{"id":7522,"date":"2020-01-07T15:26:01","date_gmt":"2020-01-07T12:26:01","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=7522"},"modified":"2020-01-07T15:26:01","modified_gmt":"2020-01-07T12:26:01","slug":"snow-white-cryptominers","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/snow-white-cryptominers\/7522\/","title":{"rendered":"Pamuk Prenses, Yedi Kripto Para Madencisi ve hedefli sald\u0131r\u0131lar"},"content":{"rendered":"<p>\u00c7ocuklar rahats\u0131z edici sorular\u0131 nas\u0131l soracaklar\u0131n\u0131 bilirler. Noel Baba var m\u0131? Di\u015f perisi di\u015fleri nereden toplar? \u0130stedi\u011finiz herhangi bir ki\u015fiyi takip etmek m\u00fcmk\u00fcn m\u00fcd\u00fcr? Genellikle hedefli sald\u0131r\u0131lar\u0131n arkas\u0131nda h\u00fck\u00fcmetlerin oldu\u011fu do\u011fru mu?<\/p>\n<p>Neyse ki, son iki sorunun cevab\u0131, baz\u0131 ilgin\u00e7 teknolojileri alegorik formda a\u00e7\u0131klayan Pamuk Prenses ve Yedi C\u00fcceler masal\u0131nda bulunabilir. Nereye bakaca\u011f\u0131n\u0131z\u0131 bilirseniz, her \u015fey anlam kazan\u0131r. Gelin, \u00fcnl\u00fc Grimm Karde\u015fler masal\u0131n\u0131n alt metnini inceleyelim.<\/p>\n<h2>Ayna ayna s\u00f6yle bana<\/h2>\n<p>Hikaye, k\u0131z\u0131n\u0131n do\u011fumunda e\u015fi vefat eden bir kralla ba\u015flar. Kral, k\u0131sa s\u00fcre i\u00e7erisinde kendisine yeni bir krali\u00e7e bulur. Bu krali\u00e7enin sorular\u0131n\u0131 cevaplayan duvara as\u0131l\u0131 sihirli bir aynas\u0131 vard\u0131r. Krali\u00e7e, aynaya sorar:<\/p>\n<p style=\"text-align: center\"><em>Ayna ayna s\u00f6yle bana,<\/em><br>\n<em>var m\u0131 benden g\u00fczeli bu d\u00fcnyada?<\/em><\/p>\n<p>Eskiden okurlar i\u00e7in bu soru kula\u011fa muhtemelen \u015fimdi oldu\u011fundan daha garip geliyordu. \u00c7\u00fcnk\u00fc g\u00fcn\u00fcm\u00fczde \u201cAyna ayna\u201d demek bize dijital asistanlar\u0131m\u0131zla ileti\u015fime ge\u00e7mek i\u00e7in kulland\u0131\u011f\u0131m\u0131z ifadelerden (\u201cTamam, Google\u201d veya \u201cHey Siri\u201d) daha tuhaf gelmiyor. Bu ayna, dahili sesli asistan\u0131 olan her g\u00fcn kulland\u0131\u011f\u0131n\u0131z ak\u0131ll\u0131 TV\u2019nizden \u00e7ok da farkl\u0131 de\u011fil.<\/p>\n<p>Ancak aynan\u0131n verdi\u011fi cevaplar bize aynan\u0131n krall\u0131kta ya\u015fayan herkesin verilerinin bulundu\u011fu bir veri taban\u0131na do\u011frudan eri\u015fimi oldu\u011funu g\u00f6steriyor. Belgeler, biyometrik foto\u011fraflar ve daha fazlas\u0131ndan olu\u015fan bir veri taban\u0131. Dahas\u0131, bu sesli asistan verileri g\u00fczellik gibi \u00f6znel bir kavram hakk\u0131nda yarg\u0131da bulunmak i\u00e7in kullanabiliyor. Krali\u00e7enin sihirli aynas\u0131 geli\u015fmi\u015f makine \u00f6\u011frenme teknolojileri ile g\u00fc\u00e7lendirilmi\u015f olmal\u0131.<\/p>\n<h2>\u00dcvey Anne APT grubu: \u201cBa\u011fc\u0131kl\u0131 Korse\u201d ve \u201cTarak\u201d Operasyonlar\u0131<\/h2>\n<p>\u015eimdi masal\u0131n ana konusunu tart\u0131\u015fal\u0131m. Unutmay\u0131n, masal\u0131n temel hikayesi \u00fcvey annenin \u00fcvey k\u0131z\u0131ndan kurtulmak istemesi. Devlet ajanlar\u0131, Pamuk Prenses\u2019i takip etmeye ba\u015flar ve onu c\u00fccelerle kar\u015f\u0131la\u015ft\u0131\u011f\u0131 ormanda kalmaya zorlar.