s\u00fcr\u00fc yeni uygulama ve hizmetin aras\u0131nda \u2013 anl\u0131k mesajla\u015fma uygulamalar\u0131, sosyal a\u011flar- modern hayat\u0131n temel bir gereci olarak ge\u00e7erlili\u011fini korumaktad\u0131r. Bir\u00e7o\u011fumuz bu tarz hizmetler, uygulamalar, ve sosyal a\u011flarda en az\u0131ndan yeni \u00fcyelik olu\u015fturmak i\u00e7in hala e-posta kullanmak zorunday\u0131z.<\/p>\n<p>Sald\u0131rganlar\u0131n e-posta hesaplar\u0131na g\u00f6z dikmelerinin nedeni tamamen bu gereksinimden kaynaklan\u0131yor. Bu yaz\u0131da baz\u0131 h\u0131rs\u0131zlar\u0131n \u015fifreleri nas\u0131l ele ge\u00e7irdiklerini a\u00e7\u0131klayaca\u011f\u0131z.<\/p>\n<h2>Kimlik av\u0131 iletileri \u2014 en yayg\u0131n e-posta ele ge\u00e7irme y\u00f6ntemleri<\/h2>\n<p>E-posta kullan\u0131c\u0131 ad\u0131 ve \u015fifrelerini \u00e7almak i\u00e7in tasarlanm\u0131\u015f sahte iletilerin b\u00fcy\u00fck bir \u00e7o\u011funlu\u011fu e-posta kulland\u0131\u011f\u0131m\u0131z hizmetlerden gelen mesajlara benzer. Hedef ev kullan\u0131c\u0131lar\u0131 oldu\u011funda, kimlik avc\u0131lar\u0131 pop\u00fcler web posta hizmetlerini taklit ederler. Kurumsal hesaplar\u0131 ele ge\u00e7irmeye \u00e7al\u0131\u015f\u0131rken ise, sizin ticari e-posta hizmetinizmi\u015f gibi davran\u0131rlar \u2013 bu durumda g\u00f6nderici asl\u0131nda posta sunucusudur.<\/p>\n<p>Pop\u00fcler posta hizmetleri \u00e7ok daha s\u0131k taklit edilir. Doland\u0131r\u0131c\u0131lar bu postalar\u0131 olabildi\u011fince inand\u0131r\u0131c\u0131 yapmaya \u00e7al\u0131\u015f\u0131rlar. Doland\u0131r\u0131c\u0131l\u0131k ekipman\u0131 klasiktir: ger\u00e7e\u011fine fazlas\u0131yla benzer bir g\u00f6nderici adresi, logolar, ba\u015fl\u0131klar ve altba\u015fl\u0131klar, resmi kaynaklara ba\u011flant\u0131lar, inand\u0131r\u0131c\u0131 bir tasar\u0131m, vb.<\/p>\n<div id=\"attachment_6380\" style=\"width: 677px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6380\" class=\"wp-image-6380 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02140929\/email-account-stealing-scr-1-EN.png\" alt=\"\" width=\"667\" height=\"838\"><p id=\"caption-attachment-6380\" class=\"wp-caption-text\">Kullan\u0131c\u0131y\u0131 hesab\u0131n\u0131n silinmesi ile tehdit eden kimlik av\u0131 iletisi<\/p><\/div>\n<p>Kurumsal hesaplar i\u00e7in ise, doland\u0131r\u0131c\u0131lar genelliklere payla\u015f\u0131lan adreslere (y\u00f6neticiler taraf\u0131ndan kullan\u0131lanlar da dahil) \u015firket sunucusu ya da kamusal e-posta hizmetlerinden gelen mesajlar gibi de\u011fi\u015ftirilmi\u015f sahte iletiler g\u00f6nderirler, ama b\u00f6yle iletiler bazen de adresleri bir \u015fekilde istenmeyen e-posta veritabanlar\u0131na d\u00fc\u015fm\u00fc\u015f \u00e7al\u0131\u015fanlar\u0131n bireysel posta kutular\u0131na ula\u015f\u0131r.