{"id":9019,"date":"2020-11-12T17:07:29","date_gmt":"2020-11-12T14:07:29","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9019"},"modified":"2020-11-12T17:07:29","modified_gmt":"2020-11-12T14:07:29","slug":"ransomware-incidents-2020","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-incidents-2020\/9019\/","title":{"rendered":"2020 Fidye Yaz\u0131l\u0131mlar\u0131"},"content":{"rendered":"<p>Fidye yaz\u0131l\u0131mlar\u0131, ortaya \u00e7\u0131kt\u0131klar\u0131 ilk g\u00fcnden bu yana, merakl\u0131 m\u00fcnferit ki\u015filerce yarat\u0131lan par\u00e7a par\u00e7a ara\u00e7lardan, yarat\u0131c\u0131lar\u0131na b\u00fcy\u00fck kazan\u00e7 sa\u011flayan g\u00fc\u00e7l\u00fc bir yeralt\u0131 end\u00fcstrisine d\u00f6n\u00fc\u015ft\u00fc. Dahas\u0131, bu karanl\u0131k d\u00fcnyaya giri\u015f maliyeti de giderek d\u00fc\u015f\u00fcyor.<\/p>\n<p>G\u00fcn\u00fcm\u00fczde, olas\u0131 siber su\u00e7lular\u0131n art\u0131k kendi k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n\u0131 olu\u015fturmalar\u0131, hatta dark web\u2019den sat\u0131n almalar\u0131 bile gerekmiyor. Tek ihtiya\u00e7lar\u0131, bir RaaS (Hizmet olarak Fidye Yaz\u0131l\u0131m\u0131) bulut platformuna eri\u015fmek. Da\u011f\u0131t\u0131m\u0131 kolay ve programlama becerisi gerektirmeyen bu t\u00fcr hizmetler, hemen hemen herkesin fidye yaz\u0131l\u0131m\u0131 ara\u00e7lar\u0131n\u0131 kullanmas\u0131na olanak tan\u0131yor; bu da do\u011fal olarak fidye yaz\u0131l\u0131m\u0131 i\u00e7eren siber olaylar\u0131n artmas\u0131na yol a\u00e7\u0131yor.<\/p>\n<p>Son zamanlarda endi\u015fe verici bir ba\u015fka e\u011filim de, basit bir fidye yaz\u0131l\u0131m\u0131 modelinden verileri \u015fifrelemeden \u00f6nce \u00e7alan birle\u015fik sald\u0131r\u0131lara ge\u00e7i\u015f. Bu t\u00fcr durumlarda, \u00f6deme yap\u0131lmamas\u0131 bilginin yok edilmesine de\u011fil, a\u00e7\u0131k kaynaklarda yay\u0131nlanmas\u0131na veya (kapal\u0131) a\u00e7\u0131k art\u0131rmalarda sat\u0131lmas\u0131na yol a\u00e7\u0131yor. 2020 yaz\u0131nda ger\u00e7ekle\u015fen b\u00f6yle bir a\u00e7\u0131k art\u0131rmada, REvil fidye yaz\u0131l\u0131m\u0131 kullan\u0131larak \u00e7al\u0131nan tar\u0131m \u015firketi veritabanlar\u0131 55.000 USD\u2019lik bir ba\u015flang\u0131\u00e7 fiyat\u0131 ile <a href=\"https:\/\/krebsonsecurity.com\/2020\/06\/revil-ransomware-gang-starts-auctioning-victim-data\/#more-51868\" target=\"_blank\" rel=\"noopener nofollow\">sat\u0131\u015fa sunuldu<\/a>.<\/p>\n<p>Ne yaz\u0131k ki, bir\u00e7ok fidye yaz\u0131l\u0131m\u0131 kurban\u0131, verilerini geri alaca\u011f\u0131n\u0131n garantisi olmad\u0131\u011f\u0131n\u0131 bilmesine ra\u011fmen \u00f6deme yapmaya mecbur hissediyor. Bunun nedeni, bilgisayar korsanlar\u0131n\u0131n \u00e7al\u0131\u015fmama s\u00fcresi a\u00e7\u0131s\u0131ndan d\u00fc\u015f\u00fck toleransa sahip \u015firketleri ve kurulu\u015flar\u0131 hedef alma e\u011filiminde olmas\u0131. \u00d6rne\u011fin, \u00fcretimin durmas\u0131n\u0131n neden olan bir hasar g\u00fcnde milyonlarca dolara mal olabilirken, bir olay incelemesi haftalarca s\u00fcrebiliyor; \u00fcstelik her \u015feyin tamamen d\u00fczelece\u011finin garantisi de yok. Peki ya t\u0131bbi kurulu\u015flar? Acil durumlarda, baz\u0131 i\u015fletme sahipleri \u00f6deme yapmaktan ba\u015fka se\u00e7enekleri olmad\u0131\u011f\u0131n\u0131 d\u00fc\u015f\u00fcn\u00fcyor.<\/p>\n<p>Ge\u00e7en sonbaharda FBI fidye yaz\u0131l\u0131m\u0131 hakk\u0131nda <a href=\"https:\/\/www.ic3.gov\/media\/2019\/191002.aspx\" target=\"_blank\" rel=\"noopener nofollow\">\u00f6zel bir a\u00e7\u0131klama yay\u0131nlayarak<\/a> hi\u00e7 kimsenin bilgisayar korsanlar\u0131na para \u00f6dememesini a\u00e7\u0131k\u00e7a tavsiye etti. (\u00d6deme, daha fazla sald\u0131r\u0131y\u0131 te\u015fvik eder ve hi\u00e7bir \u015fekilde \u015fifrelenmi\u015f bilgilerin kurtar\u0131lmas\u0131n\u0131 garanti etmez.)