{"id":9559,"date":"2021-04-22T12:36:37","date_gmt":"2021-04-22T09:36:37","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9559"},"modified":"2021-04-22T12:36:37","modified_gmt":"2021-04-22T09:36:37","slug":"office-phishing-html-attachment","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/office-phishing-html-attachment\/9559\/","title":{"rendered":"Microsoft Office&#8217;teki kimlik av\u0131 hileleri"},"content":{"rendered":"<p>Siber su\u00e7lular i\u015f e-postas\u0131na sa\u011flad\u0131klar\u0131 eri\u015fimle birlikte <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/bec\/\" target=\"_blank\" rel=\"noopener\">kurumsa e-posta gizlili\u011fi ihlali<\/a> t\u00fcr\u00fc sald\u0131r\u0131lar ger\u00e7ekle\u015ftirebilir. Bu nedenle, kurumsal kullan\u0131c\u0131lar\u0131 MS Office oturum a\u00e7ma sayfas\u0131 gibi tasarlanm\u0131\u015f internet sitelerinde oturum a\u00e7maya y\u00f6nlendiren \u00e7ok say\u0131da kimlik av\u0131 mektubuyla kar\u015f\u0131la\u015f\u0131yoruz. <em>Bu<\/em> da, bir ba\u011flant\u0131n\u0131n sizi b\u00f6yle bir sayfaya y\u00f6nlendirmesi durumunda nelere dikkat etmeniz gerekti\u011fini bilmenin \u00e7ok \u00f6nemli oldu\u011fu anlam\u0131na geliyor.<\/p>\n<p>Microsoft Office hesaplar\u0131na ait kimlik bilgilerini \u00e7alan siber su\u00e7lularla <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/office-365-credentials-hunt\/8544\/\" target=\"_blank\" rel=\"noopener\">ilk kez kar\u015f\u0131la\u015fm\u0131yoruz<\/a>. Buna kar\u015f\u0131n sald\u0131rganlar\u0131n kulland\u0131\u011f\u0131 y\u00f6ntemler her g\u00fcn daha da geli\u015fiyor. Bug\u00fcn, en iyi uygulama \u00f6rneklerini g\u00f6stermek ve ana hatlar\u0131yla baz\u0131 yeni p\u00fcf noktalar\u0131ndan bahsetmek i\u00e7in ger\u00e7ek hayattan \u2014 ger\u00e7ekten ald\u0131\u011f\u0131m\u0131z bir e-postadan \u2014 bir \u00f6rnek anlataca\u011f\u0131z.<\/p>\n<h2>Yeni bir kimlik av\u0131 hilesi: HTML eki<\/h2>\n<p>Bir kimlik av\u0131 e-postas\u0131 normalde, sahte bir internet sitesine giden bir k\u00f6pr\u00fc ba\u011flant\u0131 i\u00e7erir. S\u00fcrekli s\u00f6yledi\u011fimiz gibi, k\u00f6pr\u00fc ba\u011flant\u0131lar\u0131 hem genel g\u00f6r\u00fcn\u00fcm hem de ger\u00e7ekte y\u00f6nlendirdikleri internet adresleri a\u00e7\u0131s\u0131ndan dikkatli bir \u015fekilde incelenmesi gerekir (Fare ile URL\u2019nin \u00fczerine gelmek \u00e7o\u011fu posta istemcisinde ve web aray\u00fcz\u00fcnde gidilecek hedef adresi g\u00f6sterir). \u0130nsanlar bu basit \u00f6nlemi uygulamaya ba\u015flad\u0131\u011f\u0131ndan beri kimlik avc\u0131lar\u0131 ba\u011flant\u0131lar\u0131, tek amac\u0131 otomatik \u015fekilde yeniden y\u00f6nlendirmek olan ekli HTML dosyalar\u0131yla de\u011fi\u015ftirmeye ba\u015flad\u0131.<\/p>\n<p>HTML ekine t\u0131kland\u0131\u011f\u0131nda ek, bir taray\u0131c\u0131da a\u00e7\u0131l\u0131yor. \u0130\u015fin kimlik av\u0131yla ilgili olan k\u0131sm\u0131na gelirsek; dosya, kimlik av\u0131 internet sitesine ait adresin bir de\u011fi\u015fken olarak girildi\u011fi tek sat\u0131rl\u0131k bir koda (javascript: window.location.href) sahip. Bu kod taray\u0131c\u0131n\u0131n internet sitesini ayn\u0131 pencerede a\u00e7maya zorluyor.<\/p>\n<h2>Bir kimlik av\u0131 e-postas\u0131nda nelere dikkat edilmeli<\/h2>\n<p>Yeni taktikleri bir yana koyal\u0131m; kimlik av\u0131 kimlik av\u0131d\u0131r, bu nedenle e-postan\u0131n kendisiyle ba\u015flay\u0131n. \u0130\u015fte ald\u0131\u011f\u0131m\u0131z ger\u00e7ek e-posta. Bu \u00f6rnekte sahte e-posta, bir sesli mesaj bildirimine ait:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9560\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/04\/22122726\/office-phishing-html-attachment-letter.png\" alt=\"\" width=\"714\" height=\"345\"><\/p>\n<p>Eke t\u0131klamadan \u00f6nce \u00fczerinde d\u00fc\u015f\u00fcnmenizi istedi\u011fimiz birka\u00e7 soru var:<\/p>\n<ol>\n<li>G\u00f6ndereni tan\u0131yor musunuz? G\u00f6nderen ki\u015fi i\u015f yerinden size sesli mesaj b\u0131rakabilir mi?