{"id":9245,"date":"2021-01-29T12:16:50","date_gmt":"2021-01-29T09:16:50","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9245"},"modified":"2021-01-29T12:16:50","modified_gmt":"2021-01-29T09:16:50","slug":"rc3-bitcoin-ransom-tracing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/rc3-bitcoin-ransom-tracing\/9245\/","title":{"rendered":"Fidye yaz\u0131l\u0131mlar\u0131n kripto ayak izleri"},"content":{"rendered":"<p>Siber su\u00e7lular\u0131n \u00e7al\u0131\u015fma y\u00f6ntemleri ve eylemlerinin ula\u015fabilece\u011fi boyutu ne kadar iyi anlarsak, onlarla o kadar etkili bir \u015fekilde m\u00fccadele edebiliriz. Fidye yaz\u0131l\u0131m\u0131 s\u00f6z konusu oldu\u011funda, herhangi bir su\u00e7 grubunun ba\u015far\u0131s\u0131n\u0131 ve karl\u0131l\u0131\u011f\u0131n\u0131 de\u011ferlendirmek genellikle kolay bir i\u015f de\u011fildir. G\u00fcvenlik hizmeti sa\u011flay\u0131c\u0131lar\u0131 genellikle bu t\u00fcr sald\u0131r\u0131lar\u0131 m\u00fc\u015fterilerini g\u00f6zlemleyerek ve onlarla ileti\u015fim kurarak \u00f6\u011frenirler. Bu da asl\u0131nda ba\u015far\u0131s\u0131z olan giri\u015fimleri se\u00e7ebilmeye meyilli oldu\u011fumuz anlam\u0131na gelir. Bu arada, fidye yaz\u0131l\u0131m\u0131 kurbanlar\u0131 -\u00f6zellikle \u00f6deme yapanlar- ise sessiz kalma e\u011filimindedir.<\/p>\n<p>Bunun sonucu olarak ba\u015far\u0131l\u0131 sald\u0131r\u0131larla ilgili elimizdeki g\u00fcvenilir veriler de azd\u0131r. Fakat, 2020 Uzaktan Kaos \u0130leti\u015fim Kongresi\u2019nde (RC3) bir ara\u015ft\u0131rma ekibi, siber su\u00e7 etkinliklerini, kripto para ayak izleri \u00fczerinden ba\u015ftan sona analiz etmek i\u00e7in olduk\u00e7a ilgin\u00e7 bir y\u00f6ntem sundu.<\/p>\n<p>\u00c7al\u0131\u015fmay\u0131 2016 ve 2017 y\u0131llar\u0131nda Princeton, New York, Kaliforniya ve San Diego \u00dcniversitesi\u2019ndeki analistlerin yan\u0131 s\u0131ra Google ve Chainalysis \u00e7al\u0131\u015fanlar\u0131 y\u00fcr\u00fctt\u00fc. Ve birka\u00e7 y\u0131l ge\u00e7mesine ra\u011fmen bu y\u00f6ntem uygulanabilirli\u011fini koruyor.<\/p>\n<h2>Ara\u015ft\u0131rma y\u00f6ntemi<\/h2>\n<p>Su\u00e7lular kazand\u0131klar\u0131 paran\u0131n takip edilmesinden korkuyor, ki modern siber su\u00e7lar, pratikte d\u00fczenlenmemi\u015f ve anonimlik sa\u011flayan kripto para birimlerini -\u00f6zellikle Bitcoin- tercih ediyor. Dahas\u0131 kripto para birimleri herkes taraf\u0131ndan kullan\u0131labiliyor ve yap\u0131lan i\u015flemler de iptal edilemiyor.<\/p>\n<p>Bununla birlikte, Bitcoin\u2019in ba\u015fka bir ilgili \u00f6zelli\u011finden de bahsetmek gerekli; t\u00fcm Bitcoin i\u015flemleri halka a\u00e7\u0131kt\u0131r. Bu, finansal ak\u0131\u015flar\u0131n izini s\u00fcrmenin ve siber su\u00e7lar ekonomisinin i\u00e7 i\u015fleyi\u015finin \u00f6l\u00e7e\u011fine g\u00f6z atman\u0131n m\u00fcmk\u00fcn oldu\u011fu anlam\u0131na gelir. Ara\u015ft\u0131rmac\u0131lar\u0131n yapt\u0131\u011f\u0131 da tam olarak buydu.<\/p>\n<p>Sald\u0131rganlar\u0131n t\u00fcm\u00fc olmasa da baz\u0131lar\u0131, her kurban i\u00e7in tek bir Bitcoin c\u00fczdan adresi olu\u015fturuyorlar. Bu sebeple ara\u015ft\u0131rmac\u0131lar i\u015fe, fidye \u00f6demeleri i\u00e7in kullan\u0131lan bu c\u00fczdanlar\u0131 toplayarak ba\u015flad\u0131lar. Vir\u00fcsle ilgili halka a\u00e7\u0131k payla\u015f\u0131mlarda baz\u0131 adresler buldular -ki bir\u00e7ok kurban \u00e7evrimi\u00e7i fidye mesaj\u0131n\u0131n ekran g\u00f6r\u00fcnt\u00fclerini yay\u0131nlad\u0131- ve bunlar d\u0131\u015f\u0131ndakileri de test cihazlar\u0131nda fidye yaz\u0131l\u0131m\u0131 \u00e7al\u0131\u015ft\u0131rarak elde ettiler.