{"id":9489,"date":"2021-04-02T10:47:25","date_gmt":"2021-04-02T07:47:25","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9489"},"modified":"2021-04-02T10:47:26","modified_gmt":"2021-04-02T07:47:26","slug":"ransomware-in-virtual-environment","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-in-virtual-environment\/9489\/","title":{"rendered":"Sanal ortamda fidye yaz\u0131l\u0131m\u0131"},"content":{"rendered":"<p>Baz\u0131 siber tehdit risklerini \u00f6nemli \u00f6l\u00e7\u00fcde azaltsa da sanalla\u015ft\u0131rma, di\u011fer uygulamalardan \u00e7ok farkl\u0131 olup her derde deva de\u011fil. <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-gangs-are-abusing-vmware-esxi-exploits-to-encrypt-virtual-hard-disks\/\" target=\"_blank\" rel=\"noopener nofollow\">ZDNet\u2019in<\/a>yak\u0131n zamanda bildirdi\u011fi \u00fczere bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131, \u00f6rne\u011fin VMware ESXi\u2019nin savunmas\u0131z s\u00fcr\u00fcmleri arac\u0131l\u0131\u011f\u0131yla, sanal altyap\u0131y\u0131 vurabilir.<\/p>\n<p>Sanal makineleri kullanmak g\u00fc\u00e7l\u00fc ve g\u00fcvenli bir uygulamad\u0131r. \u00d6rne\u011fin sanal makinede hassas veri bulunmuyorsa, sanal makine kullanmak k\u00f6t\u00fc bir yaz\u0131l\u0131m\u0131n bula\u015fmas\u0131ndan kaynaklanan zarar\u0131 azaltabilir. Kullan\u0131c\u0131 sanal makinede yanl\u0131\u015fl\u0131kla bir Truva at\u0131n\u0131 etkinle\u015ftirse bile, sanal makinenin yeni bir g\u00f6r\u00fcnt\u00fcs\u00fcn\u00fcn kurulmas\u0131 t\u00fcm k\u00f6t\u00fc niyetli de\u011fi\u015fiklikleri tersine \u00e7evirir.<\/p>\n<p>Bununla birlikte <a href=\"https:\/\/securelist.com\/ransomexx-trojan-attacks-linux-systems\/99279\/\" target=\"_blank\" rel=\"noopener\">RansomExx<\/a> fidye yaz\u0131l\u0131m\u0131, sanal sabit s\u00fcr\u00fcc\u00fclere sald\u0131rmak i\u00e7in \u00f6zellikle VMware ESXi\u2019deki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 hedef al\u0131r. Darkside grubunun da ayn\u0131 y\u00f6ntemi kulland\u0131\u011f\u0131 bildirildi ve BabukLocker Truva At\u0131\u2019n\u0131n yarat\u0131c\u0131lar\u0131 <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1354237766285012992?s=20\" target=\"_blank\" rel=\"noopener nofollow\">\u00fcst\u00fc kapal\u0131 bir \u015fekilde<\/a> ESXi\u2019yi \u015fifreleyebileceklerini s\u00f6ylediler.<\/p>\n<h2>G\u00fcvenlik a\u00e7\u0131klar\u0131 nelerdir?<\/h2>\n<p>VMware ESXi misafir sistem arakatman\u0131 (hypervisor), di\u011fer \u015feylerin yan\u0131 s\u0131ra a\u011f cihazlar\u0131n\u0131 \u00f6n yap\u0131land\u0131rma olmadan alg\u0131layabilen A\u00e7\u0131k SLP (Hizmet Katman\u0131 Protokol\u00fc) arac\u0131l\u0131\u011f\u0131yla birden \u00e7ok sanal makinenin tek bir sunucuda bilgi depolamas\u0131na imkan sa\u011flar. S\u00f6z konusu iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131 eski ve bu sebeple siber su\u00e7lular\u0131n bildi\u011fi <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2019-0022.html\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2019-5544<\/a> ve <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2020-0023.html\" target=\"_blank\" rel=\"noopener nofollow\">CVE-2020-3992<\/a>\u2018dir. A\u00e7\u0131klardan ilki <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/heap-overflow-attack\/\" target=\"_blank\" rel=\"noopener\">heap overflow sald\u0131r\u0131lar\u0131n\u0131<\/a> ger\u00e7ekle\u015ftirmek i\u00e7in kullan\u0131l\u0131rken ve ikincisi ise <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/use-after-free\/\" target=\"_blank\" rel=\"noopener\">Use-After-Free<\/a> t\u00fcr\u00fcndedir \u2014 yani i\u015flem s\u0131ras\u0131nda dinamik haf\u0131zan\u0131n yanl\u0131\u015f kullan\u0131m\u0131 ile ilgilidir.<\/p>\n<p>Her iki g\u00fcvenlik a\u00e7\u0131\u011f\u0131 da bir s\u00fcre \u00f6nce kapat\u0131ld\u0131 (ilki 2019\u2019da, ikincisi 2020\u2019de), ancak 2021\u2019de su\u00e7lular yine de bu a\u00e7\u0131klar sayesinde ba\u015far\u0131l\u0131 sald\u0131r\u0131lar ger\u00e7ekle\u015ftiriyor.\u00a0 Her zaman oldu\u011fu gibi bu, baz\u0131 i\u015fletmelerin yaz\u0131l\u0131mlar\u0131n\u0131 g\u00fcncellemedi\u011fi anlam\u0131na geliyor.<\/p>\n<h2>K\u00f6t\u00fc niyetli ki\u015filer ESXi g\u00fcvenlik a\u00e7\u0131klar\u0131ndan nas\u0131l faydalan\u0131r?<\/h2>\n<p>Sald\u0131rganlar bu g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 k\u00f6t\u00fc niyetli SLP talepleri olu\u015fturmak ve veri depolamay\u0131 riske atmak i\u00e7in kullanabilir. Bilgiyi \u015fifrelemek i\u00e7in \u00f6ncelikle a\u011fa girmeleri ve orada bir yer edinmeleri gerekir. Bu b\u00fcy\u00fck bir sorun de\u011fildir, hele ki sanal makine bir g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc \u00e7al\u0131\u015ft\u0131rm\u0131yorsa.