{"id":852,"date":"2014-01-29T12:30:28","date_gmt":"2014-01-29T17:30:28","guid":{"rendered":"http:\/\/www.kaspersky.com.tr\/blog\/?p=852"},"modified":"2020-02-26T18:35:32","modified_gmt":"2020-02-26T15:35:32","slug":"bazi-zararli-yazilimlarin-tek-istegi-dunyanin-yanisini-izlemek","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/bazi-zararli-yazilimlarin-tek-istegi-dunyanin-yanisini-izlemek\/852\/","title":{"rendered":"Baz\u0131 Zararl\u0131 Yaz\u0131l\u0131mlar\u0131n Tek \u0130ste\u011fi D\u00fcnyan\u0131n Yan\u0131\u015f\u0131n\u0131 \u0130zlemek"},"content":{"rendered":"<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2014\/01\/06015218\/wipers_fb2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-854\" alt=\"wipers_fb2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2014\/01\/06015218\/wipers_fb2-300x300.png\" width=\"300\" height=\"300\"><\/a>Kaspersky Lab\u2019\u0131n ara\u015ft\u0131rma kolu direkt\u00f6r\u00fc Costin Raiu\u2019nun a\u00e7\u0131klamas\u0131n\u0131 \u00f6zetlemek gerekirse, zararl\u0131 dosyalar\u0131n b\u00fcy\u00fck k\u0131sm\u0131, crimeware olarak adland\u0131r\u0131lan, siber su\u00e7lular taraf\u0131ndan eri\u015fim bilgileri, verileri, kaynaklar\u0131 veya direkt para \u00e7almak i\u00e7in kazan\u00e7 amac\u0131yla bilgisayarlara y\u00fcklenen programlardan olu\u015fuyor. \u0130kinci s\u0131k g\u00f6r\u00fclen zararl\u0131 yaz\u0131l\u0131m kategorisi ise siber-casusluk ama\u00e7l\u0131 olarak \u00f6zel tasarlanan ve genellikle geli\u015fmi\u015f tehdit akt\u00f6rleri taraf\u0131ndan kamu kurumlar\u0131n\u0131, kurumsal \u015firketleri veya zengin ki\u015fileri hedef alarak kullan\u0131lanlard\u0131r. \u00dc\u00e7\u00fcnc\u00fc ve \u00e7ok daha k\u00fc\u00e7\u00fck bir kategori ise y\u0131k\u0131c\u0131 zararl\u0131 yaz\u0131l\u0131mlardan olu\u015fur ve zaman zaman silici olarak adland\u0131r\u0131l\u0131r.<!--more--><\/p>\n<p>Siliciler ilk ortaya \u00e7\u0131kt\u0131\u011f\u0131nda do\u011fas\u0131 gere\u011fi tamamen yok ediciydi. Doksanlar\u0131n sonlar\u0131na do\u011fru Internet veri saklamak i\u00e7in bug\u00fcn oldu\u011fu gibi yayg\u0131n kullan\u0131lan bir depolama alan\u0131 de\u011fildi. Buna ek olarak, organize su\u00e7lular i\u00e7in finansal veriler, o zamanlarda kolay eri\u015filebilir de\u011fildi. Bu nedenle, ilk hackerlar modern <a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">fidye yaz\u0131l\u0131mlar\u0131na <\/a>benzer \u015fekilde sabit diskleri kriptolayan veya makinadaki verilleri ba\u015fka \u015fekillerde bozan yaz\u0131l\u0131mlar tasarlard\u0131. Bu truva atlar\u0131 ile tasarlayanlar aras\u0131nda e\u011flenceli bir oyun vard\u0131. Hatta bildi\u011fim kadar\u0131yla ilk zararl\u0131 yaz\u0131l\u0131m yazarlar\u0131 i\u00e7in harekete ge\u00e7iren konu para de\u011fildi.