{"id":7655,"date":"2020-02-12T11:20:56","date_gmt":"2020-02-12T08:20:56","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=7655"},"modified":"2020-02-12T11:20:56","modified_gmt":"2020-02-12T08:20:56","slug":"ransomware-data-disclosure","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-data-disclosure\/7655\/","title":{"rendered":"\u015eantajc\u0131lar \u00e7al\u0131nan verileri yay\u0131nlad\u0131\u011f\u0131 s\u00fcrece yedekleme her derde deva de\u011fil"},"content":{"rendered":"<p>Verileri yedeklemek, emek-yo\u011fun bir y\u00f6ntem olsa da, \u015fifreleme yapan fidye yaz\u0131l\u0131mlar\u0131na kar\u015f\u0131 en etkili \u00f6nlemlerden biri oldu. \u015eimdi ise su\u00e7lular, yedeklemeye g\u00fcvenenlerin bir ad\u0131m \u00f6n\u00fcne ge\u00e7mi\u015f g\u00f6r\u00fcn\u00fcyor. Fidye \u00f6demeyi reddeden kurbanlarla kar\u015f\u0131 kar\u015f\u0131ya kalan fidye yaz\u0131l\u0131m\u0131 geli\u015ftiricileri, art\u0131k bu verileri \u00e7evrimi\u00e7i olarak payla\u015fmaya ba\u015flad\u0131.<\/p>\n<h2>Verilerin yay\u0131nlanmas\u0131, tehditleri ger\u00e7ek k\u0131l\u0131yor<\/h2>\n<p>Gizli bilgileri herkese a\u00e7\u0131k hale getirme tehditleri yeni de\u011fil. \u00d6rne\u011fin, 2016 y\u0131l\u0131nda, <a href=\"https:\/\/www.theverge.com\/2016\/11\/28\/13769360\/muni-hacker-threat-release-customer-data-san-francisco\" target=\"_blank\" rel=\"noopener nofollow\">San Francisco Belediyesi Demiryolu sistemlerine bula\u015fan kripto yaz\u0131l\u0131m<\/a>\u0131n arkas\u0131ndaki grup bu hileyi denedi. Fakat y\u00f6nelttikleri tehditleri yerine getirmediler.<\/p>\n<h3>Maze ilkti<\/h3>\n<p>\u00d6nc\u00fcllerinden farkl\u0131 olarak, Maze fidye yaz\u0131l\u0131m\u0131n\u0131n arkas\u0131ndaki grup, 2019\u2019un sonlar\u0131nda s\u00f6ylediklerini ger\u00e7ekten de yapt\u0131; \u00fcstelik birden fazla defa. Kas\u0131m ay\u0131nda, Allied Universal \u00f6deme yapmay\u0131 reddetti\u011finde su\u00e7lular, s\u00f6zle\u015fmeler, fesih anla\u015fmalar\u0131, dijital sertifikalar ve daha fazlas\u0131 dahil olmak \u00fczere<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/allied-universal-breached-by-maze-ransomware-stolen-data-leaked\/\" target=\"_blank\" rel=\"noopener nofollow\"> 700 MB dahili veriyi \u00e7evrimi\u00e7i olarak s\u0131zd\u0131rd\u0131<\/a>. \u015eantajc\u0131lar, \u00e7ald\u0131klar\u0131n\u0131n yaln\u0131zca %10\u2019unu yay\u0131nlad\u0131klar\u0131n\u0131 ve hedef \u015firket i\u015fbirli\u011fi yapmad\u0131\u011f\u0131 takdirde geri kalan verileri de halka a\u00e7acaklar\u0131n\u0131 s\u00f6yleyerek tehditlerini s\u00fcrd\u00fcrd\u00fc.<\/p>\n<p>Aral\u0131k ay\u0131nda, Maze failleri bir <a href=\"https:\/\/krebsonsecurity.com\/2019\/12\/ransomware-gangs-now-outing-victim-businesses-that-dont-pay-up\/\" target=\"_blank\" rel=\"noopener nofollow\">web sitesi olu\u015fturdu<\/a> ve bu sitede kurban \u015firketlerin adlar\u0131n\u0131, vir\u00fcs bula\u015fma tarihlerini, \u00e7al\u0131nan veri miktar\u0131n\u0131, IP adreslerini ve vir\u00fcsl\u00fc sunucular\u0131n adlar\u0131n\u0131 yay\u0131nlad\u0131. Siteye baz\u0131 belgeler de y\u00fcklediler. Ay sonunda, Florida\u2019n\u0131n <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-releases-files-stolen-from-city-of-pensacola\/\" target=\"_blank\" rel=\"noopener nofollow\">Pensacola kentinden \u00e7al\u0131nm\u0131\u015f g\u00f6r\u00fcnen<\/a> 2 GB dosya \u00e7evrimi\u00e7i olarak ortaya \u00e7\u0131kt\u0131. \u015eantajc\u0131lar bl\u00f6f yapmad\u0131klar\u0131n\u0131 kan\u0131tlamak i\u00e7in bilgileri yay\u0131nlad\u0131klar\u0131n\u0131 s\u00f6yledi.