<\/li>\n<li>E-posta ile sesli mesaj g\u00f6ndermek \u015firketinizde yayg\u0131n bir uygulama m\u0131? Yaln\u0131zca bug\u00fcnlerde pek kullan\u0131lmad\u0131\u011f\u0131 i\u00e7in de\u011fil ayn\u0131 zamanda Microsoft 365 de Ocak 2020\u2019den beri sesli postay\u0131 desteklemiyor.<\/li>\n<li>Bildirimi hangi uygulaman\u0131n g\u00f6nderdi\u011fi konusunda net bir fikriniz var m\u0131? MS Recorder, Office\u2019in uygulama paketinin bir par\u00e7as\u0131 de\u011fil \u2014 zaten Microsoft\u2019un sesli mesaj g\u00f6nderebilen varsay\u0131lan ses kay\u0131t uygulamas\u0131n\u0131n ad\u0131 MS Recorder de\u011fil, Voice Recorder.<\/li>\n<li>Ek, bir ses dosyas\u0131na benziyor mu? Voice Recorder ses kayd\u0131 payla\u015fabilir ancak bunlar\u0131 .m3a uzant\u0131s\u0131na sahip dosya \u015feklinde g\u00f6nderir. Ses kayd\u0131 bilmedi\u011finiz bir ara\u00e7 taraf\u0131ndan g\u00f6nderilmi\u015f ve bir sunucuda tutuluyor olsa bile, bir posta eki \u015feklinde de\u011fil ses kayd\u0131na ait bir ba\u011flant\u0131 \u015feklinde olmal\u0131d\u0131r.<\/li>\n<\/ol>\n<p>\u00d6zetle: Elimizde bilinmeyen bir program kullan\u0131larak kaydedilmi\u015f ve e-postaya bir internet sayfas\u0131 \u015feklinde ek yap\u0131lm\u0131\u015f, bilinmeyen bir g\u00f6nderici taraf\u0131ndan g\u00f6nderilmi\u015f s\u00f6zde sesli mesaj\u0131m\u0131z oldu\u011funu belirten (asla kullanmad\u0131\u011f\u0131m\u0131z bir \u00f6zellik) bir e-posta var. A\u00e7maya de\u011fer mi? Kesinlikle de\u011fmez.<\/p>\n<h2>Kimlik av\u0131 sayfas\u0131 nas\u0131l tan\u0131n\u0131r?<\/h2>\n<p>E-postadaki bu eke t\u0131klad\u0131\u011f\u0131n\u0131z\u0131 ve bir kimlik av\u0131 sayfas\u0131na geldi\u011finizi varsayal\u0131m. Bunun ger\u00e7ek bir site olmad\u0131\u011f\u0131n\u0131 nas\u0131l anlars\u0131n\u0131z?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9561\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/91\/2021\/04\/22122744\/office-phishing-html-attachment-site.jpg\" alt=\"\" width=\"934\" height=\"738\"><\/p>\n<p>\u0130\u015fte bakman\u0131z gerekenler:<\/p>\n<ol>\n<li>Adres \u00e7ubu\u011fundaki adres bir Microsoft adresine benziyor mu?<\/li>\n<li>\u201cHesab\u0131n\u0131za eri\u015femiyor musunuz?\u201d ve \u201cBir g\u00fcvenlik anahtar\u0131yla oturum a\u00e7\u0131n\u201d ba\u011flant\u0131lar\u0131, sizi y\u00f6nlendirmesi gereken sayfalara y\u00f6nlendiriyor mu? Bir kimlik av\u0131 sayfas\u0131nda bile bu ba\u011flant\u0131lar sizi ger\u00e7ek Microsoft sayfalar\u0131na y\u00f6nlendirebilirler, ancak bizim \u00f6rne\u011fimizde bu ba\u011flant\u0131lar \u00e7al\u0131\u015fmad\u0131klar\u0131 i\u00e7in bu durum a\u00e7\u0131k bir \u015fekilde doland\u0131r\u0131c\u0131l\u0131k i\u015fareti.<\/li>\n<li>Sayfa do\u011fru \u015fekilde g\u00f6r\u00fcnt\u00fcleniyor mu? Microsoft normalde arka plan g\u00f6rselinin boyutu gibi ayr\u0131nt\u0131larla ilgili herhangi bir sorun ya\u015famaz. Elbette, aras\u0131ra bu t\u00fcr aksakl\u0131klar herkesin ba\u015f\u0131na gelebilir ancak bu anormallikler birer tehlike i\u015faretidir.<\/li>\n<\/ol>\n<p>Ne olursa olsun, e\u011fer herhangi bir \u015f\u00fcpheniz varsa, Microsoft\u2019un ger\u00e7ek oturum a\u00e7ma sayfas\u0131n\u0131n neye benzedi\u011fini g\u00f6rmek i\u00e7in <a href=\"https:\/\/login.microsoftonline.com\/\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/login.microsoftonline.com\/<\/a> adresine bak\u0131n.