<\/p>\n<p>Daha sonra, ara\u015ft\u0131rmac\u0131lar c\u00fczdana aktar\u0131lan kripto para biriminin gidi\u015fat\u0131n\u0131 izlediler. Bu da, baz\u0131 durumlarda kendi kendilerine mikro Bitcoin \u00f6demeleri yapmalar\u0131n\u0131 gerektirdi. Bitcoin\u2019in birka\u00e7 c\u00fczdandaki mebla\u011f\u0131n tek bir c\u00fczdana aktar\u0131ld\u0131\u011f\u0131 <em>payla\u015f\u0131lm\u0131\u015ft\u0131r harcama \u00f6zelli\u011fi<\/em>, siber su\u00e7lular\u0131n birden fazla kurbandan gelen fidye \u00f6demelerini konsolide etmesini sa\u011fl\u0131yordu. Ancak b\u00f6yle bir i\u015flem, i\u015fin arkas\u0131ndaki ismin <a href=\"https:\/\/en.bitcoin.it\/wiki\/Common-input-ownership_heuristic\" target=\"_blank\" rel=\"noopener nofollow\">birden fazla c\u00fczdan\u0131n anahtar\u0131na<\/a> sahip olmas\u0131n\u0131 gerektiriyor. Sonu\u00e7 olarak, bu t\u00fcr i\u015flemlerin izlenmesi, ma\u011fdurlar listesini geni\u015fletmeyi ve ayn\u0131 anda fonlar\u0131n transfer edildi\u011fi merkezi c\u00fczdan\u0131n adresini bulmay\u0131 m\u00fcmk\u00fcn k\u0131lar.<\/p>\n<p>C\u00fczdanlardaki finansal ak\u0131\u015flar\u0131 iki y\u0131ll\u0131k bir s\u00fcre boyunca inceleyen ara\u015ft\u0131rmac\u0131lar, siber su\u00e7lular\u0131n gelirleri ve fonlar\u0131 aklamak i\u00e7in kullan\u0131lan y\u00f6ntemler hakk\u0131nda b\u00f6ylelikle fikir edindiler.<\/p>\n<h2>Temel \u00e7\u0131kar\u0131mlar<\/h2>\n<p>Ara\u015ft\u0131rmac\u0131lar\u0131n temel bulgusu, iki y\u0131ll\u0131k bir dilim i\u00e7inde 19.750 kurban\u0131n, en yayg\u0131n be\u015f fidye yaz\u0131l\u0131m\u0131 t\u00fcr\u00fc operat\u00f6rlerine yakla\u015f\u0131k 16 milyon dolar transfer etmesi y\u00f6n\u00fcndeydi. Ku\u015fkusuz t\u00fcm i\u015flemleri izlemi\u015f olmalar\u0131 pek olas\u0131 olmad\u0131\u011f\u0131ndan, rakam tam olarak do\u011fru de\u011fil. Ancak birka\u00e7 y\u0131l \u00f6nce siber su\u00e7 faaliyetlerinin \u00f6l\u00e7e\u011fine ili\u015fkin kabaca bir tahmin sa\u011fl\u0131yor.<\/p>\n<p>\u0130lgin\u00e7 bir \u015fekilde bu gelirin yakla\u015f\u0131k %90\u2019\u0131, o zamanlar\u0131n en aktif iki fidye yaz\u0131l\u0131m\u0131 tehdidi olan <a href=\"https:\/\/www.kaspersky.com\/blog\/locky-ransomware\/11667\/\" target=\"_blank\" rel=\"noopener nofollow\">Locky<\/a> ve <a href=\"https:\/\/www.kaspersky.com\/blog\/cerber-multipurpose-malware\/12221\/\" target=\"_blank\" rel=\"noopener nofollow\">Cerber<\/a> ailelerinden geliyordu. Dahas\u0131, k\u00f6t\u00fc \u015f\u00f6hretli <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/wannacry-is-still-alive\/5450\/\" target=\"_blank\" rel=\"noopener\">WannaCry<\/a> y\u00fcz bin dolardan fazla kazanmad\u0131, ki bir\u00e7ok uzman WannaCry\u2019i k\u00f6t\u00fc ama\u00e7l\u0131 fidye yaz\u0131l\u0131m\u0131 olarak de\u011fil de, bir veri silici olarak s\u0131n\u0131fland\u0131r\u0131yor.