<\/p>\n<p>Maze yarat\u0131c\u0131lar\u0131 Ocak ay\u0131nda T\u0131bbi Tan\u0131 Laboratuvarlar\u0131 verilerinin 9,5 GB\u2019\u0131n\u0131 ve daha \u00f6nce gizli bilgileri s\u0131zd\u0131rd\u0131\u011f\u0131 i\u00e7in \u015fantajc\u0131lara dava a\u00e7m\u0131\u015f olan kablo \u00fcreticisi Southwire\u2019dan gelen belgelerin 14,1 GB\u2019\u0131n\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-not-getting-paid-leaks-data-left-and-right\/\" target=\"_blank\" rel=\"noopener nofollow\">y\u00fckledi<\/a>. Dava sonucunda Maze\u2019in web sitesi kapat\u0131ld\u0131, ancak bu durum uzun s\u00fcremeyecek.<\/p>\n<h3>Ard\u0131ndan Sodinokibi, Nemty ve BitPyLock<\/h3>\n<p>Bunu di\u011fer siber su\u00e7lular izledi. Yeni y\u0131l arifesinde uluslararas\u0131 finans \u015firketi Travelex\u2019e sald\u0131rmak i\u00e7in kullan\u0131lan fidye yaz\u0131l\u0131m\u0131 Sodinokibi\u2019nin arkas\u0131ndaki grup, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sodinokibi-ransomware-says-travelex-will-pay-one-way-or-another\/\" target=\"_blank\" rel=\"noopener nofollow\">Ocak ay\u0131 ba\u015f\u0131nda \u015firketin m\u00fc\u015fterilerine ait verileri yay\u0131nlama niyetini belirtti<\/a>. Siber su\u00e7lular do\u011fum tarihleri, sosyal g\u00fcvenlik numaralar\u0131 ve banka kart\u0131 bilgileri dahil 5 GB\u2019dan fazla bilgiye sahip olduklar\u0131n\u0131 s\u00f6yl\u00fcyor.<\/p>\n<p>Travelex, bir s\u0131z\u0131nt\u0131 oldu\u011funa dair kan\u0131t g\u00f6rmedi\u011fini ve \u00f6deme yapmay\u0131 reddetti\u011fini s\u00f6yl\u00fcyor. Bu arada su\u00e7lular ise \u015firketin m\u00fczakere etmeyi kabul etti\u011fini s\u00f6yl\u00fcyorlar.<\/p>\n<p>11 Ocak\u2019ta ayn\u0131 grup, bir hacker mesaj panosuna yakla\u015f\u0131k 337 MB\u2019l\u0131k bir veri ba\u011flant\u0131s\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sodinokibi-ransomware-publishes-stolen-data-for-the-first-time\/\" target=\"_blank\" rel=\"noopener nofollow\">y\u00fckleyerek<\/a> verilerin fidye \u00f6demeyi reddeden i\u015fe al\u0131m \u015firketi Artech Information Systems\u2019a ait oldu\u011funu s\u00f6yledi. Su\u00e7lular, y\u00fcklenen verilerin \u00e7ald\u0131klar\u0131n\u0131n yaln\u0131zca bir k\u0131sm\u0131 oldu\u011funu da belirtti. Kurbanlar, istenenlere uymazsa geri kalan verileri yay\u0131nlamak de\u011fil, satmak istediklerini s\u00f6ylediler.<\/p>\n<p>Nemty k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m\u0131n\u0131n geli\u015ftiricileri, \u00f6deme yapmayanlar\u0131n gizli verilerini yay\u0131nlama planlar\u0131n\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nemty-ransomware-to-start-leaking-non-paying-victims-data\/\" target=\"_blank\" rel=\"noopener nofollow\">duyurdu<\/a>. Taleplerini yerine getirmeyen ma\u011fdurlar\u0131n \u015firket i\u00e7i belgelerini par\u00e7a par\u00e7a yay\u0131nlamay\u0131 ama\u00e7lad\u0131klar\u0131n\u0131 belirttiler.<\/p>\n<p>BitPyLock fidye yaz\u0131l\u0131m\u0131 operat\u00f6rleri de fidye notlar\u0131na kurbanlar\u0131n gizli verilerini halka a\u00e7ma tehdidi ekleyerek bu <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bitpylock-ransomware-now-threatens-to-publish-stolen-data\/\" target=\"_blank\" rel=\"noopener nofollow\">trende kat\u0131ld\u0131<\/a>. Hen\u00fcz yapmam\u0131\u015f olsa da, BitPyLock da veri \u00e7ald\u0131\u011f\u0131n\u0131 kan\u0131tlayabilir.