<\/p>\n<p>Ciddiye al\u0131nmak isteyen \u015firketler, \u00f6zellikle de b\u00fcy\u00fck olanlar, kendilerine ait e-posta sunucular\u0131 bulundururlar. B\u00f6yle hesaplar\u0131n giri\u015fleri ve \u015fifreleri su\u00e7lular\u0131n ilgisini \u00e7eker. Bu mesajlar\u0131 genellikle \u00e7ok da m\u00fckemmel olmayan g\u00f6r\u00fcnt\u00fcleri ele verir \u2013 \u00fccretsiz web posta hizmetlerine ait g\u00f6nderici adresleri, yaz\u0131m hatalar\u0131, vb. \u2013 ama b\u00f6yle iletiler dahi tecr\u00fcbesiz \u00e7al\u0131\u015fanlar taraf\u0131ndan ger\u00e7ek zannedilebilir.<\/p>\n<div id=\"attachment_6381\" style=\"width: 1249px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6381\" class=\"wp-image-6381 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02141018\/email-account-stealing-scr-2-EN.png\" alt=\"\" width=\"1239\" height=\"741\"><p id=\"caption-attachment-6381\" class=\"wp-caption-text\">Bu iletide kimlik avc\u0131lar\u0131 sahte bir kota a\u015f\u0131m\u0131 uyar\u0131s\u0131 g\u00f6ndermi\u015ftir<\/p><\/div>\n<p>Belirli bir kuruma y\u00f6nelik sald\u0131r\u0131larda, doland\u0131r\u0131c\u0131lar genellikle iletilerini olabildi\u011fince inand\u0131r\u0131c\u0131 olmas\u0131 i\u00e7in kurum hakk\u0131nda toplayabildikleri kadar bilgi toplarlar. G\u00fcvenilirlik ve \u00f6zg\u00fcnl\u00fck sa\u011flamak i\u00e7in, kurbanlar\u0131n e-posta adreslerini kimlik av\u0131 hiper ba\u011flant\u0131s\u0131n\u0131n i\u00e7ine yerle\u015ftirebilirler, b\u00f6ylelikle sahte sayfa ziyaret edildi\u011finde adres halihaz\u0131rda mevcut olur, geriye sadece posta kutusu \u015fifresinin girilmesi kal\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"gandalf30\">\n<h3>Kimlik av\u0131 iletilerinin t\u00fcrleri<\/h3>\n<h4>Bilgi talep eden d\u00fcz bir metin<\/h4>\n<p>Doland\u0131r\u0131c\u0131lar, kullan\u0131c\u0131larla posta hizmet sa\u011flay\u0131c\u0131s\u0131 ad\u0131na \u00e7e\u015fitli bahanelerle temas kurar ve kullan\u0131c\u0131lardan e-posta adreslerini, \u015fifrelerini, ve di\u011fer bilgilerini g\u00f6ndermelerini talep ederler. Kullan\u0131c\u0131lar genellikle g\u00f6ndericininkinden farkl\u0131 bir e-posta adresine cevap vermeye y\u00f6nlendirirler.<\/p>\n<p>Bu t\u00fcrden kimlik av\u0131 iletileri bir zamanlar olduk\u00e7a pop\u00fclerdi, fakat doland\u0131r\u0131c\u0131lar daha sonra daha etkili ki\u015fisel bilgi h\u0131rs\u0131zl\u0131\u011f\u0131 y\u00f6ntemlerinde uzmanla\u015ft\u0131lar.<\/p>\n<div id=\"attachment_6382\" style=\"width: 1560px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6382\" class=\"wp-image-6382 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02141156\/email-account-stealing-scr-3-EN.png\" alt=\"\" width=\"1550\" height=\"459\"><p id=\"caption-attachment-6382\" class=\"wp-caption-text\">\u015eifre dahil hesap bilgilerini talep eden bir metin i\u00e7eren kimlik av\u0131 iletisi. Bu t\u00fcrden taleplere asla cevap vermeyin<\/p><\/div>\n<h4>Bir kimlik av\u0131 web sayfas\u0131na ba\u011flant\u0131 i\u00e7eren iletiler<\/h4>\n<p>Son zamanlarda en \u00e7ok kullan\u0131lan t\u00fcr, ba\u011flant\u0131 i\u00e7eren kimlik av\u0131 mesajlard\u0131r. Doland\u0131r\u0131c\u0131lar, sonsuz say\u0131da \u00f6nceden olu\u015fturulmu\u015f ba\u011flant\u0131 kullanabilir, bunlar\u0131 ayn\u0131 toplu posta sald\u0131r\u0131s\u0131nda iletilerin i\u00e7ine kar\u0131\u015ft\u0131rabilir, me\u015fru olanlara benzeyen kimlik av\u0131 sayfalar\u0131 olu\u015fturabilirler, ve \u00e7al\u0131nan verilerin toplanmas\u0131n\u0131 ve i\u015flenmesini otomatikle\u015ftirebilirler.