<\/p>\n<p>Y\u0131k\u0131c\u0131, silici t\u00fcrdeki yaz\u0131l\u0131mlar hi\u00e7 bir zaman yok olmam\u0131\u015ft\u0131. Ancak s\u00f6zde \u00fclkeler aras\u0131 ve \u00fclkeler ile kurumlar aras\u0131 sald\u0131r\u0131lar\u0131n bu karanl\u0131k \u00e7a\u011f\u0131nda bir heyecanla yeniden hayat kazand\u0131lar.<\/p>\n<div class=\"pullquote\">\u201cSiliciler en iyi ihtimalle \u00fc\u00e7\u00fcnc\u00fc derece sald\u0131r\u0131lar olarak kalmaya devam ediyorlar. Bu nedenle sizin yada benim bunlar konusunda endi\u015felenmeme gerek yok\u201d diyor Costin Raiu.<\/div>\n<p>Son \u00fc\u00e7 y\u0131lda, <a href=\"http:\/\/www.securelist.com\/en\/blog\/8169\/Destructive_Malware_Five_Wipers_in_the_Spotlight\" target=\"_blank\" rel=\"noopener nofollow\">Securelist<\/a>\u2018deki arkada\u015flar\u0131m\u0131z en az be\u015f tane silici t\u00fcr\u00fcnde sald\u0131r\u0131 incelediler.<\/p>\n<p>\u0130lki, <a href=\"https:\/\/www.securelist.com\/en\/blog\/208193808\/\" target=\"_blank\" rel=\"noopener nofollow\">Wiper<\/a> ad\u0131ndayd\u0131. Wiper \u00e7ok etkindi ve vir\u00fcs bula\u015ft\u0131\u011f\u0131 d\u00fc\u015f\u00fcn\u00fclen binlerce \u0130ran bilgisayar\u0131ndan kendisini bile temizledi. Bu nedenle kimse Wiper zararl\u0131 yaz\u0131l\u0131m\u0131n\u0131n \u00f6rneklerini inceleme imkan\u0131 bulamad\u0131. Di\u011fer yok edici yaz\u0131l\u0131mlar ile kar\u015f\u0131la\u015ft\u0131r\u0131ld\u0131\u011f\u0131nda bu thedit bu tehdit daha al\u0131\u015f\u0131\u015fmad\u0131k g\u00f6z\u00fck\u00fcyordu. Wiper \u00e7ok miktarda rastgele se\u00e7ilmi\u015f makinay\u0131 hedef al\u0131yordu. Wiper\u2019\u0131n \u00e7ok \u00f6nemli olmas\u0131n\u0131n sebebi ise, onu kim ve ne ama\u00e7la dizayn ettiyse daha sonraki zararl\u0131 yaz\u0131l\u0131mlar i\u00e7in bir ilham kayna\u011f\u0131 olmas\u0131yd\u0131.<\/p>\n<p><a href=\"https:\/\/www.securelist.com\/en\/blog\/208193786\/Shamoon_the_Wiper_Copycats_at_Work\" target=\"_blank\" rel=\"noopener nofollow\">Shamoon<\/a> da asl\u0131nda gizemli Wiper zararl\u0131 yaz\u0131l\u0131m\u0131n\u0131n soyundan geliyor. Bu y\u0131k\u0131c\u0131 soy, a\u011flar \u00fczerinde kendine yollar bularak belki de d\u00fcnyan\u0131n en de\u011ferli \u015firketi ve kesinlikle en b\u00fcy\u00fck petrol \u00fcreticisi olan Suudi Aramco\u2019ya ula\u015ft\u0131. Shomoon 2012 y\u0131l\u0131n\u0131n A\u011fustos ay\u0131nda Suudi Arap Petrol \u015e\u0130rketinde h\u0131zl\u0131 bir \u00e7al\u0131\u015fma ile 30.000\u2019den fazla kurumsal i\u015f istasyonunu \u00e7al\u0131\u015fmaz hale getirdi. Baz\u0131lar\u0131 bu zararl\u0131 yaz\u0131l\u0131m\u0131n \u0130ran taraf\u0131ndan geldi\u011fini hatta bir hacker grubunun sald\u0131r\u0131y\u0131 \u00fcstlendi\u011fi gibi iddalarda bulundu. Shamoon daha \u00f6nce Wiper\u2019\u0131n yapt\u0131\u011f\u0131 gibi kendisini silme konusunda ba\u015far\u0131l\u0131 olamad\u0131. Ara\u015ft\u0131rmac\u0131lar Shamoon\u2019u incelemeye ba\u015flad\u0131klar\u0131nda, yaz\u0131l\u0131m\u0131n basit ama etkin y\u00f6ntemler kullanarak sald\u0131r\u0131 d\u00fczenledi\u011fini farkettiler.