{"id":9564,"date":"2021-04-26T11:59:13","date_gmt":"2021-04-26T08:59:13","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=9564"},"modified":"2022-05-05T14:26:33","modified_gmt":"2022-05-05T11:26:33","slug":"top5-ransomware-groups","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/top5-ransomware-groups\/9564\/","title":{"rendered":"\u015eirket avc\u0131lar\u0131: En b\u00fcy\u00fck 5 fidye yaz\u0131l\u0131m\u0131 grubu"},"content":{"rendered":"<p>Son be\u015f y\u0131lda fidye yaz\u0131l\u0131mlar\u0131, bireysel bilgisayarlar i\u00e7in bir tehdit olmaktan \u00e7\u0131k\u0131p kurumsal a\u011flar i\u00e7in ciddi tehlike olu\u015fturan bir kavrama <a href=\"https:\/\/www.kaspersky.com\/blog\/history-of-ransomware\/39203\/\" target=\"_blank\" rel=\"noopener nofollow\">d\u00f6n\u00fc\u015ft\u00fc.<\/a> Siber su\u00e7lular art\u0131k olabildi\u011fince \u00e7ok bilgisayara vir\u00fcs bula\u015ft\u0131rmaya \u00e7al\u0131\u015fmaktan vazge\u00e7ip bunun yerine b\u00fcy\u00fck kurbanlar\u0131 hedef almaya ba\u015flad\u0131lar. Ticari i\u015fletmelere ve devlet kurumlar\u0131na y\u00f6nelik ger\u00e7ekle\u015ftirilen sald\u0131r\u0131lar dikkatli bir planlama gerektiriyor, ancak sonucunda on milyonlarca dolarl\u0131k \u00f6d\u00fcl potansiyeli de var.<\/p>\n<p>Fidye yaz\u0131l\u0131m\u0131 \u00e7eteleri, \u015firketlerin s\u0131radan kullan\u0131c\u0131lara g\u00f6re \u00e7ok daha b\u00fcy\u00fck olan mali g\u00fc\u00e7lerininden faydalan\u0131yor. Dahas\u0131, g\u00fcn\u00fcm\u00fczdeki bir\u00e7ok fidye yaz\u0131l\u0131m\u0131 grubu, daha fazla kazan\u00e7 sa\u011flamak i\u00e7in \u00e7ald\u0131klar\u0131 verileri \u015fifrelemeden \u00f6nce onlar\u0131 yay\u0131nlamakla tehdit ediyor. Bu tehdit sald\u0131r\u0131dan etkilenen \u015firket i\u00e7in, itibar\u0131n\u0131n zarar g\u00f6rmesinden hissedarlarla ya\u015fanacak sorunlara ve d\u00fczenleyici otoritelerin verece\u011fi para cezalar\u0131na kadar her t\u00fcrl\u00fc yeni riskin ortaya \u00e7\u0131kmas\u0131na neden oluyor ve sonucunda ortaya \u00e7\u0131kan zarar genellikle fidyeden daha pahal\u0131ya mal oluyor.<\/p>\n<p>Verilerimize g\u00f6re 2016, bu konuda bir d\u00f6n\u00fcm noktas\u0131 oldu. \u0130\u015fletmelere y\u00f6nelik ger\u00e7ekle\u015ftirilen fidye yaz\u0131l\u0131m\u0131 siber sald\u0131r\u0131lar\u0131n\u0131n say\u0131s\u0131 yaln\u0131zca birka\u00e7 ayda <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2016-story-of-the-year\/76757\/\" target=\"_blank\" rel=\"noopener\">\u00fc\u00e7 kat\u0131na \u00e7\u0131kt\u0131<\/a>: Ocak 2016\u2019da ortalama her 2 dakikada bir olay kaydediyorken, bu s\u00fcre aral\u0131\u011f\u0131 Eyl\u00fcl sonunda 40 saniyeye d\u00fc\u015ft\u00fc.<\/p>\n<p>2019\u2019dan bu yana uzmanlar d\u00fczenli olarak b\u00fcy\u00fck av denen fidye yaz\u0131l\u0131m\u0131n\u0131n hedef ald\u0131\u011f\u0131 bir dizi giri\u015fimi g\u00f6zlemliyorlar. K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n kendi sitelerinde sald\u0131r\u0131 istatistiklerini g\u00f6r\u00fclebiliyor. Bu verileri kullanarak en aktif siber su\u00e7lu gruplar\u0131n s\u0131ralamas\u0131n\u0131 yapt\u0131k.