<\/p>\n<p>Ama s\u00f6zde kurumlarla tamamen alakas\u0131z alan adlar\u0131na y\u00f6nlendirilmi\u015f olan veya ger\u00e7ek olanlara benzer \u015fekilde tasarlanm\u0131\u015f yanl\u0131\u015f yaz\u0131lm\u0131\u015f alan adlar\u0131 kullanan bu ba\u011flant\u0131lar bir doland\u0131r\u0131c\u0131l\u0131\u011f\u0131n oldu\u011funu net bir \u015fekilde ele verebilir. Bu nedenle h\u0131rs\u0131zlar g\u00f6nderdikleri ba\u011flant\u0131lar\u0131n y\u00f6nlendirilmi\u015f oldu\u011fu adresleri gizlemeye \u00e7al\u0131\u015f\u0131rlar. Bunu t\u0131klanabilir, hiper ba\u011flant\u0131 i\u00e7eren metin ya da g\u00f6rseller yoluyla yaparlar. B\u00f6yle metin ba\u011flant\u0131lar\u0131 \u201cPosta kutunuzu g\u00fcncelleyin.\u201d gibi ifadeler i\u00e7erebilirler. Bazen de ba\u011flant\u0131n\u0131n metin k\u0131sm\u0131 ger\u00e7ek posta hizmeti adresini i\u00e7erirken asl\u0131nda ger\u00e7ek ba\u011flant\u0131 kullan\u0131c\u0131y\u0131 bir kimlik av\u0131 web sayfas\u0131na y\u00f6nlendirir. Ba\u011flant\u0131lar\u0131 t\u0131klamadan kontrol etmezlerse, \u00e7o\u011fu kullan\u0131c\u0131 aradaki fark\u0131 g\u00f6remez.<\/p>\n<div id=\"attachment_6383\" style=\"width: 824px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6383\" class=\"wp-image-6383 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02141243\/email-account-stealing-scr-4-EN.png\" alt=\"\" width=\"814\" height=\"628\"><p id=\"caption-attachment-6383\" class=\"wp-caption-text\">\u00c7o\u011fu kimlik av\u0131 iletisi kimlik av\u0131 sayfalar\u0131na ba\u011flant\u0131lar i\u00e7erir \u2014 bu ba\u011flant\u0131lar\u0131 kullanmaktan ka\u00e7\u0131n\u0131n<\/p><\/div>\n<h4>Kimlik av\u0131 eklentileri<\/h4>\n<p>Kimlik h\u0131rs\u0131zl\u0131\u011f\u0131 iletileri ayr\u0131ca eklentiler de i\u00e7erebilir\u2014 genellikle HTML, PDF, ya da DOC dosyalar\u0131.<\/p>\n<p>DOC ve PDF formatlar\u0131ndaki eklentilerin eklendi\u011fi ana metin genellikle kimlik av\u0131 mesaj\u0131 ve sahte ba\u011flant\u0131 da i\u00e7erir. Bu taktik, istenmeyen posta filtrelerinden kurtulmak i\u00e7in iletinin metnini ger\u00e7ek yaz\u0131\u015fmadaki gibi k\u0131sa ve ona olabildi\u011fince benzer tasarlamaya \u00e7al\u0131\u015fan sald\u0131rganlar taraf\u0131ndan kullan\u0131l\u0131r.<\/p>\n<div id=\"attachment_6385\" style=\"width: 1576px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6385\" class=\"wp-image-6385 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02141922\/email-account-stealing-scr-5-EN.png\" alt=\"\" width=\"1566\" height=\"544\"><p id=\"caption-attachment-6385\" class=\"wp-caption-text\">Baz\u0131 kimlik av\u0131 iletileri kimlik av\u0131 sitelerine ba\u011flant\u0131lar i\u00e7eren PDF veya DOC eklentileri ile birlikte gelirler<\/p><\/div>\n<p>Ba\u011flant\u0131lar <em>yerine <\/em> HTML dosyalar\u0131 kullan\u0131l\u0131r \u2014 HTML eklentisi asl\u0131nda haz\u0131r bir kimlik av\u0131 sayfas\u0131d\u0131r. Doland\u0131r\u0131c\u0131lar\u0131n bak\u0131\u015f a\u00e7\u0131s\u0131ndan, HTML dosyas\u0131 eklentisinin avantaj\u0131 tamamen fonksiyonel olmas\u0131d\u0131r \u2013 \u0130nternet \u00fczerinden payla\u015f\u0131lmas\u0131na gerek yoktur \u2013 ve doland\u0131r\u0131c\u0131l\u0131k i\u00e7in gerekli t\u00fcm unsurlar\u0131 i\u00e7erir.<\/p>\n<div id=\"attachment_6388\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6388\" class=\"wp-image-6388 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/07\/29141609\/disable-browser-notifications-featured.jpg\" alt=\"\" width=\"1460\" height=\"960\"><p id=\"caption-attachment-6388\" class=\"wp-caption-text\">Giri\u015f\/\u015fifre formu kimlik av\u0131 iletisinin i\u00e7ine yerle\u015ftirilmi\u015ftir. Asla bu t\u00fcrden bir \u015feye herhangi bir bilgi girmeyin<\/p><\/div>\n<h3>Kimlik av\u0131 postalar\u0131n\u0131n konular\u0131<\/h3>\n<h4>Hesap sorunlar\u0131<\/h4>\n<p>Postalar\u0131n i\u00e7eriklerine gelecek olursak, bu tarzda yaz\u0131lar\u0131n \u00e7o\u011fu ma\u011fdurun e-posta hesab\u0131na dair bir sorun oldu\u011funu s\u00f6yleyerek ba\u015flar: depolama alan\u0131 s\u0131n\u0131r\u0131na ula\u015f\u0131lm\u0131\u015f, posta teslim sorunu, yetkisiz giri\u015f, spam e-posta su\u00e7lamalar\u0131, ba\u015fka bir tak\u0131m ihlaller oldu\u011funa dair uyar\u0131lar ve benzerleri.<\/p>\n<p>Genellikle kullan\u0131c\u0131ya s\u00f6z konusu sorunu nas\u0131l \u00e7\u00f6zece\u011fini s\u00f6ylenir \u2014 \u00e7o\u011funlukla bir ba\u011flant\u0131 adresine t\u0131klayarak veya bir eklentiyi a\u00e7arak hesap verilerinin onaylanmas\u0131 veya g\u00fcncellenmesi s\u00f6z konusudur. Al\u0131c\u0131n\u0131n g\u00f6z\u00fcn\u00fc korkutmak i\u00e7in, talimatlar uygulanmazsa hesaplar\u0131n\u0131n engellenece\u011fi veya silinece\u011fi s\u00f6ylenir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n<p>Neredeyse her vakada, birka\u00e7 saatle birka\u00e7 hafta aras\u0131nda de\u011fi\u015fen belirli bir yan\u0131t verme s\u00fcresi verilir. Bu genellikle 24 saattir \u2014 hem inand\u0131r\u0131c\u0131 hem de ma\u011fdurun rahatlay\u0131p olay\u0131 unutmas\u0131na izin verecek kadar uzun olmayan bir s\u00fcre.<\/p>\n<div id=\"attachment_6389\" style=\"width: 1569px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6389\" class=\"wp-image-6389 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02142404\/email-account-stealing-scr-7-EN.png\" alt=\"\" width=\"1559\" height=\"418\"><p id=\"caption-attachment-6389\" class=\"wp-caption-text\">\u201cHesab\u0131n\u0131z spam mail g\u00f6nderdi\u011fi i\u00e7in 24 saat i\u00e7inde silinecektir.