<\/p>\n<p>Sisteme yerle\u015fmek i\u00e7in RansomExx kullan\u0131c\u0131lar\u0131 \u00f6rne\u011fin Netlogon Uzak Protokol\u00fcndeki <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/cve-2020-1472-domain-controller-vulnerability\/8828\/\" target=\"_blank\" rel=\"noopener\">Zerologon<\/a> g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kullanabilirler. Yani, bir kullan\u0131c\u0131y\u0131 sanal makinede k\u00f6t\u00fc ama\u00e7l\u0131 kod \u00e7al\u0131\u015ft\u0131rmas\u0131 i\u00e7in kand\u0131r\u0131rlar, ard\u0131ndan Active Directory denetleyicisinin kontrol\u00fcn\u00fc ele ge\u00e7irirler ve i\u015fte o zaman depolanan veriyi \u015fifreler ve geride bir fidye notu b\u0131rak\u0131rlar.<\/p>\n<p>Bu arada Zerologon tek se\u00e7enek de\u011fildir, <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">\u00f6zel hizmetler<\/a> olmadan a\u00e7\u0131ktan yararlan\u0131ld\u0131\u011f\u0131n\u0131 tespit etmek neredeyse imkans\u0131z oldu\u011fu i\u00e7in en tehlikeli se\u00e7eneklerden birisidir.<\/p>\n<h2>MSXI sald\u0131r\u0131lar\u0131na kar\u015f\u0131 nas\u0131l korunabilirsiniz?<\/h2>\n<ul>\n<li>VMware ESXi\u2019yi g\u00fcncelleyin;<\/li>\n<li>G\u00fcncelleme kesinlikle m\u00fcmk\u00fcn de\u011filse VMware\u2019in \u00f6nerdi\u011fi <a href=\"https:\/\/kb.vmware.com\/s\/article\/76372\" target=\"_blank\" rel=\"noopener nofollow\">ge\u00e7ici \u00e7\u00f6z\u00fcm\u00fc<\/a> kullan\u0131n (ancak bu y\u00f6ntemin baz\u0131 SLP \u00f6zelliklerini s\u0131n\u0131rlayaca\u011f\u0131n\u0131 unutmay\u0131n);<\/li>\n<li>Microsoft Netlogon g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 d\u00fczeltmek i\u00e7in onu da g\u00fcncelleyin;<\/li>\n<li>Sanal olanlar da dahil a\u011fdaki t\u00fcm makineleri koruyun;<\/li>\n<li>Geleneksel antivir\u00fcs \u00e7\u00f6z\u00fcmleri taraf\u0131ndan g\u00f6r\u00fclemeyen karma\u015f\u0131k \u00e7ok a\u015famal\u0131 sald\u0131r\u0131lar\u0131 bile alg\u0131layan <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Managed Detection and Response<\/a> kullan\u0131n.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\">\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Birka\u00e7 siber su\u00e7lu grubu, bilgisayarlara fidye yaz\u0131l\u0131m\u0131 bula\u015ft\u0131rmak i\u00e7in VMware ESXi&#8217;deki g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararland\u0131.<\/p>\n","protected":false},"author":2581,"featured_media":9490,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[591,2395],"class_list":{"0":"post-9489","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-fidye-yazilimi","10":"tag-vmware"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-in-virtual-environment\/9489\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransomware-in-virtual-environment\/22680\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-in-virtual-environment\/18164\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-in-virtual-environment\/9013\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-in-virtual-environment\/24467\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-in-virtual-environment\/22491\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-in-virtual-environment\/21527\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-in-virtual-environment\/24993\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-in-virtual-environment\/24285\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-in-virtual-environment\/30343\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-in-virtual-environment\/39150\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-in-virtual-environment\/16674\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-in-virtual-environment\/17224\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-in-virtual-environment\/14626\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-in-virtual-environment\/26455\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/ransomware-in-virtual-environment\/26854\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-in-virtual-environment\/23712\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-in-virtual-environment\/29055\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-in-virtual-environment\/28856\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9489"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9489\/revisions"}],"predecessor-version":[{"id":9491,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9489\/revisions\/9491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9490"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}