<\/p>\n<p>C\u00fcceler, ka\u00e7ak k\u0131za kap\u0131lar\u0131n\u0131 a\u00e7ar. Ancak, c\u00fcceler i\u015fleri ile me\u015fgullerdir ve her g\u00fcn \u00f6nemli i\u015flerine gitmek i\u00e7in evden ayr\u0131l\u0131rlar. C\u00fcceler madencidirler. Do\u011fal olarak Grimm Karde\u015fler, masalda c\u00fccelerin ekipmanlar\u0131n\u0131 nerede tuttuklar\u0131, hangi kripto para birimini i\u015fledikleri ve elektriklerini nereden \u00e7ektikleri gibi ayr\u0131nt\u0131lardan bahsetmemi\u015fler. Ancak ormandaki tenha bir yerde madencilik yapmay\u0131 se\u00e7melerinden yola \u00e7\u0131karak, c\u00fccelerin faaliyetlerinin tamamen yasal olmad\u0131\u011f\u0131n\u0131 anlayabiliriz.<\/p>\n<p>Pamuk Prenses sakland\u0131\u011f\u0131 yerde fark edilmeden kalmay\u0131 ba\u015far\u0131yor mu? Hay\u0131r. Her \u015feyi bilen ayna, krali\u00e7eye sadece Pamuk Prenses\u2019in hayatta oldu\u011funu s\u00f6ylemekle kalm\u0131yor, ayn\u0131 zamanda da Pamuk Prenses\u2019in bulundu\u011fu yeri tam olarak g\u00f6steriyor (\u201cda\u011flar\u0131n \u00f6tesinde yedi c\u00fcceler ile birlikte\u201d). \u00dcvey anne yeterince bilgi toplad\u0131\u011f\u0131nda, kendi \u00fcvey k\u0131z\u0131na hedefli bir sald\u0131r\u0131 d\u00fczenlemeye karar veriyor ve Pamuk Prenses\u2019e ba\u011fc\u0131kl\u0131 korse satmak i\u00e7in ya\u015fl\u0131 t\u00fcccar bir kad\u0131n k\u0131l\u0131\u011f\u0131na giriyor. \u00dcvey anne ba\u011fc\u0131kl\u0131 korseyi kullanarak Pamuk Prenses\u2019in belini \u00f6yle s\u0131k\u0131yor ki prenses yere d\u00fc\u015f\u00fcyor.<\/p>\n<p>Neyse ki, c\u00fcceler korsenin ba\u011fc\u0131klar\u0131n\u0131 \u00e7\u00f6z\u00fcyorlar ve Pamuk Prenses\u2019in \u00f6lmesine engel oluyorlar. Bu hikaye, engelleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131n mecazi bir a\u00e7\u0131klamas\u0131 niteli\u011findedir. Engelleyici k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bir cihaz\u0131 kitleyerek kullan\u0131c\u0131n\u0131n eri\u015fimini engeller (bu yaz\u0131l\u0131mlar genellikle fidye ama\u00e7l\u0131 kullan\u0131lsa da bazen sabotaj amac\u0131yla da kullan\u0131labiliyor). Neyse ki, c\u00fccelerin aras\u0131nda Pamuk Prenses\u2019e yap\u0131lan bu sald\u0131r\u0131y\u0131 neredeyse an\u0131nda etkisiz hale getirmeyi ba\u015faran bir uzman bulunuyor olmal\u0131.<\/p>\n<p>Peki \u00fcvey anne dersini al\u0131yor ve pes ediyor mu? Hay\u0131r. Sald\u0131r\u0131s\u0131n\u0131n ba\u015far\u0131s\u0131z oldu\u011funu \u00f6\u011frenmesinin ard\u0131ndan \u00fcvey anne, ayn\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mda ba\u015fka bir de\u011fi\u015fiklik yap\u0131yor. Bu sefer, bir tarak kullanmaya karar veriyor. \u00dcvey annenin \u015fans\u0131 yaver gidiyor ve deneyimlerinden hi\u00e7bir \u015fey \u00f6\u011frenmemi\u015f olan Pamuk Prenses, ayn\u0131 ko\u015fulsuz g\u00fcveni bilmedi\u011fi bir sat\u0131c\u0131dan <s>torrent\u2019den indirip<\/s> tarak al\u0131p o tarakla sa\u00e7\u0131n\u0131 tarayarak <s>bilgisayar\u0131na indirerek<\/s> g\u00f6steriyor. C\u00fcceler ise bir kez daha bu bloker enfeksiyonunu temizliyor.<\/p>\n<h2>Vir\u00fcs bula\u015fm\u0131\u015f bir \u201cElma\u201d<\/h2>\n<p>\u00dcvey anne, hedefli sald\u0131r\u0131s\u0131n\u0131n \u00fc\u00e7\u00fcnc\u00fc dalgas\u0131n\u0131 daha dikkatli bir \u015fekilde planl\u0131yor. Pamuk Prenses\u2019e ba\u011fland\u0131\u011f\u0131nda onu kal\u0131c\u0131 olarak devre d\u0131\u015f\u0131 b\u0131rakacak bir cihaz yap\u0131yor. Bu sefer, bir elma kullan\u0131yor.