\u201d Tehditler ve s\u00fcre s\u0131n\u0131rlar\u0131 kimlik av\u0131nda kullan\u0131lan tipik numaralard\u0131r<\/p><\/div>\n<h4>Sahte i\u015f yaz\u0131\u015fmalar\u0131<\/h4>\n<p>Bazen al\u0131\u015f\u0131ld\u0131k olmayan kimlik av\u0131 iletileri e-posta hesaplar\u0131n\u0131 hedef al\u0131r. Bu t\u00fcrden iletilerin i\u00e7eri\u011finde e-posta veya hesap verilerine herhangi bir at\u0131f yoktur. \u0130leti, ger\u00e7ek bir i\u015f yaz\u0131\u015fmas\u0131na benzeyebilir.<\/p>\n<p>Sahte i\u015f yaz\u0131\u015fmalar\u0131n\u0131 kullanan kimlik av\u0131 \u00f6rneklerinin artt\u0131\u011f\u0131n\u0131 son senelerde artt\u0131\u011f\u0131n\u0131 belirtmekte fayda var. Bu t\u00fcrden iletiler genellikle zararl\u0131 eklentiler g\u00f6ndermek i\u00e7in kullan\u0131l\u0131r, ama baz\u0131lar\u0131 da ki\u015fisel verileri \u00e7almaya y\u00f6neliktir. S\u0131radan bir kullan\u0131c\u0131 i\u00e7in bir kimlik av\u0131 iletisini tespit etmek zor olabilir \u2013 siber su\u00e7lular\u0131n bel ba\u011flad\u0131\u011f\u0131 \u015fey de budur.<\/p>\n<div id=\"attachment_6390\" style=\"width: 625px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6390\" class=\"wp-image-6390 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02142453\/email-account-stealing-scr-9-EN.png\" alt=\"\" width=\"615\" height=\"571\"><p id=\"caption-attachment-6390\" class=\"wp-caption-text\">Sahte i\u015f yaz\u0131\u015fmalar\u0131 kurumsal hesap h\u0131rs\u0131zl\u0131klar\u0131nda s\u0131k kullan\u0131lan bir y\u00f6ntemdir<\/p><\/div>\n<p>Baz\u0131 kullan\u0131c\u0131lar bir doland\u0131r\u0131c\u0131l\u0131k oldu\u011fundan \u015f\u00fcphelenmezler ve giri\u015f yap\u0131p var olmayan bir belgeyi g\u00f6rmek i\u00e7in ba\u011flant\u0131ya t\u0131klarlar.<\/p>\n<div id=\"attachment_6391\" style=\"width: 1280px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6391\" class=\"wp-image-6391 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02142530\/email-account-stealing-scr-10-EN.png\" alt=\"\" width=\"1270\" height=\"647\"><p id=\"caption-attachment-6391\" class=\"wp-caption-text\">Kimlik av\u0131 web sayfalar\u0131, kullan\u0131c\u0131y\u0131 kimlik av\u0131 iletisinde bahsedilen belgeyi g\u00f6rmek i\u00e7in giri\u015f yapmaya y\u00f6nlendirir<\/p><\/div>\n<h3>Kimlik av\u0131 sayfas\u0131 t\u00fcrleri<\/h3>\n<p>\u0130letilerin format\u0131 ve i\u00e7eri\u011finden yukar\u0131da bahsetmi\u015ftik, \u015fimdi de kimlik av\u0131 web sayfalar\u0131n\u0131n nas\u0131l g\u00f6r\u00fcnd\u00fc\u011f\u00fcne bakal\u0131m ve doland\u0131r\u0131c\u0131l\u0131k olup olmad\u0131\u011f\u0131n\u0131 tespit etmek i\u00e7in dikkat edilmesi gereken unsurlardan bahsedelim.<\/p>\n<p>\u0130lk dikkat edilmesi gereken \u015fey ba\u011flant\u0131 adresidir. Bu adres bir doland\u0131r\u0131c\u0131l\u0131\u011f\u0131 do\u011frudan ele verebilir. Tipik doland\u0131r\u0131c\u0131l\u0131k ibareleri \u015funlard\u0131r:<\/p>\n<ul>\n<li>G\u00f6nderici kurumla alakas\u0131 olmayan alan ad\u0131 (domain),<\/li>\n<li>Alan ad\u0131 yerine adres uzant\u0131s\u0131nda bulunan kurum veya web hizmeti isimleri, \u00f6rne\u011fin www.example.com\/outlook\/,<\/li>\n<li>yaz\u0131m yanl\u0131\u015flar\u0131,<\/li>\n<li>ba\u011flant\u0131 adresinde bulunan bir dizi rastgele sembol,<\/li>\n<li>Latin alfabesine benzeyen di\u011fer dillerden semboller \u2013 c yerine \u00e7, a yerine \u00e1 ve benzeri.