{"id":8856,"date":"2020-09-28T13:55:07","date_gmt":"2020-09-28T10:55:07","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8856"},"modified":"2020-09-28T13:55:07","modified_gmt":"2020-09-28T10:55:07","slug":"delayed-phishing-countermeasures","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/delayed-phishing-countermeasures\/8856\/","title":{"rendered":"Gecikmeli kimlik av\u0131yla nas\u0131l m\u00fccadele edilir"},"content":{"rendered":"<p>Kimlik av\u0131, uzun s\u00fcredir kurumsal a\u011flardaki \u00f6nemli bir sald\u0131r\u0131 y\u00f6n\u00fc oldu. E-posta sa\u011flay\u0131c\u0131lar\u0131ndan posta a\u011f ge\u00e7itlerine ve hatta taray\u0131c\u0131lara kadar herkesin ve her \u015feyin kimlik av\u0131n\u0131 \u00f6nlemeye y\u00f6nelik filtreleri ve k\u00f6t\u00fc niyetli adres taray\u0131c\u0131lar\u0131n\u0131 kullanmas\u0131 \u00e7ok da \u015fa\u015f\u0131lacak bir durum de\u011fil. Bu nedenle siber su\u00e7lular s\u00fcrekli bunlar\u0131 atlatman\u0131n yeni yollar\u0131n\u0131 bulmaya \u00e7al\u0131\u015f\u0131yor ve eski yollar\u0131 ileri g\u00f6t\u00fcrecek y\u00f6ntemler geli\u015ftiriyor. Bu y\u00f6ntemlerden biri, gecikmeli kimlik av\u0131d\u0131r.<\/p>\n<h2>Gecikmeli kimlik av\u0131 nedir?<\/h2>\n<p>Gecikmeli kimlik av\u0131, Post-Delivery Weaponized URL olarak da bilinen bir tekni\u011fi kullanarak kurban\u0131 k\u00f6t\u00fc niyetli veya sahte bir siteye \u00e7ekme giri\u015fimidir. Ad\u0131ndan da anla\u015f\u0131laca\u011f\u0131 gibi teknik esas olarak \u00e7evrimi\u00e7i bir i\u00e7eri\u011fi, ona verilen ba\u011flant\u0131n\u0131n yer ald\u0131\u011f\u0131 bir e-postan\u0131n, al\u0131c\u0131ya g\u00f6nderilmesinden sonra k\u00f6t\u00fc ama\u00e7l\u0131 bir s\u00fcr\u00fcmle de\u011fi\u015ftirilmesidir. Ba\u015fka bir deyi\u015fle potansiyel kurban, hi\u00e7bir yere gitmeyen ya da zaten tehlikeli olan ancak o anda k\u00f6t\u00fc ama\u00e7l\u0131 bir i\u00e7erik bulunmayan ge\u00e7erli bir kayna\u011fa verilen bir ba\u011flant\u0131n\u0131n oldu\u011fu bir e-posta al\u0131r. Sonu\u00e7 olarak e-posta, bunu \u00f6nleyebilecek bir filtreden sorunsuz ge\u00e7er. Koruma algoritmalar\u0131 metindeki adresi bulur, ba\u011flant\u0131 verilen siteyi tarar, tehlikeli hi\u00e7bir \u015fey bulamaz ve e-postan\u0131n ge\u00e7i\u015fine izin verir.<\/p>\n<p>E-postan\u0131n iletiminden sonraki bir a\u015famada (her zaman e-posta teslim edildikten sonra ve ideal olarak okunmadan \u00f6nce), siber su\u00e7lular e-postadaki ba\u011flant\u0131da yer alan siteyi de\u011fi\u015ftirir veya \u00f6nceden zarars\u0131z olan bir sayfadaki k\u00f6t\u00fc ama\u00e7l\u0131 i\u00e7eri\u011fi etkinle\u015ftirir. Bu numara, taklit bir bankac\u0131l\u0131k sitesinden kurban\u0131n bilgisayar\u0131na k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m b\u0131rakmaya \u00e7al\u0131\u015fan bir taray\u0131c\u0131 istismar\u0131na kadar her \u015fey olabilir. Ancak vakalar\u0131n yakla\u015f\u0131k y\u00fczde 80\u2019inde bu, bir kimlik av\u0131 sitesidir.<\/p>\n<h2>Kimlik av\u0131n\u0131 \u00f6nleme algoritmalar\u0131n\u0131 nas\u0131l kand\u0131r\u0131r?<\/h2>\n<p>Siber su\u00e7lular, e-postalar\u0131 filtrelerden ge\u00e7irmek i\u00e7in \u00fc\u00e7 yoldan birini kullan\u0131r.<\/p>\n<ul>\n<li><strong>Basit bir ba\u011flant\u0131n\u0131n kullan\u0131lmas\u0131.<\/strong> Bu t\u00fcr sald\u0131r\u0131larda failler ya s\u0131f\u0131rdan olu\u015fturduklar\u0131 ya da hackleyip ele ge\u00e7irildikleri hedef siteyi kontrol ederler. Siber su\u00e7lular, g\u00fcvenlik algoritmalar\u0131 gibi, olumlu bir alg\u0131ya sahip olma e\u011filiminde olan ikincisini tercih ederler. E-posta iletildi\u011fi s\u0131rada ba\u011flant\u0131 ya anlams\u0131z bir yere ya da (daha yayg\u0131n olarak) 404 hata mesaj\u0131 i\u00e7eren bir sayfaya gider.