<\/p>\n<h2>Sadece fidye yaz\u0131l\u0131mlar\u0131 s\u00f6z konusu de\u011fil<\/h2>\n<p>Fidye yaz\u0131l\u0131m\u0131 programlar\u0131na eklenen geli\u015fmi\u015f \u00f6zellikler yeni de\u011fil. \u00d6rne\u011fin, 2016 y\u0131l\u0131nda, Shade Truva At\u0131n\u0131n bir s\u00fcr\u00fcm\u00fc, bir muhasebe makinesine denk geldi\u011fini tespit ederse dosyalar\u0131 \u015fifrelemek yerine <a href=\"https:\/\/securelist.com\/shade-not-by-encryption-alone\/75645\/\" target=\"_blank\" rel=\"noopener\">uzaktan y\u00f6netim ara\u00e7lar\u0131 y\u00fckl\u00fcyordu<\/a>. CryptXXX, hem \u015fifreli dosyalar\u0131 hem de <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cryptxxx-ransomware\/2047\/\" target=\"_blank\" rel=\"noopener\">Bitcoin ve kurbanlar\u0131n giri\u015f bilgilerini \u00e7ald\u0131<\/a>. RAA\u2019n\u0131n arkas\u0131ndaki grup ise <a href=\"https:\/\/securelist.com\/a-malicious-pairing-of-cryptor-and-stealer\/76039\/\" target=\"_blank\" rel=\"noopener\">giri\u015f bilgilerini de hedefleyen baz\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m \u00f6rneklerini Pony Truva At\u0131 ile donatt\u0131<\/a>. Fidye yaz\u0131l\u0131mlar\u0131n\u0131n veri \u00e7alma yetene\u011fi kimseyi \u015fa\u015f\u0131rtmamal\u0131; \u00f6zellikle de \u015firketler art\u0131k bilgilerini yedekleme ihtiyac\u0131n\u0131 giderek daha fazla fark ederken.<\/p>\n<p>Bu sald\u0131r\u0131lara kar\u015f\u0131 yedekleme yaparak korunulamayaca\u011f\u0131n\u0131 bilmek endi\u015fe verici. Yaz\u0131l\u0131m sisteminize bula\u015ft\u0131\u011f\u0131 takdirde, fidye ile s\u0131n\u0131rl\u0131 olmayacak kay\u0131plardan ka\u00e7\u0131nman\u0131n bir yolu yok; \u015fantajc\u0131lar hi\u00e7bir garanti vermiyor. Kendinizi koruman\u0131n tek yolu, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n sistemlerinize girmesine izin vermek.<\/p>\n<h2>Kendinizi fidye yaz\u0131l\u0131mlar\u0131ndan nas\u0131l korursunuz<\/h2>\n<p>Bu yeni fidye yaz\u0131l\u0131m\u0131 trendinin etkili olup olmayaca\u011f\u0131n\u0131 veya s\u00fcrd\u00fcr\u00fcl\u00fcp s\u00fcrd\u00fcr\u00fclmeyece\u011fini \u00f6n\u00fcm\u00fczdeki zamanlarda g\u00f6rece\u011fiz. Bu sald\u0131r\u0131lar yak\u0131n zamanda ivme kazanmaya ba\u015flad\u0131, bu y\u00fczden korunma alt\u0131nda olmak \u00f6nemli. Bu t\u00fcr sald\u0131r\u0131lar yaln\u0131zca itibar kay\u0131plar\u0131na ve ticari s\u0131rlar\u0131n if\u015fa edilmesine sebep olmakla kalm\u0131yor; bir m\u00fc\u015fterinin ki\u015fisel verilerinin \u00e7al\u0131nmas\u0131na izin verirseniz ciddi para cezalar\u0131yla kar\u015f\u0131la\u015fabilirsiniz. \u0130\u015fte size baz\u0131 tavsiyeler:<\/p>\n<ul>\n<li>Bilgi g\u00fcvenli\u011fi bilincini geli\u015ftirin. Personel ne kadar bilgili olursa, kimlik av\u0131 ve di\u011fer sosyal m\u00fchendislik tekniklerinin onlar \u00fczerinde i\u015fe yarama olas\u0131l\u0131\u011f\u0131 o kadar d\u00fc\u015f\u00fck olur. <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/security-awareness-platform\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> ad\u0131nda, farkl\u0131 i\u015f y\u00fck\u00fc seviyelerine, ilgi alanlar\u0131na ve gizli bilgilere eri\u015fim d\u00fczeylerine sahip \u00e7al\u0131\u015fanlara g\u00f6re tasarlanm\u0131\u015f bir \u00f6\u011frenme platformumuz var.