<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\"><\/strong><\/p>\n<h2>1. Maze (Di\u011fer ad\u0131yla ChaCha fidye yaz\u0131l\u0131m\u0131)<\/h2>\n<p><a href=\"https:\/\/securelist.com\/maze-ransomware\/99137\/\" target=\"_blank\" rel=\"noopener\">\u0130lk olarak 2019\u2019da g\u00f6r\u00fclen<\/a> Maze fidye yaz\u0131l\u0131m\u0131, k\u0131sa s\u00fcrede k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar listesinde zirveye y\u00fckseldi. Toplam kurban say\u0131s\u0131na bak\u0131ld\u0131\u011f\u0131nda bu fidye yaz\u0131l\u0131m\u0131, sald\u0131r\u0131lar\u0131n \u00fc\u00e7te birinden fazlas\u0131ndan sorumlu denebilir. Maze\u2019in arkas\u0131ndaki grup, \u015fifrelemeden \u00f6nce <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-data-disclosure\/7655\/\" target=\"_blank\" rel=\"noopener\">verileri \u00e7alan<\/a> ilk gruplardan biriydi. Siber su\u00e7lular, fidyeyi \u00f6demeyi reddetmesi halinde kurban\u0131, \u00e7al\u0131nan dosyalar\u0131 yay\u0131nlamakla tehdit ediyordu. Grubun kulland\u0131\u011f\u0131 y\u00f6ntemin i\u015fe yarad\u0131\u011f\u0131 g\u00f6r\u00fcld\u00fc ve daha sonra, a\u015fa\u011f\u0131da bahsetti\u011fimiz REvil ve DoppelPaymer dahil olmak \u00fczere, di\u011fer bir\u00e7ok fidye yaz\u0131l\u0131m\u0131 operasyonunda bu y\u00f6ntem uyguland\u0131.<\/p>\n<p>Kullan\u0131lan ba\u015fka bir yeni y\u00f6ntem de, siber su\u00e7lular\u0131n ger\u00e7ekle\u015ftirdi\u011fi sald\u0131r\u0131lara ili\u015fkin medyay\u0131 bilgilendirmeye ba\u015flamas\u0131yd\u0131. 2019\u2019un sonlar\u0131nda Maze grubu, Bleeping Computer\u2019a g\u00f6nderdi\u011fi e-postada <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/allied-universal-breached-by-maze-ransomware-stolen-data-leaked\/\" target=\"_blank\" rel=\"noopener nofollow\">Allied Universal \u015firketini hackledi\u011fini<\/a> ve \u00e7al\u0131nan dosyalardan birka\u00e7\u0131n\u0131 da kan\u0131t olarak ekledi\u011fini s\u00f6yl\u00fcyordu. Grup, internet sitesinin edit\u00f6rleriyle yapt\u0131\u011f\u0131 e-posta yaz\u0131\u015fmas\u0131nda, Allied Universal\u2019\u0131 \u015firketin sunucular\u0131ndan spam g\u00f6ndermekle tehdit ediyordu ve sonras\u0131nda da hacklenen \u015firketin gizli verilerini Bleeping Computer\u2019\u0131n forumunda yay\u0131nlad\u0131lar.<\/p>\n<p>Maze\u2019in sald\u0131r\u0131lar\u0131, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-is-shutting-down-its-cybercrime-operation\/\" target=\"_blank\" rel=\"noopener nofollow\">grubun faaliyetlerini durdurmaya ba\u015flad\u0131\u011f\u0131<\/a> Eyl\u00fcl 2020\u2019ye kadar devam etti; ancak, bu tarihten \u00f6nce birka\u00e7 uluslararas\u0131 \u015firket, Latin Amerika\u2019daki bir devlet bankas\u0131 ve bir ABD \u015fehrinin bilgi i\u015flem sistemi de grubun faaliyetlerinden zarar g\u00f6rm\u00fc\u015ft\u00fc. Bu olaylar\u0131n her birinde Maze operat\u00f6rleri, kurbanlardan fidye olarak birka\u00e7 milyon dolar talep etti.<\/p>\n<h2>2. Conti (Di\u011fer ad\u0131yla IOCP fidye yaz\u0131l\u0131m\u0131)<\/h2>\n<p>Conti, 2019\u2019un sonlar\u0131nda ortaya \u00e7\u0131kt\u0131 ve 2020 boyunca olduk\u00e7a aktifti. Bu d\u00f6nemdeki t\u00fcm fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 kurbanlar\u0131n\u0131n %13\u2019\u00fcnden fazlas\u0131ndan Conti sorumluydu. Yaz\u0131l\u0131m\u0131n yarat\u0131c\u0131s\u0131 grup bug\u00fcn hala aktif.