<\/p>\n<p>Ard\u0131ndan <a href=\"https:\/\/www.securelist.com\/en\/blog?weblogid=208193954\" target=\"_blank\" rel=\"noopener nofollow\">Narilam<\/a> geldi. Bu yaz\u0131l\u0131m \u00f6zellikle \u0130ran\u2019da kullan\u0131lan baz\u0131 finansal uygulamalar\u0131n veritabanlar\u0131n\u0131 hedef ald\u0131\u011f\u0131 g\u00f6zlemlendi. Narilam di\u011ferlerinden biraz daha farkl\u0131yd\u0131 ve yava\u015f hareket ediyordu. Daha uzun vadeli bir sabotaj i\u00e7in tasarlanm\u0131\u015ft\u0131. Kaspersky Lab, Narilam\u2019\u0131n bir ka\u00e7 de\u011fi\u015fik s\u00fcr\u00fcm\u00fcn\u00fc ortaya \u00e7\u0131kard\u0131. Baz\u0131lar\u0131n\u0131n tarihi 2008 y\u0131l\u0131na kadar geri gidiyordu. Narilam ve onun gibi yava\u015f hareket eden tehditler, uzun vadede \u00e7ok daha y\u0131k\u0131c\u0131 etkilere sebep olabilirler.<\/p>\n<p>Ayr\u0131ca birde <a href=\"https:\/\/www.securelist.com\/en\/blog\/208194052\/GrooveMonitor_Another_Wiper_Copycat\" target=\"_blank\" rel=\"noopener nofollow\">Groovemonitor<\/a> (di\u011fer ad\u0131yla Maya) zararl\u0131 yaz\u0131l\u0131m\u0131 vard\u0131. \u0130ran\u2019\u0131n bilgisayar acil durum kar\u015f\u0131l\u0131k benzeri ekibi Maher\u2019i ilk kez 2012 y\u0131l\u0131nda raporlad\u0131. Bu olduk\u00e7a basit bir tehditti. Kurbanlar\u0131n makinelerine bir ne\u015fter edas\u0131yla yakla\u015fmak yerine bir polis copu gibi sald\u0131r\u0131yordu. Groovemonitor iki tarih aras\u0131ndaki bir periyoda \u00f6nceden ayarlanm\u0131\u015ft\u0131. Bu tarihler aras\u0131nda t\u00fcm makinalar\u0131n D s\u00fcr\u00fcc\u00fcs\u00fcndeki t\u00fcm dosyalar\u0131 silmeye \u00e7al\u0131\u015ft\u0131. En yeni tehdit olan <a href=\"https:\/\/www.securelist.com\/en\/blog\/208194183\/South_Korean_Whois_Team_attacks\" target=\"_blank\" rel=\"noopener nofollow\">Dark Seoul<\/a>, K\u00fczey Kore\u2019nin Seul \u015fehrindeki pek \u00e7ok banka ve yay\u0131n kurulu\u015funu hedef alan koordine bir sald\u0131r\u0131 ger\u00e7ekle\u015ftirmek i\u00e7in kullan\u0131ld\u0131. Bu sald\u0131r\u0131n\u0131n di\u011ferlerinden farkl\u0131yd\u0131 \u00e7\u00fcnk\u00fc \u0130ran veya Suudi Arabistan gibi k\u00f6rfez \u00fclkeleri hedef al\u0131nmam\u0131\u015ft\u0131. Ayr\u0131ca sald\u0131rganlar el alt\u0131ndan bir sabotaj yerine bariz bir \u015fekilde kendilerini ortaya \u00e7\u0131karmaktan \u00e7ekinmediler.<\/p>\n<p>Raiu Securelist raporunda,\u201dBir tu\u015fa basarak veya fareye t\u0131klayarak onbinlerce bilgisayar\u0131 silmek, t\u00fcm siber ordular i\u00e7in bir g\u00fc\u00e7 g\u00f6sterisidir. Bu sald\u0131r\u0131 bir \u00fclkenin altyap\u0131s\u0131na d\u00fczenlendi\u011finde ger\u00e7ek hayatta \u00e7ok daha y\u0131k\u0131c\u0131 sonu\u00e7lar ortaya \u00e7\u0131karabilir.\u201d diye belirtiyor.