<\/li>\n<li><strong>K\u0131sa ba\u011flant\u0131n\u0131n h\u0131zl\u0131ca de\u011fi\u015ftirilmesi.<\/strong> Bir\u00e7ok \u00e7evrimi\u00e7i ara\u00e7, birinin uzun bir ba\u011flant\u0131y\u0131 k\u0131sa bir ba\u011flant\u0131ya d\u00f6n\u00fc\u015ft\u00fcrmesini sa\u011flar. K\u0131sa ba\u011flant\u0131lar, kullan\u0131c\u0131lar\u0131n hayat\u0131n\u0131 kolayla\u015ft\u0131r\u0131r; pratikte k\u0131sa, hat\u0131rlamas\u0131 kolay bir ba\u011flant\u0131 uzun bir ba\u011flant\u0131ya d\u00f6n\u00fc\u015f\u00fcr. Ba\u015fka bir deyi\u015fle, basit bir y\u00f6nlendirmeyi tetikler. Baz\u0131 hizmetlerle, k\u0131sa bir ba\u011flant\u0131n\u0131n arkas\u0131na gizlenmi\u015f i\u00e7eri\u011fi de\u011fi\u015ftirebilirsiniz, bu bo\u015fluk sald\u0131rganlar taraf\u0131ndan suistimal edilir. E-postan\u0131n iletilmesi s\u0131ras\u0131nda, adres ge\u00e7erli bir siteyi g\u00f6sterir, ancak bir s\u00fcre sonra, k\u00f6t\u00fc ama\u00e7l\u0131 bir siteyle de\u011fi\u015ftirilir.<\/li>\n<li><strong>Rastgele ve k\u0131sa bir ba\u011flant\u0131n\u0131n dahil edilmesi.<\/strong> Baz\u0131 ba\u011flant\u0131 k\u0131saltma ara\u00e7lar\u0131, olas\u0131l\u0131\u011fa dayal\u0131 yeniden y\u00f6nlendirmeye izin verir. Di\u011fer bir deyi\u015fle, ba\u011flant\u0131n\u0131n google.com\u2019a y\u00f6nlendirme \u015fans\u0131 veya kimlik av\u0131 sitesi a\u00e7ma \u015fans\u0131 y\u00fczde 50-50\u2019dir. G\u00f6r\u00fcn\u00fc\u015fe g\u00f6re, ba\u011flant\u0131n\u0131n ge\u00e7erli bir siteye gitme olas\u0131l\u0131\u011f\u0131, gezginlerin (otomatik bilgi toplama yaz\u0131l\u0131mlar\u0131) kafas\u0131n\u0131 kar\u0131\u015ft\u0131rabilir.<\/li>\n<\/ul>\n<h2>Ba\u011flant\u0131lar ne zaman k\u00f6t\u00fc ama\u00e7l\u0131 hale gelir?<\/h2>\n<p>Sald\u0131rganlar genellikle, kurbanlar\u0131n\u0131n geceleri uyuyan normal bir \u00e7al\u0131\u015fan oldu\u011fu varsay\u0131m\u0131yla hareket ederler. Bu nedenle, gecikmeli kimlik av\u0131 e-postalar\u0131 gece yar\u0131s\u0131ndan sonra (kurban\u0131n saat dilimine g\u00f6re) g\u00f6nderilir ve birka\u00e7 saat sonra, sabah olmas\u0131na yak\u0131n k\u00f6t\u00fc ama\u00e7l\u0131 hale gelir. Kimlik av\u0131n\u0131 \u00f6nleme tetikleyicilerinin istatistiklerine bakt\u0131\u011f\u0131m\u0131zda, kahve ba\u011f\u0131ml\u0131s\u0131 kullan\u0131c\u0131lar taraf\u0131ndan, g\u00f6nderildi\u011finde zarars\u0131z olan ancak art\u0131k k\u00f6t\u00fc ama\u00e7l\u0131 hale gelmi\u015f ba\u011flant\u0131lara t\u0131klanmas\u0131n\u0131n sabah 7-10 civar\u0131nda zirve yapt\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcyoruz.<\/p>\n<p>Hedefli kimlik av\u0131nda da uyumay\u0131n. Siber su\u00e7lular sald\u0131racak belirli bir ki\u015fi bulduklar\u0131nda, kurbanlar\u0131n\u0131n g\u00fcnl\u00fck rutinini inceleyebilir ve o ki\u015finin e-postas\u0131n\u0131 ne zaman kontrol etti\u011fine ba\u011fl\u0131 olarak k\u00f6t\u00fc ama\u00e7l\u0131 ba\u011flant\u0131y\u0131 etkinle\u015ftirebilirler.<\/p>\n<h2>Gecikmeli kimlik av\u0131 nas\u0131l tespit edilir<\/h2>\n<p>\u0130deal olarak, kimlik av\u0131 ba\u011flant\u0131s\u0131n\u0131n kullan\u0131c\u0131ya iletilmesini \u00f6nlememiz gerekir, bu nedenle gelen kutusunu yeniden taramak en iyi strateji gibi g\u00f6r\u00fcnecektir. Baz\u0131 durumlarda bu yap\u0131labilir: \u00f6rne\u011fin, i\u015fletmeniz bir Microsoft Exchange posta sunucusu kullan\u0131yorsa.<\/p>\n<p>Bu Eyl\u00fcl ay\u0131 itibar\u0131yla Kaspersky Security for Microsoft Exchange Server, e-posta kutular\u0131nda bulunan mesajlar\u0131n yeniden taranmas\u0131na izin veren yerel API arac\u0131l\u0131\u011f\u0131yla e-posta sunucusu entegrasyonunu desteklemektedir. Uygun \u015fekilde yap\u0131land\u0131r\u0131lm\u0131\u015f bir tarama s\u00fcresi, en yo\u011fun zaman\u0131nda sunucuda ek bir y\u00fck olu\u015fturmadan gecikmeli kimlik av\u0131 giri\u015fimlerinin alg\u0131lanmas\u0131n\u0131 sa\u011flar.