<\/p>\n<p>(Grimm Karde\u015flerin sald\u0131r\u0131 i\u00e7in elma se\u00e7mesi bo\u015funa de\u011fil. Belki de ger\u00e7ekten s\u00f6ylemeye \u00e7al\u0131\u015ft\u0131klar\u0131 \u015fey, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-security-explainer\/5269\/\" target=\"_blank\" rel=\"noopener\">iOS cihazlar i\u00e7in tam te\u015fekk\u00fcll\u00fc g\u00fcvenlik \u00e7\u00f6z\u00fcmleri olmad\u0131\u011f\u0131d\u0131r<\/a>, ancak Grimm Karde\u015flerin <em>bu kadar<\/em> ileri g\u00f6r\u00fc\u015fl\u00fc olup olmad\u0131klar\u0131ndan emin de\u011filiz . Ya da belki de okuyucular\u0131n\u0131n kafalar\u0131n\u0131 kar\u0131\u015ft\u0131rmak istemediler. \u00c7\u00fcnk\u00fc Orta \u00c7a\u011f\u2019da android cihaz satmaya \u00e7al\u0131\u015fan k\u00f6yl\u00fc bir kad\u0131n masalda olduk\u00e7a garip durabilirdi.)<\/p>\n<p>Bu noktada, c\u00fcceler Pamuk Prenses\u2019e siber g\u00fcvenlik e\u011fitimi vermi\u015f olmal\u0131lar. \u00d6yle ki \u00fcvey annesi bir daha k\u0131l\u0131k de\u011fi\u015ftirdi\u011finde Pamuk Prenses, c\u00fccelerin ona i\u00e7eri birini almas\u0131na veya birinden herhangi bir \u015fey almas\u0131na izin vermedi\u011fini s\u00f6yl\u00fcyor. Ancak, c\u00fcceler e\u011fitim vermi\u015f olsalar da bu yeterli olmuyor ve Pamuk Prenses, k\u00f6yl\u00fc kad\u0131n\u0131n elmay\u0131 \u0131s\u0131rd\u0131\u011f\u0131n\u0131 g\u00f6rd\u00fc\u011f\u00fcnde, elman\u0131n yemek i\u00e7in g\u00fcvenli oldu\u011funa inan\u0131yor. Pamuk Prenses meyvenin bir k\u0131sm\u0131n\u0131 \u0131s\u0131r\u0131yor ve sonu\u00e7 olarak yere d\u00fc\u015f\u00fcyor.<\/p>\n<p>Bu kez, c\u00fcceler k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131 yenemiyorlar ve Pamuk Prenses\u2019in bir daha hayata d\u00f6nemeyece\u011fine karar veriyorlar. Bu olay, k\u00f6t\u00fc ama\u00e7l\u0131 kripto yaz\u0131l\u0131mlar\u0131n\u0131n nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 a\u00e7\u0131k\u00e7a g\u00f6steriyor. Bu yaz\u0131l\u0131mlar verileri eri\u015filemez hale getiriyor ve \u00e7o\u011fu durumda veri sahipleri k\u00f6t\u00fc ama\u00e7l\u0131 bu yaz\u0131l\u0131m\u0131n eylemlerini tersine \u00e7eviremiyor.<\/p>\n<p>Bununla birlikte, en iyi yolu izleyen c\u00fcceler Pamuk Prenses\u2019i g\u00f6mm\u00fcyor ve bir g\u00fcn bir \u015fifre \u00e7\u00f6zme program\u0131n\u0131n ortaya \u00e7\u0131kmas\u0131 umuduyla onu bir cam tabutun i\u00e7ine koyuyorlar. Ve ger\u00e7ekten de, bir s\u00fcre sonra, \u201cPrens\u201d olarak bilinen gezgin bir bilgi g\u00fcvenlik uzman\u0131 \u00e7\u0131kageliyor. Tabuta yapt\u0131\u011f\u0131 baz\u0131 manip\u00fclasyonlardan sonra Prens, zehirli elman\u0131n bir par\u00e7as\u0131n\u0131 buluyor (daha a\u00e7\u0131k bir \u015fekilde, Grimm Karde\u015fler prensin de\u015fifrasyon anahtar\u0131n\u0131 buldu\u011funu s\u00f6ylemeye \u00e7al\u0131\u015f\u0131yor) ve Pamuk Prenses hayata geri d\u00f6n\u00fcyor.<\/p>\n<p>Pamuk prensesin hayata d\u00f6nmesinin ard\u0131ndan ise masal, mutlu bir sonla bitiyor.<\/p>\n<h2>Pamuk Prenses Masal\u0131ndan Al\u0131nacak Dersler<\/h2>\n<p>Bu masal \u00e7ocuklara ne(ler) \u00f6\u011fretebilir? \u0130\u015fte bu masaldan ald\u0131\u011f\u0131m\u0131z dersler:<\/p>\n<ul>\n<li>Evet, kullan\u0131c\u0131lar hakk\u0131nda, genellikle r\u0131zalar\u0131 olmadan, bilgi toplamak i\u00e7in kullan\u0131lan teknolojiler bulunuyor ve bu ara\u00e7lar yasa d\u0131\u015f\u0131 ama\u00e7larla kullan\u0131labiliyor.<\/li>\n<li>Ve evet, siber sald\u0131r\u0131lar\u0131n arkas\u0131nda devlet olabilir.