<\/p>\n<p>Conti sald\u0131r\u0131lar\u0131yla ilgili ilgin\u00e7 bir detaysa, siber su\u00e7lular\u0131n kendilerine \u00f6denecek fidye kar\u015f\u0131l\u0131\u011f\u0131nda hedef ald\u0131klar\u0131 \u015firkete g\u00fcvenlikle ilgili <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-shows-signs-of-being-ryuks-successor\/\" target=\"_blank\" rel=\"noopener nofollow\">\u015f\u00f6yle bir<\/a> yard\u0131m teklifinde bulunmas\u0131d\u0131r: \u201cG\u00fcvenli\u011finizdeki a\u00e7\u0131\u011f\u0131 nas\u0131l kapataca\u011f\u0131n\u0131z ve gelecekte bu t\u00fcr sorunlar\u0131 nas\u0131l \u00f6nleyece\u011finizle ilgili talimatlar alacaks\u0131n\u0131z + size, hackerlara en \u00e7ok sorun yaratan \u00f6zel bir yaz\u0131l\u0131m \u00f6nerece\u011fiz.\u201d<\/p>\n<p>Maze\u2019de oldu\u011fu gibi, fidye yaz\u0131l\u0131m\u0131 yaln\u0131zca verileri \u015fifrelemekle kalm\u0131yor, ayn\u0131 zamanda dosyalar\u0131n kopyalar\u0131n\u0131 da sald\u0131r\u0131ya u\u011fram\u0131\u015f sistemlerden fidye yaz\u0131l\u0131m\u0131 operat\u00f6rlerine g\u00f6nderiyor. Siber su\u00e7lular, kurban\u0131n taleplerini yerine getirmemesi halinde \u00e7ald\u0131klar\u0131 bilgileri internette yay\u0131nlamakla tehdit ediyor. Kamuoyunda en bilinen Conti sald\u0131r\u0131s\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gang-wanted-40-million-in-florida-schools-cyberattack\/\" target=\"_blank\" rel=\"noopener nofollow\">Amerika Birle\u015fik Devletleri\u2019ndeki bir okulun hacklenmesi<\/a> ve ard\u0131ndan talep edilen 40 milyon dolarl\u0131k fidyeydi. (Okul y\u00f6netimi, 500.000 dolar fidye \u00f6demeye haz\u0131r oldu\u011funu ancak bu tutar\u0131n 80 kat\u0131 olan fidye talebi i\u00e7in pazarl\u0131k yapmayaca\u011f\u0131n\u0131 s\u00f6yledi.)<\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-b2b\"><\/strong><\/p>\n<h2>3. REvil (Di\u011fer ad\u0131yla Sodin, Sodinokibi fidye yaz\u0131l\u0131m\u0131)<\/h2>\n<p>REvil fidye yaz\u0131l\u0131m\u0131 ile ger\u00e7ekle\u015ftirilen ilk sald\u0131r\u0131lar 2019\u2019un ba\u015flar\u0131nda Asya\u2019da tespit edildi. Bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m, g\u00fcvenlik sistemlerini atlatmak i\u00e7in ge\u00e7erli CPU i\u015flevlerini kullanmak gibi teknik becerilere sahip olmas\u0131 nedeniyle k\u0131sa s\u00fcrede uzmanlar\u0131n <a href=\"https:\/\/securelist.com\/sodin-ransomware\/91473\/\" target=\"_blank\" rel=\"noopener\">ilgisini \u00e7ekti.<\/a> Ek olarak, yaz\u0131l\u0131m\u0131n koduna bak\u0131ld\u0131\u011f\u0131nda, kiralanabilecek \u015fekilde olu\u015fturuldu\u011funa ili\u015fkin baz\u0131 karakteristik i\u015faretler yer al\u0131yordu.<\/p>\n<p>Toplam istatistiklere bak\u0131ld\u0131\u011f\u0131nda, REvil kaynakl\u0131 sald\u0131r\u0131lardan etkilenen kurbanlar\u0131n oran\u0131 %11 seviyesinde. Neredeyse 20 farkl\u0131 sekt\u00f6r bu k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mdan etkilendi. Etkilenen sekt\u00f6rler i\u00e7indeki en b\u00fcy\u00fck pay %30\u2019la M\u00fchendislik ve \u0130malat sekt\u00f6r\u00fcne ait; bunu %14\u2019le Finans, %9\u2019la Profesyonel ve T\u00fcketici Hizmetleri, %7 ile Hukuk ve ayn\u0131 oranla BT ve Telekom\u00fcnikasyon sekt\u00f6rleri takip ediyor. <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/attackers-exploit-msps-tools-to-distribute-ransomware\/d\/d-id\/1335025\" target=\"_blank\" rel=\"noopener nofollow\">Hackledi\u011fi<\/a> bir\u00e7ok MSP ve bu MSP\u2019lerin m\u00fc\u015fterilerine da\u011f\u0131tt\u0131\u011f\u0131 Sodinokibi fidye yaz\u0131l\u0131m\u0131 sonucunda grup, BT ve Telekom\u00fcnikasyon sekt\u00f6r\u00fcnde 2019 y\u0131l\u0131n\u0131n en sansasyonel fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lardan birini ger\u00e7ekle\u015ftirmi\u015f oldu.