<\/li>\n<\/ul>\n<p>Kimlik avc\u0131lar\u0131, iletiler gibi sahte web sayfalar\u0131n\u0131 da ger\u00e7ek olanlara m\u00fcmk\u00fcn olduk\u00e7a benzer yapmaya \u00e7al\u0131\u015f\u0131rlar. Ama ayr\u0131nt\u0131lar her zaman unutulur \u2013 ancak maalesef her kullan\u0131c\u0131 bunlar\u0131 fark edemez.<\/p>\n<p>Bu anlamas\u0131 kolay olan k\u0131s\u0131md\u0131r; \u00e7evrimi\u00e7i hizmet sa\u011flay\u0131c\u0131s\u0131n\u0131n resmi sitesinin <em>tam olarak<\/em> neye benzedi\u011fini an\u0131msayan insan say\u0131s\u0131 azd\u0131r. Dolay\u0131s\u0131yla inand\u0131r\u0131c\u0131 bir kimlik av\u0131 sayfas\u0131 yaratmak i\u00e7in genellikle temel karakteristik unsurlar\u0131 kullanmak yeterlidir (renk, taslak, logo, vs.<\/p>\n<div id=\"attachment_6392\" style=\"width: 894px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6392\" class=\"wp-image-6392 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02142638\/email-account-stealing-scr-11-EN.png\" alt=\"\" width=\"884\" height=\"486\"><p id=\"caption-attachment-6392\" class=\"wp-caption-text\">Sahte web posta giri\u015f sayfas\u0131<\/p><\/div>\n<p>Kimlik av\u0131 sayfalar\u0131 \u00fccretsiz web posta kullan\u0131c\u0131 ad\u0131 ve \u015fifrelerini \u00e7almak i\u00e7in tasarlanm\u0131\u015f olduklar\u0131 i\u00e7in, genellikle ayn\u0131 sayfada \u00e7ok say\u0131da web posta hizmeti ba\u011flant\u0131s\u0131 bulunur.<\/p>\n<p>Bunlardan herhangi birine t\u0131klarsan\u0131z, ilgili hizmetin giri\u015f sayfas\u0131na benzeyen bir pencere a\u00e7\u0131l\u0131r. Doland\u0131r\u0131c\u0131lar bu sayede \u00e7ok say\u0131da ayr\u0131 sayfa yaratmadan sadece tek bir sayfay\u0131 kullanarak \u00e7ok say\u0131da hesaba ait verileri toplayabilir.<\/p>\n<div id=\"attachment_6393\" style=\"width: 1470px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6393\" class=\"wp-image-6393 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/08\/01100806\/ios-critical-vulnerabilities-124-featured.jpg\" alt=\"\" width=\"1460\" height=\"958\"><p id=\"caption-attachment-6393\" class=\"wp-caption-text\">Bu kimlik av\u0131 sayfas\u0131 farkl\u0131 web posta hesaplar\u0131 kullanarak sahte giri\u015f yapmaya y\u00f6nlendirmektedir<\/p><\/div>\n<p>Kimlik avc\u0131lar\u0131, belirli bir posta servisini temsil ediyormu\u015f gibi yapmak yerine, kullan\u0131c\u0131lar\u0131 bir dizi en yayg\u0131n web posta hizmeti aras\u0131ndan se\u00e7im yapabilecekleri bir kimlik av\u0131 sayfas\u0131na y\u00f6nlendiren (herhangi bir konuda yaz\u0131lm\u0131\u015f, \u00f6rne\u011fin daha \u00f6nce belirtildi\u011fi gibi i\u015f yaz\u0131\u015fmalar\u0131 i\u00e7eren) iletiler kullanarak daha fazla potansiyel ma\u011fdura da ula\u015fabilir.