{"id":8994,"date":"2020-11-04T19:01:18","date_gmt":"2020-11-04T16:01:18","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=8994"},"modified":"2020-11-04T19:01:18","modified_gmt":"2020-11-04T16:01:18","slug":"phishing-via-esp","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-via-esp\/8994\/","title":{"rendered":"E-posta pazarlama hizmetleri arac\u0131l\u0131\u011f\u0131yla kimlik av\u0131"},"content":{"rendered":"<p>Doland\u0131r\u0131c\u0131lar, kimlik av\u0131n\u0131 \u00f6nleme teknolojilerini atlamak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/delayed-phishing-countermeasures\/8856\/\" target=\"_blank\" rel=\"noopener\">y\u0131llar boyunca \u00e7e\u015fitli numaralar kulland\u0131lar<\/a>. Kimlik av\u0131 ba\u011flant\u0131lar\u0131n\u0131 hedeflere ula\u015ft\u0131rmak i\u00e7in y\u00fcksek ba\u015far\u0131 oran\u0131na sahip planlar\u0131ndan biri de, mesaj g\u00f6ndermek i\u00e7in e-posta hizmet sa\u011flay\u0131c\u0131lar\u0131 (ESP\u2019ler) olarak da bilinen e-posta pazarlama hizmetlerini (e-posta ile b\u00fclten iletme konusunda uzmanla\u015fm\u0131\u015f \u015firketler) kullanmak. \u00c7\u00f6z\u00fcmlerimizden elde etti\u011fimiz istatistiklere g\u00f6re bu y\u00f6ntem giderek ivme kazan\u0131yor.<\/p>\n<h2>ESP tabanl\u0131 kimlik av\u0131 neden i\u015fe yar\u0131yor?<\/h2>\n<p>E-posta tehditleri konusunu ciddiye alan \u015firketler, iletilerin kullan\u0131c\u0131lar\u0131n gelen kutular\u0131na ula\u015fmas\u0131na izin vermeden \u00f6nce t\u00fcm e-postalar\u0131 antivir\u00fcs, kimlik av\u0131 \u00f6nleme ve spam \u00f6nleme motorlar\u0131yla iyice tarar. Motorlar yaln\u0131zca mesaj i\u00e7eri\u011fini, ba\u015fl\u0131klar\u0131 ve ba\u011flant\u0131lar\u0131 taramakla kalmaz, ayn\u0131 zamanda g\u00f6nderenin ve ba\u011flant\u0131l\u0131 internet sitelerinin itibar\u0131n\u0131 da kontrol eder. Risk kararlar\u0131, bu fakt\u00f6rlerin bir kombinasyonuna dayanarak verilir. \u00d6rne\u011fin, bilinmeyen bir g\u00f6nderenden gelen toplu postalar \u015f\u00fcphelidir ve g\u00fcvenlik algoritmalar\u0131 i\u00e7in tehlike \u00e7anlar\u0131n\u0131 \u00e7ald\u0131r\u0131r.<\/p>\n<p>Ancak sald\u0131rganlar buna da bir \u00e7\u00f6z\u00fcm buldular: E-postalar\u0131 g\u00fcvenilen bir varl\u0131k ad\u0131na g\u00f6nderiyorlar. U\u00e7tan uca e-posta b\u00fclteni y\u00f6netimi sa\u011flayan e-posta pazarlama hizmetleri, bu rol i\u00e7in bi\u00e7ilmi\u015f kaftan. Bu hizmetler tan\u0131n\u0131yor; bir\u00e7ok g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc sat\u0131c\u0131s\u0131, IP adreslerine varsay\u0131lan olarak izin veriyor; hatta baz\u0131lar\u0131 bu hizmetlerden g\u00f6nderilen e-postalar\u0131n kontrollerini atl\u0131yor.<\/p>\n<h2>ESP\u2019ler nas\u0131l k\u00f6t\u00fcye kullan\u0131l\u0131yor?<\/h2>\n<p>Ana sald\u0131r\u0131 vekt\u00f6r\u00fc a\u00e7\u0131k: Me\u015fru bir e-posta g\u00f6r\u00fcn\u00fcm\u00fcnde kimlik av\u0131. Siber su\u00e7lular, genellikle en d\u00fc\u015f\u00fck abonelik paketini sat\u0131n alarak hedef hizmetin m\u00fc\u015fterisi haline geliyorlar (\u00f6zellikle h\u0131zl\u0131 bir \u015fekilde tespit edilip engellenebilecekleri d\u00fc\u015f\u00fcn\u00fcld\u00fc\u011f\u00fcnde, daha y\u00fcksek bir abonelik paketi sat\u0131n almalar\u0131 mant\u0131ks\u0131z).