<\/p>\n<h2>Oltaya gelmekten nas\u0131l ka\u00e7\u0131n\u0131l\u0131r<\/h2>\n<p>Office hesab\u0131 parolalar\u0131n\u0131z\u0131 bilinmeyen sald\u0131rganlara vermekten ka\u00e7\u0131nmak i\u00e7in:<\/p>\n<ul>\n<li>Dikkat edin. En basit kimlik av\u0131 bi\u00e7imlerinden ka\u00e7\u0131nmak i\u00e7in kendinize yukar\u0131da sordu\u011fumuz sorular\u0131 sorun. Daha farkl\u0131 bir \u00e7ok hileye ili\u015fkin bilgiye sahip olmak i\u00e7in <a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">modern siber tehdit fark\u0131ndal\u0131\u011f\u0131 e\u011fitim kurslar\u0131m\u0131z\u0131<\/a> deneyin;<\/li>\n<li>K\u00f6pr\u00fc ba\u011flant\u0131lar veya HTML dosyalar\u0131yla ger\u00e7ekle\u015ftirilen kimlik av\u0131 giri\u015fimlerini a\u00e7\u0131\u011fa \u00e7\u0131karmak i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/microsoft-office-365-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener\">Office 365 korumas\u0131<\/a>, kimlik av\u0131 sitelerinin a\u00e7\u0131lmas\u0131n\u0131 \u00f6nlemek i\u00e7in <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security\/cloud?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kescloud___\" target=\"_blank\" rel=\"noopener\">u\u00e7 nokta korumas\u0131<\/a> kullanarak \u00e7al\u0131\u015fanlar\u0131n\u0131z\u0131n e-postalar\u0131n\u0131 koruyun.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kes-cloud\">\n","protected":false},"excerpt":{"rendered":"<p>Gelen bir mesajda MS Office hesab\u0131n\u0131zda oturum a\u00e7man\u0131z isteniyorsa, i\u015fte yapman\u0131z gerekenler. <\/p>\n","protected":false},"author":2598,"featured_media":9562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[1921,1074],"class_list":{"0":"post-9559","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-e-posta","10":"tag-kimlik-avi"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/office-phishing-html-attachment\/9559\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/office-phishing-html-attachment\/22765\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/office-phishing-html-attachment\/18247\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/office-phishing-html-attachment\/9049\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/office-phishing-html-attachment\/24606\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/office-phishing-html-attachment\/22634\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/office-phishing-html-attachment\/21707\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/office-phishing-html-attachment\/25117\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/office-phishing-html-attachment\/24448\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/office-phishing-html-attachment\/30580\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/office-phishing-html-attachment\/39446\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/office-phishing-html-attachment\/16817\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/office-phishing-html-attachment\/17360\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/office-phishing-html-attachment\/14700\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/office-phishing-html-attachment\/26549\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/office-phishing-html-attachment\/30581\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/office-phishing-html-attachment\/26945\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/office-phishing-html-attachment\/23812\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/office-phishing-html-attachment\/29140\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/office-phishing-html-attachment\/28938\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/kimlik-avi\/","name":"kimlik av\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9559"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9559\/revisions"}],"predecessor-version":[{"id":9563,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9559\/revisions\/9563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9562"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}