<\/p>\n<p>Grup \u015fu anda Mart 2021\u2019de Acer\u2019dan talep ettikleri 50 milyon dolar fidye ile <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/computer-giant-acer-hit-by-50-million-ransomware-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">bug\u00fcne kadar talep edilmi\u015f en b\u00fcy\u00fck fidye<\/a> rekorunu elinde bulunduruyor.<\/p>\n<h2>4. Netwalker (Di\u011fer ad\u0131yla Mailto fidye yaz\u0131l\u0131m\u0131)<\/h2>\n<p>Toplam kurban say\u0131s\u0131n\u0131n i\u00e7inde Netwalker sald\u0131r\u0131lar\u0131n\u0131n kurban\u0131 olanlar %10\u2019un \u00fczerindeydi. Hedefleri aras\u0131nda lojistik sekt\u00f6r\u00fc devleri, sanayi gruplar\u0131, enerji \u015firketleri ve di\u011fer b\u00fcy\u00fck kurulu\u015flar bulunuyor. 2020\u2019de sadece birka\u00e7 ayl\u0131k bir s\u00fcrede, siber su\u00e7lular <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/netwalker-ransomware-earned-25-million-in-just-five-months\/\" target=\"_blank\" rel=\"noopener nofollow\">25 milyon dolardan fazla para kazand\u0131<\/a>.<\/p>\n<p>Yaz\u0131l\u0131m\u0131n\u0131n yarat\u0131c\u0131lar\u0131, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-recruits-affiliates-with-huge-payouts-automated-leaks\/\" target=\"_blank\" rel=\"noopener nofollow\">fidye yaz\u0131l\u0131m\u0131n\u0131 kitlelere ula\u015ft\u0131rmaya kararl\u0131<\/a> g\u00f6r\u00fcn\u00fcyor. Sald\u0131r\u0131dan elde edilen kardan k\u00fc\u00e7\u00fck bir pay verilmesi kar\u015f\u0131l\u0131\u011f\u0131nda Netwalker\u2019\u0131 tek ba\u015f\u0131na \u00e7al\u0131\u015fan doland\u0131r\u0131c\u0131lara kiralamay\u0131 teklif ettiler. Bu t\u00fcr planlarda ortaklara yap\u0131lan \u00f6deme genellikle daha d\u00fc\u015f\u00fck olmas\u0131na kar\u015f\u0131n Bleeping Computer\u2019a g\u00f6re, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m da\u011f\u0131t\u0131mc\u0131s\u0131n\u0131n fidyeden istedi\u011fi pay <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/netwalker-ransomware-earned-25-million-in-just-five-months\/\" target=\"_blank\" rel=\"noopener nofollow\">%70\u2019i bulabiliyor<\/a>.<\/p>\n<p>Siber su\u00e7lular ama\u00e7lad\u0131klar\u0131 y\u00f6nteme kan\u0131t olarak b\u00fcy\u00fck tutarl\u0131 para transferlerine ili\u015fkin ekran g\u00f6r\u00fcnt\u00fcleri yay\u0131nlad\u0131lar. Kiralama s\u00fcrecini olabildi\u011fince kolayla\u015ft\u0131rmak i\u00e7inse, fidye i\u00e7in verilen s\u00fcrenin sonunda \u00e7al\u0131nan verileri otomatik olarak yay\u0131nlayacak bir internet sitesi kurdular.<\/p>\n<p>Ocak 2021\u2019de polis, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-charges-netwalker-ransomware-affiliate-seizes-ransom-payments\/\" target=\"_blank\" rel=\"noopener nofollow\">Netwalker dark web kaynaklar\u0131na el koydu<\/a> ve Kanada vatanda\u015f\u0131 olan Sebastien Vachon-Desjardins\u2019i fidye yaz\u0131l\u0131m\u0131 ile kurbanlardan 27,6 milyon dolar\u0131n \u00fczerinde para s\u0131zd\u0131rmakla su\u00e7lad\u0131. Vachon-Desjardins kurbanlar\u0131 bulmak, g\u00fcvenliklerini ihlal etmek ve Netwalker\u2019\u0131 sistemlerine yerle\u015ftirmekten sorumlu tutuldu. Kolluk kuvvetlerinin ger\u00e7ekle\u015ftirdi\u011fi operasyon sonucunda Netwalker etkili bir \u015fekilde ortadan kald\u0131r\u0131lm\u0131\u015f oldu.