<\/p>\n<h2>Man\u015fetlere yans\u0131yanlar<\/h2>\n<p>Bu y\u0131l\u0131n ilk yar\u0131s\u0131nda ger\u00e7ekle\u015fen ve sorunun b\u00fcy\u00fcyen \u00f6l\u00e7e\u011fine i\u015faret eden birka\u00e7 olaya bakal\u0131m.<\/p>\n<p>\u015eubat ay\u0131nda, Danimarka\u2019da bir tesis hizmetleri \u015firketi olan ISS, fidye yaz\u0131l\u0131mlar\u0131n\u0131n <a href=\"https:\/\/www.bbc.com\/news\/technology-51572575\" target=\"_blank\" rel=\"noopener nofollow\">kurban\u0131 oldu<\/a>. Siber su\u00e7lular \u015firketin veritaban\u0131n\u0131 \u015fifreledi; bu da 60 \u00fclkede y\u00fczbinlerce \u00e7al\u0131\u015fan\u0131n kurumsal hizmetlerden kopmas\u0131na neden oldu. Danimarkal\u0131lar \u00f6deme yapmay\u0131 reddetti. Altyap\u0131n\u0131n \u00e7o\u011funun eski haline getirilmesi ve bir soru\u015fturma y\u00fcr\u00fct\u00fclmesi yakla\u015f\u0131k bir ay s\u00fcrd\u00fc. Toplam zarar\u0131n ise 75-114 milyon USD oldu\u011fu tahmin ediliyor.<\/p>\n<p>Fidye yaz\u0131l\u0131m\u0131, baharda ABD\u2019nin \u00e7ok uluslu BT hizmet sa\u011flay\u0131c\u0131s\u0131 Cognizant\u2019\u0131 vurdu. 18 Nisan\u2019da \u015firket, pop\u00fcler fidye yaz\u0131l\u0131m\u0131 Maze\u2019in sald\u0131r\u0131s\u0131n\u0131n kurban\u0131 oldu\u011funu resmen <a href=\"https:\/\/techcrunch.com\/2020\/04\/18\/cognizant-maze-ransomware\/?guccounter=1\" target=\"_blank\" rel=\"noopener nofollow\">kabul etti<\/a>. \u015eirketin m\u00fc\u015fterileri, \u00e7al\u0131\u015fanlar\u0131na uzaktan \u00e7al\u0131\u015fma deste\u011fi sa\u011flamak i\u00e7in \u015firketin yaz\u0131l\u0131m\u0131n\u0131 ve hizmetlerini kullan\u0131yordu. Bu \u00e7al\u0131\u015fanlar\u0131n faaliyetleri de kesintiye u\u011frad\u0131.<\/p>\n<p>Cognizant, sald\u0131r\u0131n\u0131n hemen ard\u0131ndan ortaklar\u0131na g\u00f6nderdi\u011fi a\u00e7\u0131klamada, risk g\u00f6stergesi olarak Maze\u2019e \u00f6zg\u00fc sunucu IP adreslerini ve hesaba dayal\u0131 dosya adreslemelerini (kepstl32.dll, memes.tmp, maze.dll) <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/it-services-giant-cognizant-suffers-maze-ransomware-cyber-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">s\u0131ralad\u0131<\/a>.<\/p>\n<p>Kurumsal altyap\u0131n\u0131n b\u00fcy\u00fck bir k\u0131sm\u0131n\u0131 yeniden in\u015fa etmek \u00fc\u00e7 hafta s\u00fcrd\u00fc ve Cognizant, 2020\u2019nin ikinci \u00e7eyre\u011fine ait mali sonu\u00e7lar\u0131nda 50-70 milyon USD\u2019lik zarar bildirdi.<\/p>\n<p>\u015eubat ay\u0131nda ise Redcar &amp; Cleveland Borough Council (Birle\u015fik Krall\u0131k) sald\u0131r\u0131ya u\u011frad\u0131. \u0130ngiliz gazetesi The Guardian, bir y\u00f6netim kurulu \u00fcyesinin, y\u00fcz binlerce yerel sakin taraf\u0131ndan kullan\u0131lan BT altyap\u0131s\u0131n\u0131 etkili bir \u015fekilde yeniden in\u015fa etmek i\u00e7in gerekli olan \u00fc\u00e7 hafta boyunca, konseyin \u201ckalem ve ka\u011f\u0131t\u201d kullanmak zorunda kald\u0131\u011f\u0131n\u0131 s\u00f6yledi\u011fini <a href=\"https:\/\/www.theguardian.com\/technology\/2020\/feb\/27\/redcar-and-cleveland-council-hit-by-cyber-attack\" target=\"_blank\" rel=\"noopener nofollow\">yazd\u0131<\/a>.<\/p>\n<h2>Kendinizi nas\u0131l koruyabilirsiniz<\/h2>\n<p>En iyi strateji haz\u0131rl\u0131kl\u0131 olmakt\u0131r. Y\u00fcr\u00fct\u00fclebilir ekleri engellemek veya karantinaya almak i\u00e7in yetkisiz eri\u015fime a\u00e7\u0131k potansiyel posta hizmetlerini spam filtreleriyle donat\u0131n.<\/p>\n<p>Haz\u0131rl\u0131\u011f\u0131n\u0131za ra\u011fmen bir sald\u0131r\u0131n\u0131n ba\u015far\u0131l\u0131 olmas\u0131 durumuna kar\u015f\u0131 i\u015f a\u00e7\u0131s\u0131ndan kritik t\u00fcm bilgilerin d\u00fczenli olarak g\u00fcncellenen yedeklerini tutarak \u00e7al\u0131\u015famama s\u00fcresini ve olas\u0131 hasar\u0131 en aza indirin. Yedek kopyalar\u0131 g\u00fcvenli bir bulutta depolay\u0131n.