<\/p>\n<p>Ancak daha egzotik bir se\u00e7enek daha var: ESP\u2019yi bir URL ana bilgisayar\u0131 olarak kullanmak. Bu planda e-posta b\u00fclteni sald\u0131rganlar\u0131n kendi altyap\u0131s\u0131 \u00fczerinden g\u00f6nderiliyor. \u00d6rne\u011fin, siber su\u00e7lular bir kimlik av\u0131 URL\u2019i i\u00e7eren bir test kampanyas\u0131 olu\u015fturup bunu \u00f6nizleme olarak kendilerine g\u00f6nderebiliyorlar. ESP bu URL i\u00e7in bir proxy olu\u015fturuyor; ard\u0131ndan siber su\u00e7lular kimlik av\u0131 b\u00fcltenleri i\u00e7in proxy URL\u2019ini al\u0131yorlar. Doland\u0131r\u0131c\u0131lar i\u00e7in ba\u015fka bir se\u00e7enek de e-posta \u015fablonu gibi g\u00f6r\u00fcnen bir kimlik av\u0131 sitesi olu\u015fturup do\u011frudan bu siteye bir ba\u011flant\u0131 vermek. Ama bu daha seyrek g\u00f6r\u00fcl\u00fcyor.<\/p>\n<p>Her iki durumda da, yeni proxy URL\u2019i art\u0131k olumlu bir itibara sahip oldu\u011fu i\u00e7in engellenmiyor; postayla ilgilenmeyen ESP de yanl\u0131\u015f bir \u015fey g\u00f6rm\u00fcyor ve \u201cm\u00fc\u015fterisini\u201d engellemiyor. Ta ki \u015fikayet almaya ba\u015flay\u0131ncaya kadar\u2026 Bazen bu t\u00fcr planlar hedef odakl\u0131 kimlik avlar\u0131nda bile kullan\u0131labiliyor.<\/p>\n<h2>ESP\u2019ler ne d\u00fc\u015f\u00fcn\u00fcyor?<\/h2>\n<p>Beklendi\u011fi \u00fczere ESP\u2019ler siber su\u00e7lular i\u00e7in ara\u00e7 olma konusunda hi\u00e7 de hevesli de\u011fil. \u00c7o\u011fu, sunucular\u0131ndan ge\u00e7en ileti i\u00e7eri\u011fini ve ba\u011flant\u0131lar\u0131 tarayan kendi g\u00fcvenlik teknolojilerine sahip ve neredeyse t\u00fcm\u00fc, kimlik av\u0131 ile kar\u015f\u0131la\u015fan herkese internet siteleri arac\u0131l\u0131\u011f\u0131yla rehberlik sa\u011fl\u0131yor.<\/p>\n<p>Bu nedenle sald\u0131rganlar, ESP\u2019leri de alarma ge\u00e7irmemeye \u00e7al\u0131\u015f\u0131yor. \u00d6rne\u011fin, proxy\u2019ler i\u00e7in bir sa\u011flay\u0131c\u0131 kullanmak, kimlik av\u0131 ba\u011flant\u0131lar\u0131n\u0131 <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/delayed-phishing-countermeasures\/8856\/\" target=\"_blank\" rel=\"noopener\">geciktirme<\/a> e\u011filimindedir; bu nedenle olu\u015fturma s\u0131ras\u0131nda test iletilerindeki ba\u011flant\u0131lar me\u015fru g\u00f6r\u00fcn\u00fcr, ancak daha sonra k\u00f6t\u00fc ama\u00e7l\u0131 hale gelirler.<\/p>\n<h2>Ne yap\u0131lmal\u0131?<\/h2>\n<p>Toplu postalar \u00e7o\u011funlukla adresleri herkese a\u00e7\u0131k olan \u015firket \u00e7al\u0131\u015fanlar\u0131na g\u00f6nderilir. En dikkatli olanlar\u0131m\u0131z bile ara s\u0131ra \u015f\u00fcpheli veya k\u00f6t\u00fc ama\u00e7l\u0131 bir e-postay\u0131 g\u00f6zden ka\u00e7\u0131r\u0131p t\u0131klamamam\u0131z gereken bir \u015feye t\u0131klayabilir. \u00c7al\u0131\u015fanlar\u0131 e-posta pazarlama hizmetinden gelebilecek olas\u0131 kimlik av\u0131 sald\u0131r\u0131lar\u0131na kar\u015f\u0131 korumak i\u00e7in a\u015fa\u011f\u0131dakileri \u00f6neriyoruz:<\/p>\n<ul>\n<li>\u00c7al\u0131\u015fanlara, s\u00f6z konusu \u00f6zel posta listesine abone olmad\u0131klar\u0131 s\u00fcrece \u201ctoplu posta\u201d olarak i\u015faretlenmi\u015f e-postalar\u0131 asla a\u00e7mamalar\u0131n\u0131 s\u00f6yleyin. Bu t\u00fcr mesajlar\u0131n acil bir \u00f6neme sahip olma olas\u0131l\u0131\u011f\u0131 d\u00fc\u015f\u00fckt\u00fcr; genellikle en iyi ihtimalle istenmeyen reklamlard\u0131r.