<\/p>\n<p>\u201cEn iyisi silicilerin \u00fc\u00e7\u00fcnc\u00fc derecede kalmas\u0131, b\u00f6ylece ne siz ne de ben onlarla ilgili bir endi\u015fe duymak zorunda kalmam. Netice olarak, Internet kullan\u0131c\u0131lar\u0131n\u0131n end\u00fcstriyel kontrol sistemlerini (enerji a\u011flar\u0131n\u0131, \u00fcretimi kontrol eden donan\u0131m ve yaz\u0131l\u0131mlar\u0131 vs. ) veya y\u00f6netim kontrol ve ve i\u015fleme sistemlerini silebilecek zararl\u0131 yaz\u0131l\u0131m par\u00e7alar\u0131na kar\u015f\u0131 su ve enerji kaynaklar\u0131n\u0131 korumalar\u0131n\u0131 sa\u011flayacak bir b\u00fct\u00fcn bir set bulunmuyor. Bu tehditler \u00f6zel olarak uzman g\u00fcvenlik \u015firketleri, kritik altyap\u0131 y\u00fcklencileri ve en \u00f6nemlisi devlet kurumlar\u0131 taraf\u0131ndan izlenerek hafifletilmeli\u201d diyor Costin Raiu.<\/p>\n<p>\u0130yi haber \u015fu ki \u2013 en az\u0131ndan ABD ve onun yak\u0131n m\u00fcttefikleri i\u00e7in \u2013 ABD Kongresi yak\u0131nda pop\u00fcler, parti ba\u011f\u0131ms\u0131z \u00f6zel sekt\u00f6r destekli <a href=\"https:\/\/threatpost.com\/critical-infrastructure-protection-bill-passed-in-committee\/103804\" target=\"_blank\" rel=\"noopener nofollow\">2013 Ulusal Siberg\u00fcvenlik ve Kritik Altyap\u0131 Korumas\u0131 Antla\u015fmas\u0131n\u0131<\/a> oylayacak. Bu yasa tasar\u0131s\u0131 h\u00fck\u00fcmet ve kritik altyap\u0131lar\u0131 y\u00f6neten \u015firketler aras\u0131nda tehdit payla\u015f\u0131m\u0131n\u0131 geli\u015ftirmek i\u00e7in tasarland\u0131. Benzer \u00e7al\u0131\u015fmalar ve y\u00f6netmelikler d\u00fcnyan\u0131n di\u011fer baz\u0131 \u00fclkelerinde de s\u00fcr\u00fcyor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab\u2019\u0131n ara\u015ft\u0131rma kolu direkt\u00f6r\u00fc Costin Raiu\u2019nun a\u00e7\u0131klamas\u0131n\u0131 \u00f6zetlemek gerekirse, zararl\u0131 dosyalar\u0131n b\u00fcy\u00fck k\u0131sm\u0131, crimeware olarak adland\u0131r\u0131lan, siber su\u00e7lular taraf\u0131ndan eri\u015fim bilgileri, verileri, kaynaklar\u0131 veya direkt para \u00e7almak i\u00e7in kazan\u00e7<\/p>\n","protected":false},"author":350,"featured_media":855,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1287,1351],"tags":[510,509,511],"class_list":{"0":"post-852","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-siber-suclular","10":"tag-siliciler","11":"tag-zararli-yazilimlar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/bazi-zararli-yazilimlarin-tek-istegi-dunyanin-yanisini-izlemek\/852\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/siber-suclular\/","name":"siber su\u00e7lular"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/350"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=852"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/852\/revisions"}],"predecessor-version":[{"id":7730,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/852\/revisions\/7730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/855"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}