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kartb2b\">\n<p>Yukar\u0131da a\u00e7\u0131klanan dijital hijyen \u00fcr\u00fcnlerine ek olarak, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/kaspersky-anti-ransomware-tool-for-business\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_KB_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_cdw92oxvuhcab46\" target=\"_blank\" rel=\"noopener\">Kaspersky Anti-Ransomware Tool<\/a> gibi \u00f6zel \u00e7\u00f6z\u00fcmler kullan\u0131n. Bulut ve davran\u0131\u015f analizi kullanan Kaspersky Anti-Ransomware Tool, \u015f\u00fcpheli uygulama davran\u0131\u015flar\u0131n\u0131 tespit ederek fidye yaz\u0131l\u0131mlar\u0131n\u0131n sistemlere s\u0131zmas\u0131n\u0131 \u00f6nler ve zaten vir\u00fcs bula\u015fm\u0131\u015f sistemler i\u00e7in k\u00f6t\u00fc ama\u00e7l\u0131 eylemleri geri alabilir.<\/p>\n<p>Entegre \u00e7\u00f6z\u00fcm\u00fcm\u00fcz <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a>, her t\u00fcr tehdide kar\u015f\u0131 \u00e7ok daha geni\u015f koruma sunar. Kaspersky Anti-Ransomware Tool \u00f6zelliklerine ek olarak Kaspersky Endpoint Security for Business, eksiksiz bir internet ve cihaz kontrol yelpazesi ve Adaptif Anormallik Kontrol\u00fc arac\u0131n\u0131n yan\u0131 s\u0131ra, \u00e7\u00f6z\u00fcm\u00fc en yeni sald\u0131r\u0131 t\u00fcrlerine (\u00f6rne\u011fin, dosyas\u0131z k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kullananlar, vb.) kar\u015f\u0131 bile silahland\u0131rabilmek i\u00e7in g\u00fcvenlik politikalar\u0131n\u0131n yap\u0131land\u0131r\u0131lmas\u0131na y\u00f6nelik \u00f6neriler i\u00e7erir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>2020, di\u011fer sorunlar\u0131n\u0131n yan\u0131 s\u0131ra fidye yaz\u0131l\u0131mlar\u0131nda patlama ya\u015fanan bir y\u0131l olarak da hat\u0131rlanacak. <\/p>\n","protected":false},"author":2581,"featured_media":9020,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[591,2307,935],"class_list":{"0":"post-9019","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-fidye-yazilimi","10":"tag-olaylar","11":"tag-sifreleyiciler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-incidents-2020\/9019\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-incidents-2020\/22084\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-incidents-2020\/17561\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-incidents-2020\/8733\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-incidents-2020\/23647\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-incidents-2020\/21783\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-incidents-2020\/20503\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-incidents-2020\/24211\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-incidents-2020\/23297\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-incidents-2020\/29443\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-incidents-2020\/37589\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-incidents-2020\/15939\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-incidents-2020\/16414\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-incidents-2020\/14155\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-incidents-2020\/25707\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/ransomware-incidents-2020\/12255\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-incidents-2020\/29540\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-incidents-2020\/26341\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-incidents-2020\/23072\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-incidents-2020\/28390\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-incidents-2020\/28211\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9019"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9019\/revisions"}],"predecessor-version":[{"id":9021,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9019\/revisions\/9021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9020"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}