<\/p>\n<h2>5. DoppelPaymer fidye yaz\u0131l\u0131m\u0131<\/h2>\n<p>Toplam istatistiklere bak\u0131ld\u0131\u011f\u0131nda, listemizin son k\u00f6t\u00fc karakteri olan DoppelPaymer fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131lar\u0131ndan etkilenen kurbanlar\u0131n pay\u0131 %9 civar\u0131nda. Yaz\u0131l\u0131m\u0131n yarat\u0131c\u0131lar\u0131, Dridex bankac\u0131l\u0131k Truva At\u0131 ve DopplePaymer\u2019in <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-doppelpaymer-ransomware-emerges-from-bitpaymers-code\/\" target=\"_blank\" rel=\"noopener nofollow\">eski bir s\u00fcr\u00fcm\u00fc olarak kabul edilen<\/a> ve art\u0131k kullan\u0131lmayan BitPaymer (di\u011fer ad\u0131yla FriedEx) fidye yaz\u0131l\u0131m\u0131 da dahil olmak \u00fczere yaratt\u0131\u011f\u0131 di\u011fer k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla da ad\u0131ndan s\u00f6z ettirmi\u015fti. Dolay\u0131s\u0131yla, grubun sorumlu oldu\u011fu toplam kurban say\u0131s\u0131 san\u0131landan \u00e7ok daha fazla.<\/p>\n<p>Latin Amerika merkezli b\u00fcy\u00fck bir petrol \u015firketinin yan\u0131 s\u0131ra, elektronik ve otomobil \u00fcreticileri de dahil olmak \u00fczere bir \u00e7ok ticari i\u015fletme DoppelPaymer\u2019dan <a href=\"https:\/\/www.cpomagazine.com\/cyber-security\/kia-motors-america-suffers-a-20-million-suspected-doppelpaymer-ransomware-attack\/\" target=\"_blank\" rel=\"noopener nofollow\">etkilendi<\/a>. DoppelPaymer s\u0131kl\u0131kla, sa\u011fl\u0131k, acil servis ve e\u011fitim hizmetleri dahil olmak \u00fczere <a href=\"https:\/\/www.ic3.gov\/Media\/News\/2020\/201215-1.pdf\" target=\"_blank\" rel=\"noopener nofollow\">d\u00fcnya \u00e7ap\u0131ndaki devlet kurulu\u015flar\u0131n\u0131<\/a> hedef al\u0131yor. Grup ayr\u0131ca, her ikisi de Amerika Birle\u015fik Devletleri\u2019nde ger\u00e7ekle\u015fen iki olaydan, Georgia ve Hall County\u2019den \u00e7al\u0131nan <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/georgia-county-voter-information-leaked-by-ransomware-gang\/\" target=\"_blank\" rel=\"noopener nofollow\">se\u00e7men bilgilerinin yay\u0131nlanmas\u0131<\/a> ve Delaware County, Pennsylvania\u2019dan 500.000 dolar fidye <a href=\"https:\/\/6abc.com\/delaware-county-pa-hack-delco-pennsylvania-fbi\/8257339\/\" target=\"_blank\" rel=\"noopener nofollow\">al\u0131nmas\u0131n\u0131n<\/a> ard\u0131ndan man\u015fet oldu. DoppelPaymer sald\u0131r\u0131lar\u0131 bug\u00fcn hala kadar devam ediyor: Bu y\u0131l\u0131n \u015eubat ay\u0131nda, Avrupal\u0131 bir ara\u015ft\u0131rma kurulu\u015fu sald\u0131r\u0131ya u\u011frad\u0131\u011f\u0131n\u0131 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dutch-research-council-nwo-confirms-ransomware-attack-data-leak\/\" target=\"_blank\" rel=\"noopener nofollow\">a\u00e7\u0131klad\u0131.<\/a><\/p>\n<p><strong><input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\"><\/strong><\/p>\n<h2>Hedefli sald\u0131r\u0131 y\u00f6ntemleri<\/h2>\n<p>B\u00fcy\u00fck bir \u015firkete y\u00f6nelik her hedefli sald\u0131r\u0131, altyap\u0131daki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 bulma, bir senaryo olu\u015fturma ve sald\u0131r\u0131 ara\u00e7lar\u0131n\u0131 se\u00e7me gibi uzun bir s\u00fcrecin sonucunda ger\u00e7ekle\u015fir. Ard\u0131ndan s\u0131zma olur ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m kurumsal altyap\u0131ya yay\u0131l\u0131r. Siber su\u00e7lular bazen dosyalar\u0131 \u015fifrelemeden ve herhangi bir talepte bulunmadan \u00f6nce birka\u00e7 ay boyunca bir \u015firket a\u011f\u0131nda kal\u0131rlar.