<\/p>\n<div id=\"attachment_6387\" style=\"width: 320px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6387\" class=\"wp-image-6387 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02142047\/email-account-stealing-scr-13-EN.png\" alt=\"\" width=\"310\" height=\"507\"><p id=\"caption-attachment-6387\" class=\"wp-caption-text\">Sahte webposta giri\u015f sayfas\u0131n\u0131n ba\u015fka bir \u00f6rne\u011fi<\/p><\/div>\n<p>Kimlik av\u0131 iletilerini ele al\u0131rken bahsetti\u011fimiz zaman s\u0131n\u0131r\u0131 numaras\u0131 bazen kimlik av\u0131 sayfalar\u0131nda da kullan\u0131l\u0131r. Kullan\u0131c\u0131 sahte sayfay\u0131 a\u00e7t\u0131\u011f\u0131nda, kand\u0131r\u0131lan kullan\u0131c\u0131lar\u0131n verilerini girmeleri i\u00e7in kalan s\u00fcreyi g\u00f6steren bir geri say\u0131m ba\u015flar.<\/p>\n<div id=\"attachment_6394\" style=\"width: 845px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6394\" class=\"wp-image-6394 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2019\/09\/02143448\/email-account-stealing-scr-14-EN.png\" alt=\"\" width=\"835\" height=\"629\"><p id=\"caption-attachment-6394\" class=\"wp-caption-text\">Baz\u0131 kimlik av\u0131 sayfalar\u0131 da kullan\u0131c\u0131lar\u0131 acele etmeye zorlar<\/p><\/div>\n<p>Ma\u011fdur taraf\u0131ndan verileri kimlik av\u0131 sayfas\u0131na girildi\u011finde, farkl\u0131 sonu\u00e7lar ortaya \u00e7\u0131kar. Baz\u0131 web sayfalar\u0131 eri\u015filemez hale gelir veya hata mesaj\u0131 verir. Baz\u0131lar\u0131 da girilen verilerin yanl\u0131\u015f oldu\u011funu ve verilerin tekrar girilmesini s\u00f6yler.<\/p>\n<p>Muhtemelen en tehlikeli senaryo, ge\u00e7 ivme kazanand\u0131r. Veriler girildi\u011fi anda, kimlik av\u0131 sayfas\u0131 kullan\u0131c\u0131y\u0131 s\u00f6z konusu web posta hizmetinin ger\u00e7ek giri\u015f sayfas\u0131na y\u00f6nlendirir. Kullan\u0131c\u0131 bir hata olu\u015ftu\u011funu d\u00fc\u015f\u00fcnerek kullan\u0131c\u0131 ad\u0131 ve \u015fifresinin yeniden girip bu sefer ba\u015far\u0131l\u0131 bir \u015fekilde giri\u015f yapar ve ya\u015fanan garipli\u011fi tamamen unutur.<\/p>\n<h3>Kimlik av\u0131 iletilerinin tespit edilmesi<\/h3>\n<ul>\n<li>E\u011fer g\u00f6ndericinin adresindeki alan ad\u0131 s\u00f6z konusu g\u00f6nderici kuruma ait de\u011filse \u2013 ve \u00f6zellikle de posta kutusu \u00fccretsiz olan web posta hizmetlerinden birine kay\u0131tl\u0131ysa \u2013 ileti sahtedir. Resmi posta iletileri her zaman resmi adreslerden gelir.<\/li>\n<li>E\u011fer ileti t\u0131klanmas\u0131 gereken ba\u011flant\u0131lar, alakas\u0131z alan adlar\u0131, yaz\u0131m hatalar\u0131, \u00f6zel semboller ve benzerlerini i\u00e7eriyorsa, kar\u015f\u0131n\u0131zda duran \u015fey bir doland\u0131r\u0131c\u0131l\u0131k \u00f6rne\u011fidir.<\/li>\n<li>\u0130letide hesab\u0131n\u0131zla ilgili beklenmedik sorunlar oldu\u011fundan bahsediliyorsa ve belirli bir ba\u011flant\u0131ya t\u0131klayarak s\u00fcre dolmadan giri\u015f yapman\u0131z talep ediliyorsa, bu ileti doland\u0131r\u0131c\u0131lardan gelmi\u015ftir.