<\/p>\n<div id=\"attachment_9247\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-9247\" class=\"wp-image-9247 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/01\/25151613\/rc3-bitcoin-ransom-tracing-revenue-1024x570.jpg\" alt=\"\" width=\"1024\" height=\"570\"><p id=\"caption-attachment-9247\" class=\"wp-caption-text\">2016-2017 aras\u0131ndaki en yayg\u0131n fidye yaz\u0131l\u0131m\u0131n\u0131n yarat\u0131c\u0131lar\u0131n\u0131n gelir tahmini. <a href=\"https:\/\/media.ccc.de\/v\/rc3-11566-tracking_ransomware_end-to-end\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p><strong>\u00a0<\/strong>Siber su\u00e7lular\u0131n bu gelirin ne kadar\u0131n\u0131 ald\u0131klar\u0131n\u0131 ve nas\u0131l yapt\u0131klar\u0131n\u0131 ara\u015ft\u0131rmak ise \u00e7ok daha ilgin\u00e7ti. Bunun i\u00e7in ara\u015ft\u0131rmac\u0131lar, siber su\u00e7lular\u0131n c\u00fczdanlar\u0131ndan hangilerinin, bilindik \u00e7evrimi\u00e7i dijital d\u00f6viz bozdurma i\u015flemlerinde kullan\u0131lan c\u00fczdanlarla ortak i\u015flemlerde kullan\u0131ld\u0131\u011f\u0131n\u0131 g\u00f6rmek \u00fczere, transfer analizlerinde kulland\u0131klar\u0131 ayn\u0131 y\u00f6ntemi kulland\u0131lar. Elbette t\u00fcm i\u015flemler bu \u015fekilde izlenemiyor ancak bu y\u00f6ntem, siber su\u00e7lular\u0131n en \u00e7ok BTC-e.com ve BitMixer.io arac\u0131l\u0131\u011f\u0131yla para \u00e7ektiklerini tespit etmelerini sa\u011flamaya yetti. Yetkililer daha sonra her iki borsa pazar\u0131n\u0131 da tahmin edece\u011finiz \u00fczere yasa d\u0131\u015f\u0131 para aklama nedeniyle kapatt\u0131.<\/p>\n<p>Ne yaz\u0131k ki, RC3 web sitesinde video sunumun tam versiyonu yok, ancak <a href=\"https:\/\/fahrplan.events.ccc.de\/rc3\/2020\/Fahrplan\/events\/11566.html\" target=\"_blank\" rel=\"noopener nofollow\">raporun tam metnini<\/a> yine de bulabilirsiniz.<\/p>\n<h2>Fidye yaz\u0131l\u0131mlar\u0131na kar\u015f\u0131 nas\u0131l korunabilirsiniz?<\/h2>\n<p>Fidye yaz\u0131l\u0131m\u0131ndan elde edilen b\u00fcy\u00fck kazan\u00e7lar, siber su\u00e7lular\u0131n her zamankinden daha at\u0131lgan davranmas\u0131na sebep oluyor. Bir g\u00fcn modern Robin Hood k\u0131l\u0131\u011f\u0131nda <a href=\"https:\/\/threatpost.com\/ransomware-20k-donation-charities\/160386\/\" target=\"_blank\" rel=\"noopener nofollow\">hay\u0131r kurumlar\u0131na yat\u0131r\u0131m<\/a> yaparken, di\u011fer g\u00fcn a\u011flar\u0131na daha \u00e7ok kurban d\u00fc\u015f\u00fcrmek i\u00e7in <a href=\"https:\/\/threatpost.com\/ragnar-locker-ransomware-facebook-ads\/161133\/\" target=\"_blank\" rel=\"noopener nofollow\">reklam kampanyalar\u0131 finanse edecek<\/a> hale gelebiliyorlar. Bu \u00e7al\u0131\u015fmada ara\u015ft\u0131rmac\u0131lar, finansal ak\u0131\u015flar\u0131 durduracak ve siber su\u00e7lular\u0131n zihinlerinde yeni fidye yaz\u0131l\u0131mlar\u0131n\u0131n karl\u0131l\u0131\u011f\u0131 konusunda \u015f\u00fcphe uyand\u0131racak kilit noktalar\u0131 bulmaya \u00e7al\u0131\u015ft\u0131lar.<\/p>\n<p>Siber su\u00e7la m\u00fccadelede ger\u00e7ekten etkili olan tek y\u00f6ntem ise bula\u015fmay\u0131 \u00f6nlemek. Bu nedenle, a\u015fa\u011f\u0131daki kurallara s\u0131k\u0131 s\u0131k\u0131ya ba\u011fl\u0131 kalman\u0131z\u0131 \u00f6neririz:<\/p>\n<ul>\n<li>Sosyal m\u00fchendislik tekniklerini tan\u0131malar\u0131 i\u00e7in <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131 e\u011fitin<\/a>. Birka\u00e7 ender durum d\u0131\u015f\u0131nda, sald\u0131rganlar genellikle kullan\u0131c\u0131lara k\u00f6t\u00fc ama\u00e7l\u0131 bir belge veya ba\u011flant\u0131 g\u00f6ndererek bilgisayarlara eri\u015fmeye \u00e7al\u0131\u015facakt\u0131r.