<\/p>\n<p>Altyap\u0131ya giden ana yollar \u015funlar:<\/p>\n<ul>\n<li><strong>G\u00fcvenli olmayan uzaktan eri\u015fim ba\u011flant\u0131lar\u0131.<\/strong> G\u00fcvenlik a\u00e7\u0131\u011f\u0131na sahip RDP (Uzak Masa\u00fcst\u00fc Protokol\u00fc) ba\u011flant\u0131lar\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131 da\u011f\u0131tman\u0131n o kadar yayg\u0131n bir yolu ki, <a href=\"https:\/\/www.kaspersky.com\/blog\/a-multiheaded-battering-ram-rdp-bruteforce-attacks-on-the-rise\/14971\/\" target=\"_blank\" rel=\"noopener nofollow\">gruplar<\/a> kara borsada bu a\u00e7\u0131klardan faydalanmaya y\u00f6nelik hizmetler bile sunuyor. \u0130\u015f d\u00fcnyas\u0131n\u0131n b\u00fcy\u00fck bir k\u0131sm\u0131 uzaktan \u00e7al\u0131\u015fmaya ge\u00e7mesiyle birlikte, bu t\u00fcr sald\u0131r\u0131lar\u0131n say\u0131s\u0131nda inan\u0131lmaz bir art\u0131\u015f ya\u015fanmaya ba\u015flad\u0131. Bu y\u00f6ntem ayn\u0131 zamanda, Ryuk, REvil ve di\u011fer fidye yaz\u0131l\u0131m\u0131 giri\u015fimlerinin \u00e7al\u0131\u015fma \u015fekli;<\/li>\n<li><strong>Sunucu uygulamalar\u0131ndaki g\u00fcvenlik a\u00e7\u0131klar\u0131.<\/strong> Sunucu taraf\u0131ndaki yaz\u0131l\u0131mlara yap\u0131lan sald\u0131r\u0131lar, siber su\u00e7lular\u0131n en hassas verilere eri\u015fmesini sa\u011fl\u0131yor. Bu y\u00f6nteme ili\u015fkin son \u00f6rnek Mart ay\u0131nda, Microsoft Exchange\u2019deki s\u0131f\u0131r g\u00fcn g\u00fcvenlik a\u00e7\u0131\u011f\u0131 yoluyla ger\u00e7ekle\u015ftirilen <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/dearcry-ransomware-attacks-microsoft-exchange-with-proxylogon-exploits\/\" target=\"_blank\" rel=\"noopener nofollow\">DearCry fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131<\/a>. Yeterli \u015fekilde korunmayan sunucu taraf\u0131ndaki yaz\u0131l\u0131m, hedefli bir sald\u0131r\u0131n\u0131n giri\u015f noktas\u0131 olabiliyor. Ge\u00e7ti\u011fimiz y\u0131l baz\u0131 <a href=\"https:\/\/www.zdnet.com\/article\/hacker-groups-chain-vpn-and-windows-bugs-to-attack-us-government-networks\/\" target=\"_blank\" rel=\"noopener nofollow\">\u00f6rneklerini<\/a> g\u00f6rd\u00fc\u011f\u00fcm\u00fcz, bu t\u00fcr g\u00fcvenlik sorunlar\u0131 kurumsal VPN sunucular\u0131nda da ortaya \u00e7\u0131kt\u0131;<\/li>\n<li><strong>Botnet tabanl\u0131 g\u00f6nderim.<\/strong> Fidye yaz\u0131l\u0131m\u0131 operat\u00f6rleri daha fazla kurban\u0131 tuza\u011fa d\u00fc\u015f\u00fcrmek ve k\u00e2r\u0131 art\u0131rmak i\u00e7in <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/botnet\/\" target=\"_blank\" rel=\"noopener\">botnet\u2019leri<\/a> kullan\u0131yorlar. Zombi a\u011f operat\u00f6rleri, di\u011fer siber su\u00e7lulara, savunmas\u0131z sistemleri otomatik olarak arayan ve bunlara fidye yaz\u0131l\u0131m\u0131 indiren, g\u00fcvenli\u011fi ihlal edilmi\u015f binlerce cihaza eri\u015fim sa\u011fl\u0131yor. \u00d6rne\u011fin Conti ve DoppelPaymer fidye yaz\u0131l\u0131m\u0131 bu \u015fekilde yay\u0131ld\u0131;<\/li>\n<li><strong>Tedarik zinciri sald\u0131r\u0131lar\u0131.<\/strong> Bu tehdit vekt\u00f6r\u00fcn\u00fcn kullan\u0131m\u0131na \u0131\u015f\u0131k tutan en iyi \u00f6rnek REvil sald\u0131r\u0131s\u0131: Grup, bir MSP sa\u011flay\u0131c\u0131s\u0131n\u0131n g\u00fcvenli\u011fini ihlal etti ve ard\u0131ndan fidye yaz\u0131l\u0131m\u0131n\u0131 m\u00fc\u015fterilerinin a\u011flar\u0131na da\u011f\u0131tt\u0131;<\/li>\n<li><strong>K\u00f6t\u00fc ama\u00e7l\u0131 e-posta ekleri.