<\/li>\n<li>Sezgisel algoritmalar kullanarak t\u00fcm gelen e-postalar\u0131 kapsaml\u0131 bir \u015fekilde tarayan sa\u011flam g\u00fcvenlik \u00e7\u00f6z\u00fcmleri kullan\u0131n.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/microsoft-office-365-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener\">Kaspersky Security for Microsoft Office 365<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Total Security for Business<\/a>\u2018\u0131n bir par\u00e7as\u0131 olan Kaspersky Security for Mail Server, \u00e7\u00f6z\u00fcmlerimiz aras\u0131nda yer al\u0131yor. Kullan\u0131c\u0131lar\u0131 bu tehdide kar\u015f\u0131 g\u00fcvenilir bir \u015fekilde koruyorlar.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>K\u00f6t\u00fc niyetli ki\u015filer, kimlik av\u0131n\u0131 \u00f6nleme teknolojilerini atlatmak i\u00e7in yasal e-posta hizmeti sa\u011flay\u0131c\u0131lar\u0131n\u0131 veya ESP&#8217;leri (e-posta hizmet sa\u011flay\u0131c\u0131lar\u0131) kullansa da tehlikeli e-postalar durdurulabilir.<\/p>\n","protected":false},"author":2598,"featured_media":8995,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1002,1074,240],"class_list":{"0":"post-8994","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-e-mail","10":"tag-kimlik-avi","11":"tag-spam"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/phishing-via-esp\/8994\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/phishing-via-esp\/22048\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/phishing-via-esp\/17526\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/phishing-via-esp\/23548\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/phishing-via-esp\/21707\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/phishing-via-esp\/20400\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/phishing-via-esp\/24146\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/phishing-via-esp\/23170\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/phishing-via-esp\/29348\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/phishing-via-esp\/37467\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/phishing-via-esp\/15876\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/phishing-via-esp\/16315\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/phishing-via-esp\/14115\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/phishing-via-esp\/25636\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/phishing-via-esp\/12150\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/phishing-via-esp\/26285\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/phishing-via-esp\/23034\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/phishing-via-esp\/28356\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/phishing-via-esp\/28178\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=8994"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8994\/revisions"}],"predecessor-version":[{"id":8996,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/8994\/revisions\/8996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/8995"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=8994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=8994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=8994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}