<\/li>\n<li>T\u00fcm yaz\u0131l\u0131mlar\u0131, \u00f6zellikle i\u015fletim sistemlerini d\u00fczenli olarak g\u00fcncelleyin. \u00c7o\u011fu zaman, fidye yaz\u0131l\u0131m\u0131 ve da\u011f\u0131t\u0131m ara\u00e7lar\u0131 bilindik ancak hen\u00fcz yamalanmam\u0131\u015f g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131r.<\/li>\n<li>Tercihen hem bilinen, hem de hen\u00fcz tespit edilmemi\u015f tehditlerle ba\u015fa \u00e7\u0131kabilen, yerle\u015fik anti-ransomware teknolojisi sunan\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">g\u00fcvenlik \u00e7\u00f6z\u00fcmleri<\/a> kullan\u0131n.<\/li>\n<li>Verileri d\u00fczenli olarak yedekleyin, tercihen yedekleri yerel a\u011fa kal\u0131c\u0131 olarak ba\u011fl\u0131 olmayan ayr\u0131 bir ortamda depolay\u0131n.<\/li>\n<\/ul>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\"><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Siber su\u00e7lular, 2016-2017 aras\u0131nda fidye yaz\u0131l\u0131mlar arac\u0131l\u0131\u011f\u0131yla 16 milyon dolardan fazla para kazand\u0131lar.<\/p>\n","protected":false},"author":700,"featured_media":9246,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[374,1098,1507,2351,591,1511,1336,841,2345,1227],"class_list":{"0":"post-9245","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-bitcoin","10":"tag-blok-zinciri","11":"tag-ccc","12":"tag-cerber","13":"tag-fidye-yazilimi","14":"tag-kaos-iletisim-kongresi","15":"tag-kripto-para-birimi","16":"tag-locky","17":"tag-rc3","18":"tag-wannacry"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/rc3-bitcoin-ransom-tracing\/9245\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/rc3-bitcoin-ransom-tracing\/8884\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/rc3-bitcoin-ransom-tracing\/20895\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/rc3-bitcoin-ransom-tracing\/24564\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/rc3-bitcoin-ransom-tracing\/23773\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/rc3-bitcoin-ransom-tracing\/29977\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/rc3-bitcoin-ransom-tracing\/38488\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/rc3-bitcoin-ransom-tracing\/16280\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/rc3-bitcoin-ransom-tracing\/16866\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/rc3-bitcoin-ransom-tracing\/14397\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/rc3-bitcoin-ransom-tracing\/26122\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/rc3-bitcoin-ransom-tracing\/29908\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/rc3-bitcoin-ransom-tracing\/26616\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/rc3-bitcoin-ransom-tracing\/23469\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/rc3\/","name":"RC3"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9245"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9245\/revisions"}],"predecessor-version":[{"id":9248,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9245\/revisions\/9248"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9246"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}