<\/strong> K\u00f6t\u00fc ama\u00e7l\u0131 makrolar i\u00e7eren Word dosyalar\u0131n\u0131n e-postaya eklenmesi, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m g\u00f6nderimi konusunda hala pop\u00fcler bir se\u00e7enek. En k\u00f6t\u00fc 5 karakterimizden biri olan NetWalker grubu, konu sat\u0131r\u0131nda \u201cCOVID-19\u201d yazan e-postalar ile <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/netwalker-ransomware-infecting-users-via-coronavirus-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">kurbanlar\u0131 tuza\u011fa d\u00fc\u015f\u00fcrmek<\/a> i\u00e7in k\u00f6t\u00fc niyetli ekleri kulland\u0131.<\/li>\n<\/ul>\n<h2>\u0130\u015fletmeler kendini nas\u0131l koruyabilir?<\/h2>\n<ul>\n<li><a href=\"https:\/\/k-asap.com\/tr\/?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______&amp;utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=tr_wpplaceholder_nv0092&amp;utm_content=link&amp;utm_term=tr_kdaily_organic_avmwswubv8qh92b\" target=\"_blank\" rel=\"noopener\">\u00c7al\u0131\u015fanlar\u0131n\u0131z\u0131 dijital hijyen konusunda e\u011fitin<\/a>. \u00c7al\u0131\u015fanlar, \u015f\u00fcpheli e-postalardaki ba\u011flant\u0131lara asla t\u0131klamamal\u0131 veya \u015f\u00fcpheli sitelerden dosya indirmemeli; kimlik av\u0131n\u0131n ne oldu\u011funu, g\u00fc\u00e7l\u00fc bir parolan\u0131n nas\u0131l olu\u015fturulaca\u011f\u0131n\u0131, hat\u0131rlanaca\u011f\u0131n\u0131 ve korunaca\u011f\u0131n\u0131 bilmelidir. Yaln\u0131zca olay riskini en aza indirmek i\u00e7in de\u011fil, ayn\u0131 zamanda sald\u0131rganlar\u0131n a\u011fa s\u0131zmay\u0131 ba\u015farmas\u0131 durumunda ya\u015fanacak hasar\u0131 azaltmak i\u00e7in de bilgi g\u00fcvenli\u011fi konusunda d\u00fczenli e\u011fitimler verin;<\/li>\n<li>Yaz\u0131l\u0131mlar\u0131n bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131 ile ger\u00e7ekle\u015ftirilen sald\u0131r\u0131lara kar\u015f\u0131 en \u00fcst seviyede koruma sa\u011flamak i\u00e7in t\u00fcm i\u015fletim sistemlerini ve uygulamalar\u0131 d\u00fczenli olarak g\u00fcncelleyin. Hem istemci taraf\u0131 hem de sunucu taraf\u0131 yaz\u0131l\u0131mlar\u0131n\u0131 g\u00fcncellemeye \u00f6zen g\u00f6sterin;<\/li>\n<li>G\u00fcvenlik denetimleri ger\u00e7ekle\u015ftirin, <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/dangerous-ethernet-ports\/7392\/\" target=\"_blank\" rel=\"noopener\">ekipman g\u00fcvenli\u011fini kontrol edin<\/a> ve hangi ba\u011flant\u0131 noktalar\u0131n\u0131n a\u00e7\u0131k ve internet \u00fczerinden eri\u015filebilir oldu\u011funu takip edin. Uzaktan \u00e7al\u0131\u015fma i\u00e7in g\u00fcvenli bir ba\u011flant\u0131 kullan\u0131n, ancak bunu yaparken VPN\u2019lerin bile g\u00fcvenlik a\u00e7\u0131klar\u0131na sahip olabilece\u011fini unutmay\u0131n;<\/li>\n<li>Kurumsal verileri yedekleyin. Verilerin yedeklerinin olmas\u0131, yaln\u0131zca bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131 durumunda kesinti s\u00fcresinin azalt\u0131lmas\u0131na ve i\u015f s\u00fcre\u00e7lerinin daha h\u0131zl\u0131 geri y\u00fcklenmesine yard\u0131mc\u0131 olmakla kalmaz, ayn\u0131 zamanda donan\u0131m ar\u0131zalar\u0131 gibi daha zorlu olaylardan da kurtulmaya yard\u0131mc\u0131 olur;<\/li>\n<li>Davran\u0131\u015f analizi ve fidye yaz\u0131l\u0131m\u0131 \u00f6nleme teknolojilerine sahip bir <a