<\/li>\n<li>\u0130\u015fletim sistemlerinizi ve yaz\u0131l\u0131mlar\u0131n\u0131z\u0131, \u00f6zellikle de sisteme yetkisiz eri\u015fime ve sistemin kontrol\u00fcne izin veren g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7erdi\u011fi tespit edilen her \u015feyi, derhal g\u00fcncelleyin.<\/li>\n<li>\u00d6zel olarak fidye yaz\u0131l\u0131mlar\u0131yla m\u00fccadeleye y\u00f6nelik koruyucu bir \u00e7\u00f6z\u00fcm kullan\u0131n. \u00d6rne\u011fin, <a href=\"http:\/\/kas.pr\/karttr\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Ransomware Tool<\/a> \u00e7\u00f6z\u00fcm\u00fcm\u00fcz\u00fc \u00fccretsiz olarak indirebilirsiniz.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kartb2b\">\n","protected":false},"excerpt":{"rendered":"<p>Fidye yaz\u0131l\u0131m\u0131 geli\u015ftiricileri, \u00f6deme yapmay\u0131 reddeden \u015firketlerin verilerini yay\u0131nlamak gibi yeni bir trend izlemeye ba\u015flad\u0131.<\/p>\n","protected":false},"author":2509,"featured_media":7656,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1194,1727],"tags":[591,2113,2114,935,2023,1975],"class_list":{"0":"post-7655","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-fidye-yazilimi","10":"tag-maze","11":"tag-nemty","12":"tag-sifreleyiciler","13":"tag-sodin","14":"tag-veri-sizintilari"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-data-disclosure\/7655\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-data-disclosure\/18474\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-data-disclosure\/15350\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-data-disclosure\/7477\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-data-disclosure\/20241\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-data-disclosure\/18567\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-data-disclosure\/17077\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-data-disclosure\/21070\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-data-disclosure\/19904\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-data-disclosure\/26264\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-data-disclosure\/32410\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-data-disclosure\/13705\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-data-disclosure\/14014\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-data-disclosure\/12753\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-data-disclosure\/22136\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/ransomware-data-disclosure\/10751\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-data-disclosure\/26862\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-data-disclosure\/24954\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-data-disclosure\/20914\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-data-disclosure\/25755\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-data-disclosure\/25587\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7655","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2509"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=7655"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7655\/revisions"}],"predecessor-version":[{"id":7657,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/7655\/revisions\/7657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/7656"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=7655"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=7655"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=7655"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}