<\/p>\n<p>\u00c7\u00f6z\u00fcm\u00fcm\u00fcz ayr\u0131ca dahili e-postay\u0131 (e-posta g\u00fcvenli\u011fi a\u011f ge\u00e7idinden ge\u00e7meyen ve dolay\u0131s\u0131yla filtreleri ve tarama motorlar\u0131 taraf\u0131ndan g\u00f6r\u00fclmeyen) izlemenize ve daha karma\u015f\u0131k i\u00e7erik filtreleme kurallar\u0131 uygulaman\u0131za olanak tan\u0131r. Hackerlar\u0131n kurumsal bir e-posta hesab\u0131na eri\u015fim sa\u011flad\u0131klar\u0131, \u00f6zellikle tehlikeli kurumsal e-posta gizlili\u011fi ihlali (BEC) vakalar\u0131nda, e-posta kutular\u0131n\u0131n i\u00e7eri\u011fini yeniden tarama ve dahili yaz\u0131\u015fmalar\u0131 kontrol etme yetene\u011fi \u00f6zel bir \u00f6nem kazan\u0131r.<\/p>\n<p>Kaspersky Security for Microsoft Exchange Server, Kaspersky Security for Mail Servers ve <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Total Security for Business<\/a> \u00e7\u00f6z\u00fcmlerimizde yer almaktad\u0131r.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>\u015eirket \u00e7al\u0131\u015fanlar\u0131na g\u00f6nderilen e-postalardaki kimlik av\u0131 ba\u011flant\u0131lar\u0131 genellikle ilk taramadan sonra etkin hale gelir. Ama yine de yakalanabilirler ve yakalanmalar\u0131 gerekir. <\/p>\n","protected":false},"author":2569,"featured_media":8857,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1921,1074],"class_list":{"0":"post-8856","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-e-posta","10":"tag-kimlik-avi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/delayed-phishing-countermeasures\/8856\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/delayed-phishing-countermeasures\/21929\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/delayed-phishing-countermeasures\/17405\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/delayed-phishing-countermeasures\/23350\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/delayed-phishing-countermeasures\/21545\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/delayed-phishing-countermeasures\/20159\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/delayed-phishing-countermeasures\/23932\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/delayed-phishing-countermeasures\/22899\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/delayed-phishing-countermeasures\/29129\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/delayed-phishing-countermeasures\/37153\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/delayed-phishing-countermeasures\/15717\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/delayed-phishing-countermeasures\/16104\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/delayed-phishing-countermeasures\/13996\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/delayed-phishing-countermeasures\/25217\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/delayed-phishing-countermeasures\/12006\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/delayed-phishing-countermeasures\/26130\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/delayed-phishing-countermeasures\/22906\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/delayed-phishing-countermeasures\/28223\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/delayed-phishing-countermeasures\/28056\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2569"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8856"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8856\/revisions"}],"predecessor-version":[{"id":8858,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8856\/revisions\/8858"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8857"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}