href=\"https:\/\/www.kaspersky.com.tr\/small-to-medium-business-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">profesyonel g\u00fcvenlik \u00e7\u00f6z\u00fcm\u00fc<\/a><strong>;<\/strong><\/li>\n<li>Ba\u011flant\u0131 noktalar\u0131n\u0131 incelemeye \u00e7al\u0131\u015fma giri\u015fimleri veya standart d\u0131\u015f\u0131 sistemlere eri\u015fim istekleri gibi a\u011f altyap\u0131s\u0131ndaki anormallikleri tan\u0131yabilen bir bilgi g\u00fcvenli\u011fi sistemi uygulay\u0131n. A\u011f\u0131 izleyebilecek \u015firket i\u00e7i uzmanlar\u0131n\u0131z yoksa\u00a0<strong><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">d\u0131\u015far\u0131dan bir uzman<\/a> <\/strong>ile ileti\u015fime ge\u00e7in.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\">\n","protected":false},"excerpt":{"rendered":"<p>\u015eirketleri hedef alan, verileri \u015fifreleyen ve fidye talep eden en aktif gruplar.<\/p>\n","protected":false},"author":2706,"featured_media":9565,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194,1351],"tags":[493,591,618,935,537],"class_list":{"0":"post-9564","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"category-threats","10":"tag-apt","11":"tag-fidye-yazilimi","12":"tag-hedefli-saldirilar","13":"tag-sifreleyiciler","14":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top5-ransomware-groups\/9564\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top5-ransomware-groups\/22771\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top5-ransomware-groups\/18253\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top5-ransomware-groups\/24615\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top5-ransomware-groups\/22643\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top5-ransomware-groups\/21716\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top5-ransomware-groups\/25126\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top5-ransomware-groups\/24442\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top5-ransomware-groups\/30549\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top5-ransomware-groups\/39426\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top5-ransomware-groups\/16824\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top5-ransomware-groups\/17345\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/top5-ransomware-groups\/14738\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top5-ransomware-groups\/26560\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top5-ransomware-groups\/30592\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/top5-ransomware-groups\/26942\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top5-ransomware-groups\/23807\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top5-ransomware-groups\/29146\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top5-ransomware-groups\/28944\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/fidye-yazilimi\/","name":"Fidye Yaz\u0131l\u0131m\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=9564"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9564\/revisions"}],"predecessor-version":[{"id":9566,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/9564\/revisions\/9566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/9565"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=9564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=9564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=9564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}