<\/li>\n<\/ul>\n<p>Bunlar\u0131n hepsini hat\u0131rlaman\u0131z ve her ald\u0131\u011f\u0131n\u0131z iletiyi iyice incelemeniz faydal\u0131 olsa da gerekli de\u011fildir. Bunun yerine, kimlik av\u0131 ve di\u011fer \u00e7evrimi\u00e7i tehditlere kar\u015f\u0131 kendinizi korumak i\u00e7in <a href=\"http:\/\/kas.pr\/kdkistr\" target=\"_blank\" rel=\"noopener\">sa\u011flam bir anti-vir\u00fcs \u00fcr\u00fcn\u00fc<\/a> kullan\u0131n.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n","protected":false},"excerpt":{"rendered":"<p>Bug\u00fcn e-posta en \u00f6nemli \u0130nternet hizmetlerinden biridir, bu da e-posta h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 olduk\u00e7a \u00e7ekici hale getirmektedir.<\/p>\n","protected":false},"author":2481,"featured_media":6379,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[1921,1564,649,1074,561,240],"class_list":{"0":"post-6378","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-e-posta","9":"tag-hesaplar","10":"tag-hirsizlik","11":"tag-kimlik-avi","12":"tag-sifreler","13":"tag-spam"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/email-account-stealing\/6378\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/email-account-stealing\/16564\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/email-account-stealing\/13956\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/email-account-stealing\/6475\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/email-account-stealing\/18503\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/email-account-stealing\/16601\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/email-account-stealing\/15247\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/email-account-stealing\/19155\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/email-account-stealing\/17885\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/email-account-stealing\/23433\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/email-account-stealing\/28029\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/email-account-stealing\/12185\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/email-account-stealing\/12329\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/email-account-stealing\/11140\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/email-account-stealing\/20102\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/email-account-stealing\/23995\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/email-account-stealing\/24191\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/email-account-stealing\/18930\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/email-account-stealing\/23290\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/email-account-stealing\/23201\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=6378"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6378\/revisions"}],"predecessor-version":[{"id":6735,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/6378\/revisions\/6735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/6379"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=6378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=6378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=6378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}