<\/li>\n<li>\u0130nsanlar ayn\u0131 hatay\u0131 iki kez yapma e\u011filimindedir ve siber g\u00fcvenlik e\u011fitimi her zaman sald\u0131r\u0131lar\u0131 engelleyemez. Yaln\u0131zca yard\u0131m etmenin bir yolu olarak kullan\u0131c\u0131lara ders vermemelisiniz. Aksine, onlara gerekli becerileri \u00f6\u011fretmelisiniz. \u00d6rne\u011fin, <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/security-awareness-platform\" target=\"_blank\" rel=\"noopener noreferrer\">Kaspersky Automated Security Awareness Platform<\/a> etkili e\u011fitim konusunda yard\u0131mc\u0131 olabilir.<\/li>\n<li>Bazen bireyler ve k\u00fc\u00e7\u00fck \u015firketlerde \u00e7al\u0131\u015fan ki\u015filer bile APT sald\u0131r\u0131lar\u0131n\u0131n hedefi olabilir. Bu nedenle, internete ba\u011fl\u0131 her cihazda <a href=\"https:\/\/kas.pr\/ksostr\" target=\"_blank\" rel=\"noopener\">g\u00fcvenilir bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a> bulunmal\u0131d\u0131r .<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksos\">\n","protected":false},"excerpt":{"rendered":"<p>Grimm Karde\u015fler masallar\u0131 yaln\u0131zca \u00e7ocuklar i\u00e7in de\u011fil, yeti\u015fkinler i\u00e7in de bilgi g\u00fcvenli\u011fi konusunda bir ders kayna\u011f\u0131d\u0131r.<\/p>\n","protected":false},"author":700,"featured_media":7523,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1727],"tags":[374,591,1867,618,2084,2016],"class_list":{"0":"post-7522","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-smb","10":"tag-bitcoin","11":"tag-fidye-yazilimi","12":"tag-gercek","13":"tag-hedefli-saldirilar","14":"tag-kripto-yazilim","15":"tag-masallar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/snow-white-cryptominers\/7522\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/snow-white-cryptominers\/18364\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/snow-white-cryptominers\/15239\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/snow-white-cryptominers\/7345\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/snow-white-cryptominers\/20109\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/snow-white-cryptominers\/18426\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/snow-white-cryptominers\/16845\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/snow-white-cryptominers\/20838\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/snow-white-cryptominers\/19603\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/snow-white-cryptominers\/31987\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/snow-white-cryptominers\/13584\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/snow-white-cryptominers\/13885\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/snow-white-cryptominers\/21850\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/snow-white-cryptominers\/10601\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/snow-white-cryptominers\/26510\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/snow-white-cryptominers\/24782\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/snow-white-cryptominers\/25650\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/snow-white-cryptominers\/25481\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/gercek\/","name":"ger\u00e7ek"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7522"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7522\/revisions"}],"predecessor-version":[{"id":7524,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7522\/revisions\/7524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/7523"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}